LEADER 01379nam 2200445 450 001 9910480601603321 005 20211005150758.0 010 $a84-9148-269-5 035 $a(CKB)3840000000348938 035 $a(MiAaPQ)EBC5307524 035 $a(MiAaPQ)EBC6522239 035 $a(Au-PeEL)EBL6522239 035 $a(OCoLC)1171569664 035 $a(EXLCZ)993840000000348938 100 $a20180516d2017 uy 0 101 0 $aspa 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 13$aLa guarda de hecho /$fPatricia A. Lescano Feria ; pro?logo Ramo?n Dura?n Rivacoba 210 1$aMadrid :$cDykinson,$d2017. 215 $a1 online resource (434 pa?ginas) 225 1 $aColeccio?n Monografi?as de Derecho Civil. I. Persona y familia 311 $a84-9148-241-5 410 0$aColeccio?n Monografi?as de Derecho Civil. I. Persona y familia. 606 $aGuardian and ward 606 $aDerecho de la familia 608 $aLibros electronicos. 615 0$aGuardian and ward. 615 4$aDerecho de la familia. 676 $a346.018 700 $aLescano Feria$b Patricia$0846291 702 $aDura?n Rivacoba$b Ramo?n$f1959- , 801 0$bFINmELB 801 1$bFINmELB 906 $aBOOK 912 $a9910480601603321 996 $aLa guarda de hecho$91890476 997 $aUNINA LEADER 10854nam 2200529 450 001 996464438703316 005 20231110212257.0 010 $a3-030-72369-0 035 $a(CKB)4100000011807079 035 $a(MiAaPQ)EBC6524993 035 $a(Au-PeEL)EBL6524993 035 $a(OCoLC)1243262550 035 $a(PPN)254720684 035 $a(EXLCZ)994100000011807079 100 $a20211014d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aCloud computing and services science $e10th international conference, CLOSER 2020, Prague, Czech Republic, May 7-9, 2020, revised selected papers /$fedited by Donald Ferguson, Claus Pahl, and Markus Helfert 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (357 pages) $cillustrations 225 1 $aCommunications in Computer and Information Science ;$vv.1399 300 $aIncludes index. 311 $a3-030-72368-2 327 $aIntro -- Preface -- Organization -- Contents -- Trusted Client-Side Encryption for Cloud Storage -- 1 Introduction -- 1.1 Contribution -- 1.2 Outline -- 2 Background -- 2.1 Cloud Storage -- 2.2 File and Disk Encryption -- 2.3 Cryptomator -- 2.4 Intel Software Guard Extensions Technology -- 3 Related Work -- 3.1 Cloud Storage Security and Privacy -- 3.2 File and Disk Encryption with Intel SGX -- 3.3 Cloud Storage with Intel SGX -- 4 Proposal -- 5 Performance Evaluation -- 5.1 Experimental Setup -- 5.2 Methodology -- 5.3 File Writing Performance -- 5.4 File Reading Performance -- 6 Security Assessment -- 6.1 Threat Model -- 6.2 Intel SGX Security Assessment -- 6.3 Cryptomator-SGX Security Assessment -- 7 Limitations -- 8 Future Work -- 9 Conclusion -- References -- Relevance of Near-Term Quantum Computing in the Cloud: A Humanities Perspective -- 1 Introduction -- 2 Programming Model -- 2.1 Quantum Registers -- 2.2 Quantum Operations -- 2.3 Quantum Algorithms -- 2.4 Quantum Software Stack -- 2.5 Sample Research Questions -- 3 Quantum as a Service -- 3.1 Tooling -- 3.2 Deployment and Quantum Application as a Service -- 3.3 Sample Research Questions -- 4 Removing Hardware Dependencies -- 4.1 Problem -- 4.2 Hardware-Independent Processing -- 4.3 NISQ Analyzer -- 4.4 Quantum Compiler -- 4.5 Optimization of Quantum Algorithms -- 4.6 Sample Research Questions -- 5 Quantum Humanities: A Use Case from Quantum Machine Learning -- 5.1 Quantum Humanities -- 5.2 MUSE -- 5.3 Potential Improvements -- 5.4 Categorical Data -- 5.5 Distance Measures and Feature Extraction -- 5.6 Sample Research Questions -- 6 Collaborative Quantum Application Platform -- 6.1 Key Entities -- 6.2 Requirements -- 6.3 Architecture -- 6.4 Sample Research Questions -- 7 Conclusions -- References. 