Multiaccess edge computing (MEC) service migration is a technology whose key objective is to support ultralow-latency access to services. However, the complex ultralarge-scale edge service migration problem requires extensive research efforts, regarding the foreseen ultradensified edge nodes in 5G and beyond. In this article, we propose a novel dynamic service migration optimization architecture for ultralarge-...
Standardization organizations, such as the European Telecommunications Standards Institute (ETSI), have been gathering efforts to specify the Edge Computing paradigm. However, there is still a lack of complete, interface-wise, actual implementations and evaluations of a fully functional Edge Computing architecture. On these grounds, the work presented in this paper proposes a new Multi-access Edge Computing (ME...
5G technologies provide several advancements regarding low latency and high bandwidth network scenarios, thus enabling new vertical use cases. Nonetheless, the lack of testing and validation mechanisms for NFV-based services poses a severe challenge in reducing their time to market. In this work we showcase a service to automate the validation of 5G NetApps, thus striving towards reducing the time to market of ...
Recent research showed that heating, ventilation and air conditioning systems consume a considerable amount of electricity when compared with the remaining household appliances. Therefore, efficient use of solar energy on these appliances in combination with the Internet of Things (IoT) platforms became a well-researched topic, especially when storage units like batteries are out of option. In this context, the...
As the research community inclines toward adopting increasingly complex techniques for future networks, and simple methods are often ignored, being labeled as trivial. In this paper, we argue that simple methods can sometimes outperform more sophisticated ones. We demonstrate that by evaluating two prediction mechanisms to forecast mobile user's handovers exploiting user-network association patterns. We perform...
Reinforcement Learning has seen some interesting development over the last years, which made it very attractive to use on recommendation scenarios. In this work, we have extended the previously developed pervasive system, which is aware of the conversational context to suggest documents potentially useful to the users, with the ability to use users’ click data as a way to perform better suggestions over time, t...
Heating appliances consume approximately 48% of the energy spent on household appliances every year. Furthermore, a malfunctioning device can increase the cost even further. Thus, there is a need to create methods that can identify the equipment’s malfunctions and eventual failures before they occur. This is only possible with a combination of data acquisition, analysis and prediction/forecast. This paper prese...
As data become an increasingly important asset for organizations, so does the access control policies that protect aforesaid data. Many subjects (public, researchers, etc.) are interested in accessing these data, leading to the desire for simple access control. However, some scenarios use vague concepts, such as the “researcher’s expertise”, when making access control decisions. Therefore, access control models...
The new communication paradigm established by social media along with its growing popularity in recent years contributed to attract an increasing interest of several research fields. One such research field is the field of event detection in social media. The contribution of this article is to implement a system to detect newsworthy events in Twitter. The proposed pipeline first splits the tweets into segments....
Heating appliances such as HVAC systems consume around 48% of the energy power spent on household appliances every year. With this in mind, it is relevant to increase the efficiency of those solutions. Moreover, a malfunctioning device can increase this value even further. Thus, there is a need to develop methods that allow the identification of eventual failures before they occur. This is only achievable when ...