Claus Pahl
YOU?
Author Swipe
View article: BE-DSN: leveraging blockchain for improving data availability and security in distributed storage networks
BE-DSN: leveraging blockchain for improving data availability and security in distributed storage networks Open
In the age of Industry 4.0 and the Internet of Things (IoT), a massive amount of data is produced by digital applications. Since organizations process this data to extract business strategies, it requires a reliable and secure storage plat…
View article: A Comparative Evaluation of Zero Knowledge Proof Techniques
A Comparative Evaluation of Zero Knowledge Proof Techniques Open
View article: Anomaly Detection for Partially Observable Container Systems Based on Architecture Profiling
Anomaly Detection for Partially Observable Container Systems Based on Architecture Profiling Open
View article: Hybrid Root Cause Analysis for Partially Observable Microservices Based on Architecture Profiling
Hybrid Root Cause Analysis for Partially Observable Microservices Based on Architecture Profiling Open
View article: A Technology Review of Zero Knowledge Proof Techniques
A Technology Review of Zero Knowledge Proof Techniques Open
View article: Infrastructure as Code: Technology Review and Research Challenges
Infrastructure as Code: Technology Review and Research Challenges Open
View article: Evaluation of fuzzy learning-based scaling policies for the Slingshot Simulator
Evaluation of fuzzy learning-based scaling policies for the Slingshot Simulator Open
Evaluation results for Fuzzy Learning models in the Slingshot simulator This dataset contains the evaluation results for the evaluation of the Fuzzy Learning implementation in the Slingshot simulator (See https://github.com/PalladioSimulat…
View article: Anomaly analytics in data-driven machine learning applications
Anomaly analytics in data-driven machine learning applications Open
Machine learning is used widely to create a range of prediction or classification models. The quality of the machine learning (ML) models depends not only on the model creation process, but also on the input data quality. We investigate he…
View article: Robust-DSN: A Hybrid Distributed Replication and Encoding Network Grouped with a Distributed Swarm Workflow Scheduler
Robust-DSN: A Hybrid Distributed Replication and Encoding Network Grouped with a Distributed Swarm Workflow Scheduler Open
In many distributed applications such as the Internet of Things (IoT), large amounts of data are being generated that require robust storage solutions. Traditional cloud solutions, although efficient, often lack trust and transparency beca…
View article: Enhancing Cloud Service Selection and Orchestration with DALMOCS: A Dynamic Adaptive Learning and Multi-Criteria Decision Analysis Approach
Enhancing Cloud Service Selection and Orchestration with DALMOCS: A Dynamic Adaptive Learning and Multi-Criteria Decision Analysis Approach Open
View article: Blockchain-Based E-Voting Systems: A Technology Review
Blockchain-Based E-Voting Systems: A Technology Review Open
The employment of blockchain technology in electronic voting (e-voting) systems is attracting significant attention due to its ability to enhance transparency, security, and integrity in digital voting. This study presents an extensive rev…
View article: A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain Trilemma
A Platform Selection Framework for Blockchain-Based Software Systems Based on the Blockchain Trilemma Open
Blockchains are used in many software systems to deal with trusted storage. The selection of the appropriate software architecture stack in distributed systems is generally driven by scalability, security, and decentralization as central q…
View article: Decentralized Identification and Information Exchange in Distributed, Blockchain-Based Internet Architectures: A Technology Review
Decentralized Identification and Information Exchange in Distributed, Blockchain-Based Internet Architectures: A Technology Review Open
In many Web and Internet-based systems, sharing Personally Identifiable Information (PII) to identify persons and other entities is common, but centralized systems such as central registries have limitations in terms of control of privacy …
View article: Bringing Distributed Collaborative Design and Team Collaboration to the Table: A Conceptual Framework
Bringing Distributed Collaborative Design and Team Collaboration to the Table: A Conceptual Framework Open
Background. The recent rise of software organizations shifting towards distributed environments increased the feed for distributed collaborative design (DCD), which requires dedicated design thinking and decision strategies to provide a cl…
View article: Architecture Design Decisions in Distributed Teams: An Assessment of Tool Support
Architecture Design Decisions in Distributed Teams: An Assessment of Tool Support Open