327 $aA Framework for Comparative Evaluation of High-Performance Virtualized Networking Mechanisms -- 1 Introduction -- 1.1 Contributions -- 2 Background -- 2.1 Kernel-Based Networking and VNFs -- 2.2 Bypassing the Kernel's Networking Stack -- 2.3 Inter-container Communications with Kernel Bypass -- 2.4 High-Performance Switching Among Containers -- 3 Proposed Framework -- 4 Experimental Results -- 4.1 Testing Parameters -- 4.2 Kernel-Based Networking -- 4.3 Throughput Evaluations -- 4.4 Throughput Scalability Evaluations -- 4.5 Latency Performance Evaluations -- 4.6 Performance and Computational Requirements -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Cloud Computing for Enabling Big Data Analysis -- 1 Introduction -- 2 Data Mining Cloud Framework (DMCF) -- 2.1 Workflow Formalisms -- 2.2 Workflow Examples -- 2.3 Workflow Study Cases -- 3 Parallel Social Data Analysis (ParSoDA) -- 3.1 Reference Architecture and Execution Flow -- 3.2 Usability and Scalability Evaluation -- 4 Nubytics -- 4.1 Architecture -- 4.2 Services -- 5 SMA4TD -- 5.1 Steps 1-2: Definition of Events and Places-of-Interest -- 5.2 Steps 3-4-5: Collection and Pre-processing of Geotagged Items, Identification of Users and Creation of the Input Dataset -- 5.3 Step 6-7: Data Mining and Results Visualization -- 5.4 Study Cases: FIFA World Cup 2014 and EXPO 2015 -- 6 RoI Mining -- 6.1 Methodology -- 7 Iterative Opinion Mining Using Neural Networks -- 7.1 Case Study: The 2016 US Presidential Election -- 8 Conclusions -- References -- A Multi-cloud Parallel Selection Approach for Unlinked Microservice Mapped to Budget's Quota: The PUM2Q -- 1 Introduction -- 2 Example for PUM2Q -- 3 Formulation -- 3.1 Availability Requirement -- 3.2 Response Time Requirement -- 3.3 Cost Requirement -- 4 PUM2Q Approach -- 4.1 First Level: Determine Candidate Services for a Microservice. 327 $a4.2 Second Level: Determine a Candidate Combination from All Providers -- 4.3 Third Level: Determine a Combination for a Microservice -- 5 Performance Assessment -- 5.1 Tool Description -- 5.2 Setting Scenarios -- 5.3 Experiments for PUM2Q -- 5.4 Experiments for UM2Q -- 5.5 Comparison Between PUM2Q and UM2Q -- 6 Images/Related Work -- 7 Conclusion -- References -- Live Migration Timing Optimization Integration with VMware Environments -- 1 Introduction -- 2 Background -- 2.1 Live Migration Configurations -- 2.2 VMware Virtual Networking Configuration -- 3 Cost Prediction Algorithm and Timing Optimization -- 3.1 The Research Problem -- 3.2 Cost Prediction Algorithm -- 3.3 Timing Optimization Algorithm -- 4 Integration with VMware vSphere -- 5 Testing Results -- 6 Conclusion -- References -- Using Self-Organizing Maps for the Behavioral Analysis of Virtualized Network Functions -- 1 Introduction -- 1.1 Contributions -- 1.2 Paper Organization -- 2 Related Work -- 3 Background Concepts -- 3.1 Self-Organizing Maps -- 3.2 VMware vRealize Operations Manager -- 4 Proposed Approach -- 4.1 Workflow -- 4.2 SOM Implementation -- 4.3 Hierarchical Grouping -- 4.4 Alerting -- 5 Experimental Results -- 5.1 Multi-metric Analysis -- 5.2 Hyper-parameters Grid Search -- 5.3 Per-VNF Analysis -- 5.4 Hierarchical Grouping -- 5.5 Alerting -- 6 Conclusions -- References -- From DevOps to NoOps: Is It Worth It? -- 1 Introduction -- 2 Background -- 2.1 DevOps-Based Cloud Model -- 2.2 NoOps-Based Cloud Model -- 3 Methodology -- 3.1 Benchmarks -- 3.2 Deployment Strategies -- 3.3 Load Test Settings and Infrastructure -- 4 Results -- 4.1 Cinema Application -- 4.2 Primes-Python Function -- 4.3 Image-Processing Function -- 4.4 Nodeinfo Function -- 5 Discussion -- 6 Related Work -- 7 Conclusion -- 8 Availability -- References. 327 $aFuzzy Container Orchestration for Self-adaptive Edge Architectures -- 1 Introduction -- 2 Background Concepts and Technologies -- 2.1 Platform and Architecture Concepts -- 2.2 Self-adaptiveness and Fuzziness Concepts -- 2.3 Platform Tools and Technologies -- 2.4 Towards a Lightweight Edge Platform -- 3 Platform and Controller Architecture -- 3.1 Platform and Cluster Configuration -- 3.2 Platform Monitoring -- 4 A Fuzzy Auto-scaling Controller -- 4.1 Principles of Auto-scaling -- 4.2 The Fuzzy Service -- 4.3 Controller Calibration and Configuration -- 4.4 Continuous Auto-scaling -- 5 Controller Evaluation -- 5.1 Evaluation Objectives and Metrics -- 5.2 Evaluation Setup -- 5.3 Evaluation Implementation -- 5.4 Discussion of Results -- 6 Related Work -- 7 Conclusions -- References -- Performance Management in Clustered Edge Architectures Using Particle Swarm Optimization -- 1 Introduction -- 2 Principles of Particle Swarm Optimization -- 2.1 Particle Swarm Optimization Basics -- 2.2 Basic Algorithm Definitions -- 2.3 Population Generation -- 2.4 Selection of Primary Nodes -- 2.5 Evaluation of the Objective Function -- 2.6 Recording the Best Position -- 3 Performance Optimization for Clustered Architectures -- 3.1 Edge Request Management -- 3.2 Orchestration Controller Design -- 3.3 Performance Optimization -- 3.4 PSO-Based Performance Optimization -- 3.5 Algorithm Definition (Pseudocode) -- 4 Framework Implementation and Evaluation -- 4.1 Test Environment and Objectives -- 4.2 Definition of PSO and BAT Parameters -- 4.3 Comparison of Fitness Values -- 4.4 Scenario-Based Comparison: Overview -- 4.5 Scenario 1: Request Variation -- 4.6 Scenario 2: Edge Node Variation -- 4.7 Scenario 3: Iteration Variation -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Investigating IoT Application Behaviour in Simulated Fog Environments. 327 $a1 Introduction -- 2 Related Approaches in Fog-Cloud Simulation -- 3 Fog Modelling in Two Simulators -- 4 IoT Application Scenarios and Architecture Configuration for the Evaluation -- 5 Results of the First Evaluation Round -- 6 Further Analysis of the Investigated Simulators -- 7 The Second Evaluation Round -- 8 Result of the Third Evaluation Round -- 9 Conclusions -- References -- A Case for User-Defined Governance of Pure Edge Data-Driven Applications -- 1 Introduction -- 2 Community-Governed Services Model -- 2.1 Definition -- 2.2 System Model -- 2.3 Application Requirements -- 3 Case Study -- 4 Materials and Methods -- 4.1 Data Source -- 4.2 Simulation Model -- 4.3 Defining Trust Relationship -- 4.4 Experimental Design -- 4.5 Evaluation Metrics -- 5 Results and Discussion -- 5.1 Best Case Analysis: No Restrictions on Data Sharing -- 5.2 Analysis of Data Sharing Using Synthetic Social Network Restrictions -- 5.3 Analysis of Data Sharing Using Real Social Network Restrictions -- 6 Related Work -- 7 Conclusions -- References -- Cluster-Agnostic Orchestration of Containerised Applications -- 1 Introduction -- 2 Related Work -- 3 The TOSCA Specification -- 4 Analysis of Cluster Orchestrators -- 5 Achieving Cluster Interoperability -- 6 System Design and Implementation -- 6.1 Framework Architecture -- 6.2 YAML Parsing -- 6.3 BPMN Plans -- 6.4 Service Connectors -- 6.5 Prototype Implementation -- 7 Experiments -- 7.1 Use Case -- 7.2 Performance Evaluation -- 8 Conclusion -- References -- Self-healing in the Scope of Software-Based Computer and Mobile Networks -- 1 Introduction -- 2 Background -- 2.1 Fault Tolerance in the Data Plane -- 2.2 Fault Tolerance in the Control and Management Planes -- 2.3 Related Work -- 3 Self-healing Framework -- 3.1 Framework Architecture -- 3.2 Monitoring of Different Network Layers. 