SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:2575 4912 OR L773:9781665415262 "

Sökning: L773:2575 4912 OR L773:9781665415262

  • Resultat 1-5 av 5
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Conceicao, Filipe, et al. (författare)
  • Empowering industry 4.0 and autonomous drone scouting use cases through 5G-DIVE solution
  • 2021
  • Ingår i: 2021 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2021. - 2575-4912. - 9781665415262 ; , s. 265-270
  • Konferensbidrag (refereegranskat)abstract
    • The 5G Edge Intelligence for Vertical Experimentation (5G-DIVE) project aims at demonstrating the technical merits and business value proposition of 5G technologies in two vertical pilots, namely the Industry 4.0 (I4.0) and Autonomous Drones Scout (ADS) pilots. This paper presents an overview of the overall 5G-DIVE solution and reports the results of the initial validation campaign of the selected use case, featuring 5G connectivity, distributed Edge computing, and artificial intelligence. The initial results for the I4.0 provide a baseline for next step validation campaign targeting a broader scale 5G implementation, while the ADS results provides promising results for enhancing the autonomous navigation in real-time.
  •  
2.
  • Pettersson, K., et al. (författare)
  • AI-based enhancement of access and mobility procedures in cellular networks : An experimental study
  • 2021
  • Ingår i: 2021 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2021. - : IEEE. - 9781665415262 ; , s. 454-459
  • Konferensbidrag (refereegranskat)abstract
    • The 5G wireless networks support diverse use-cases particularly ultra-reliable low-latency communications (URLLC). One of the key challenges in supporting URLLC services is to enhance the performance of the random access procedure to guarantee the stringent latency requirements. This is not only challenging for URLLC services but any delay sensitive services like voice over LTE (VoLTE) or voice over New Radio (VoNR). The access and mobility procedures rely on the random access procedure. Enhancing this procedure using artificial intelligence can thus support even more stringent latency requirements. In this paper, we present an experimental study aiming at performance evaluation of the access and mobility procedures based on an experimentation and data collection from the Monroe platform. We study the main causes of the delay induced to the access and mobility procedures, and evaluate machine learning based techniques to classify different procedures in terms of experienced delay and failure. Such results take step towards enabling the User Equipment (UE) to take appropriate actions for coping with predicted sub-optimal access or mobility procedures.
  •  
3.
  • Tonini, Federico, 1990, et al. (författare)
  • A Service-Aware Autoscaling Strategy for Container Orchestration Platforms with Soft Resource Isolation
  • 2023
  • Ingår i: 2023 JOINT EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS & 6G SUMMIT, EUCNC/6G SUMMIT. - 2575-4912 .- 2475-6490. - 9798350311020 ; , s. 454-459
  • Konferensbidrag (refereegranskat)abstract
    • Container orchestration platforms like Kubernetes (K8s) allow easy deployment and management of cloud native services. When deploying their services, service providers need to specify a proper amount of resources to K8s, so that the desired Quality of Service (QoS) to their users can be maintained. To cope with the varying traffic demand coming from users, they can rely on the K8s Horizontal Pod Autoscaling (HPA) mechanism. To ensure that enough resources are available when needed, the standard HPA mechanism relies on resource overprovisioning. In this way, the required QoS is achieved most of (or all) the time but at the expense of additional resources that are allocated (and charged for), while they may stay idle for significant periods of time. A way to reduce overprovisioning is provided by the soft resource isolation of K8s, which allows services to compensate for a temporary lack of resources with shared resources, i.e., idle resources of the machines where services are running. However, during traffic spikes, these idle resources may not be enough to serve the whole demand, degrading the QoS. The HPA, which is not aware of how much demand could not be served, is not always able to correctly estimate the required additional resources, further degrading the QoS. To overcome this, service providers need to leverage overprovisioning, limiting the use of shared resources. In this paper, we propose a novel mechanism for autoscaling resources in K8s that relies on service-related data to avoid the additional degradation introduced by the HPA. The proposed strategy also offers a way to tune overprovisioning and shared resources. Simulation results show that our approach can reduce idle resources by up to 60% compared with the HPA mechanism.
  •  
4.
  • Vilalta, Ricard, et al. (författare)
  • TeraFlow: Secured autonomic traffic management for a tera of SDN flows
  • 2021
  • Ingår i: 2021 Joint European Conference on Networks and Communications and 6G Summit, EuCNC/6G Summit 2021. - 9781665415262 ; , s. 377-382
  • Konferensbidrag (refereegranskat)abstract
    • TeraFlow proposes a new type of secure, cloud-native Software Defined Networking (SDN) controller that will radically advance the state-of-the-art in beyond 5G networks by introducing novel micro-services architecture, and provide revolutionary features for both flow management (service layer) and optical/microwave network equipment integration (infras-tructure layer) by adapting new data models. TeraFlow will also incorporate security using Machine Learning (ML) and forensic evidence for multi-tenancy based on Distributed Ledgers. Finally, this new SDN controller shall be able to integrate with the current Network Function Virtualization (NFV) and Multi-access Edge Computing (MEC) frameworks as well as to other networks. The target pool of TeraFlow stakeholders expands beyond the traditional telecom operators towards edge and hyperscale cloud providers.
  •  
5.
  • Selander, Lisen, et al. (författare)
  • Cynicism as user resistance in IT implementation
  • 2012
  • Ingår i: Information Systems Journal. - : Wiley. - 1350-1917 .- 1365-2575. ; 22:4, s. 289-312
  • Tidskriftsartikel (refereegranskat)abstract
    • In this paper, we examine the process by which user cynicism emerges and is constituted as part of resistance in information technology (IT) implementation. We ground our process perspective in the received user resistance literature by linking cynicism to users' projections of the system's future use. Rather than attributing cynicism to perceived threats, however, we see user cynicism as cognitively distanced resistance that manifests as a perception of seeing through the espoused goals of the implementers. Based on a process analysis of a customer relationship management implementation at a customer service centre, the paper extends the user resistance model proposed by Lapointe and Rivard by identifying three dimensions of user cynicism in IT implementation. It also shows how cynicism, as a form of passive resistance, easily escalates and feeds new forms of resistance. Lastly, we introduce the cynicism literature as a new reference theory for the Information Systems (IS) audience. © 2011 Blackwell Publishing Ltd.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-5 av 5

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy