(Research) Insights for Serverless Application Engineering
نویسندگان
چکیده
Presents summaries of articles included in this issue the publication.
منابع مشابه
fabricating electrospun poly(3-hydroxybutyrate)/hydroxyapatite nanocomposite scaffold for tissue engineering application
. در رســاله ی حاضر، ابتدا داربست نانوالیاف سه بعدی متخلخل به روش الگوبرداری تصویری شبیه سازی شد. با استفاده از طراحی آزمایش به روش تاگوچی پس از ساخت داربست های پلی (3- هیدروکسی بوتیرات) (p3hb) شناسایی رفتار پارامترهای موادی مثل لزجت سیال پلیمر، فراریت و رسانایی الکتریکی محلول پلیمری و پارامترهای دستگاهی مثل دبی حجمی سیال، ولتاژ الکتریکی و فاصله نازل تا جمع کننده صورت گرفت. بعد از محاسبه ی خصوص...
Typed Computational Email for Serverless Distributed Applications
Peer agents are executable object-oriented email components exchanged between users as a basis of communication for distributed applications. Peer agents, which we implement, are strongly typed and are dispatched to user-installable trusted handlers based on their type. The type mechanism provides the flexible trust management needed to implement secure distributed distributed applications over...
متن کاملServerless Network File Systems
The paper presents a design for serverless network file system that can dynamically distribute control processing, data storage and caching among a set of cooperating workstations. The aim is to improve performance, scalability and availablility of such a peer-based distributed system. The approach adopted in this paper is to build a monolithic system that handles all aspects of storage, cachin...
متن کاملChallenges of Action Research: Insights From Language Institutes
Action research is a small-scale intervention in the functioning of the real world to address practitioners’ own issues and carry out a close examination of the effects of such an intervention. Classroom-based research, or action research, can be the viable solution to some pandemic academic sluggishness and scientific apathy. However, the erroneous impression that research is an elite discipli...
متن کاملServerless Search and Authentication Protocols for RFID
With the increasing popularity of RFID applications, different authentication schemes have been proposed to provide security and privacy protection to users. Most recent RFID protocols use a central database to store the RFID tag data. An RFID reader first queries the RFID tag and returns the reply to the database. After authentication, the database returns the tag data to the reader. In this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Software
سال: 2021
ISSN: ['0740-7459', '1937-4194']
DOI: https://doi.org/10.1109/ms.2020.3028659