327 $a3.3 Recovery by Detection and Prediction. 410 0$aCommunications in Computer and Information Science 606 $aCloud computing$vCongresses 615 0$aCloud computing 676 $a004.6782 702 $aFerguson$b Donald$f1960- 702 $aHelfert$b Markus 702 $aPahl$b Claus 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996464438703316 996 $aCloud computing and services science$91891832 997 $aUNISA LEADER 01628oam 2200481zu 450 001 9910138924903321 005 20241212215803.0 010 $a9781509070411 010 $a1509070419 010 $a9781424448487 010 $a1424448484 035 $a(CKB)2400000000002691 035 $a(SSID)ssj0000452843 035 $a(PQKBManifestationID)12171149 035 $a(PQKBTitleCode)TC0000452843 035 $a(PQKBWorkID)10471772 035 $a(PQKB)10658944 035 $a(NjHacI)992400000000002691 035 $a(EXLCZ)992400000000002691 100 $a20160829d2009 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a2009 IEEE Workshop on Environmental, Energy, and Structural Monitoring Systems 210 31$a[Place of publication not identified]$cI E E E$d2009 215 $a1 online resource (109 pages) $cillustrations 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9781424448470 311 08$a1424448476 330 $a"The workshop aims to present and discuss the various technological, methodological and application aspects of complex monitoring systems."--Conference website. 606 $aEnvironmental monitoring$vCongresses 606 $aStructural health monitoring 615 0$aEnvironmental monitoring 615 0$aStructural health monitoring. 676 $a628.5 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a9910138924903321 996 $a2009 IEEE Workshop on Environmental, Energy, and Structural Monitoring Systems$92497603 997 $aUNINA LEADER 02172nam 2200349z- 450 001 9910872358203321 005 20250513225117.0 035 $a(CKB)5680000000476444 035 $a(EXLCZ)995680000000476444 100 $a20240716c2021uuuu -u- - 101 0 $ager 200 10$a"Ins Sprachdunkle" $eTheoriegeschichte der Unverständlichkeit 1870-1970 /$fFelix Christen 210 $cWallstein Verlag 311 08$a3-8353-5004-8 330 $a"Was unversta?ndlich ist, fordert das Verstehen heraus, setzt ihm aber auch Grenzen. Deshalb ist die Dunkelheit eines Wortes, eines Verses oder gar eines ganzen Textes seit der Antike ebenso ein Stein des Anstosses wie auch eine Einladung zum Denken. Nicht nur der konkreten Frage, was etwas Unversta?ndliches bedeutet, sondern auch der abstrakteren, was Unversta?ndlichkeit u?berhaupt heisst - wovon man spricht, wenn man von Unversta?ndlichkeit spricht -, gilt dann die Aufmerksamkeit. Diese Frage wird in der Moderne angesichts von Werken der Literatur und Kunst, die kaum mehr versta?ndlich scheinen, besonders dringlich. Ininsistenten Lektu?ren von Texten und Entwu?rfen Nietzsches, Heideggers, Adornos und Celans rekonstruiert Felix Christen die rhetorischen, hermeneutischen, a?sthetischen und poetologischen Kontexte der Reflexion von Unversta?ndlichkeit und zeigt, dass Unversta?ndlichkeit ein initiales Moment moderner Theoriebildung ist. Der Theoretisierung von Unversta?ndlichkeit wohnt dabei auch eine ethische Dimension inne, die bei Adorno, insbesondere aber bei Celan explizit wird."--Provided by publisher. 606 $aGerman philology 606 $aComprehension 606 $aPhilologie allemande 606 $aCompre?hension 606 $aComprehension$2fast$3(OCoLC)fst00871825 606 $aGerman philology$2fast$3(OCoLC)fst00941908 615 0$aGerman philology. 615 0$aComprehension. 615 6$aPhilologie allemande. 615 6$aCompre?hension. 615 7$aComprehension. 615 7$aGerman philology. 700 $aChristen$b Felix$f1977-$0236840 906 $aBOOK 912 $a9910872358203321 996 $a"Ins Sprachdunkle"$94269524 997 $aUNINA