Background. Global Software Engineering (GSE) teams develop software artifacts across multiple locations. Designing and maintaining software in such a setting requires continuous collaboration to record design decisions between distributed…
View article: A Review of Blockchain Platforms Based on the Scalability, Security and Decentralization Trilemma
A Review of Blockchain Platforms Based on the Scalability, Security and Decentralization Trilemma Open
As blockchains are more and more used to support information system architectures, the question of the suitability of a blockchain technology for a particular system arises. However, given the vast amount of existing blockchain platforms, …
View article: A Comparison of Synchronous and Asynchronous Distributed Particle Swarm Optimization for Edge Computing
A Comparison of Synchronous and Asynchronous Distributed Particle Swarm Optimization for Edge Computing Open
Edge computing needs to deal with concerns such as load balancing, resource provisioning, and workload placement as optimization problems. Particle Swarm Optimization (PSO) is a nature-inspired stochastic optimization approach that aims at…
View article: Getting Ready for the New Normal Way of Working: Using Business Simulation Projects to Foster Work-from-Anywhere Skills
Getting Ready for the New Normal Way of Working: Using Business Simulation Projects to Foster Work-from-Anywhere Skills Open
While entering the post-COVID-19 pandemic phase, to define a new normal way of working, some companies are transitioning toward a permanent WFX model, while others are combining WFX with colocated work (i.e., hybrid work). Therefore, foste…
View article: Table of Contents
Table of Contents Open
View article: Research challenges for machine learning-constructed software
Research challenges for machine learning-constructed software Open
View article: Keeping fun alive
Keeping fun alive Open
The outbreak of the COVID-19 pandemic prohibited radically the collocation and face-to-face interactions of participants in coding bootcamps and similar experiences, which are key characteristics that help participants to advance technical…
View article: A Quality-driven Machine Learning Governance Architecture for Self-adaptive Edge Clouds
A Quality-driven Machine Learning Governance Architecture for Self-adaptive Edge Clouds Open
Self-adaptive systems such as clouds and edge clouds are more and more using Machine Learning (ML) techniques if sufficient data is available to create respective ML models. Self-adaptive systems are built around a controller that, based o…
View article: Software Design and Modeling Practices in an Online Software Engineering Course: The Learners’ Perspective
Software Design and Modeling Practices in an Online Software Engineering Course: The Learners’ Perspective Open
Background. Global Software Engineering (GSE) education is an established practice in academia. Several methods and tools support communication and programming activities, but earlier development stages, such as software design and modelin…
View article: Interaction-Based Trust in Multi-Access Edge Computing Environments
Interaction-Based Trust in Multi-Access Edge Computing Environments Open
View article: Work-From-Anywhere Skills: Aligning Supply and Demand Starting from High Schools
Work-From-Anywhere Skills: Aligning Supply and Demand Starting from High Schools Open
The world of work-from-home (WFH) and work-from-anywhere (abbreviated WFX or WFA) grew more than ever during the COVID-19 pandemic. Many companies are now planning on permanently allowing WFX, with subsequent demand for specific skills. It…
View article: Table of Contents
Table of Contents Open
View article: Table of Contents
Table of Contents Open
View article: Table of Contents
Table of Contents Open
View article: Synchronization Techniques in “Device to Device- and Vehicle to Vehicle-Enabled” Cellular Networks: A survey
Synchronization Techniques in “Device to Device- and Vehicle to Vehicle-Enabled” Cellular Networks: A survey Open
Device-to-Device (D2D) communication is introduced for cellular networks allowing User Equipments (UEs) to communicate directly in close physical proximity. In traditional cellular networks, time synchronization is performed by the network…
View article: SOFSEM 2021: Theory and Practice of Computer Science, 47th International Conference on Current Trends in Theory and Practice of Computer Science
SOFSEM 2021: Theory and Practice of Computer Science, 47th International Conference on Current Trends in Theory and Practice of Computer Science Open
This book contains the invited and contributed papers selected for presentation at SOFSEM 2021, the 47th International Conference on Current Trends in Theory and Practice of Computer Science, which was held online during January 25–28, 202…