Cristina L. Abad

ORCID: 0000-0002-9263-673X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Distributed and Parallel Computing Systems
  • Advanced Data Storage Technologies
  • Software System Performance and Reliability
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Social Sciences and Policies
  • Blockchain Technology Applications and Security
  • Data Mining Algorithms and Applications
  • Cloud Data Security Solutions
  • Distributed systems and fault tolerance
  • Scientific Computing and Data Management
  • Parallel Computing and Optimization Techniques
  • Accounting and Financial Management
  • Open Education and E-Learning
  • Anomaly Detection Techniques and Applications
  • Spanish Culture and Identity
  • IPv6, Mobility, Handover, Networks, Security
  • Internet Traffic Analysis and Secure E-voting
  • Data Stream Mining Techniques
  • Experimental Learning in Engineering
  • Domain Adaptation and Few-Shot Learning
  • Machine Learning and ELM

Escuela Superior Politecnica del Litoral
2015-2024

University of Messina
2023

Los Alamitos Medical Center
2023

University of St Andrews
2023

Universität Hamburg
2023

Hamburg University of Technology
2023

University of Ontario Institute of Technology
2023

ZHAW Zurich University of Applied Sciences
2022

Software (Spain)
2020

Pillar (Ukraine)
2020

Placing data as close possible to computation is a common practice of intensive systems, commonly referred the locality problem. By analyzing existing production we confirm benefit and find that have different popularity varying correlation accesses. We propose DARE, distributed adaptive replication algorithm aids scheduler achieve better locality. DARE solves two problems, how many replicas allocate for each file where place them, using probabilistic sampling competitive aging independently...

10.1109/cluster.2011.26 article EN 2011-09-01

Serverless computing shows good promise for efficiency and ease-of-use. Yet, there are only a few, scattered sometimes conflicting reports on questions such as 'Why do so many companies adopt serverless?', 'When serverless applications well suited?', 'How currently implemented?' To address these questions, we analyze 89 from open-source projects, industrial sources, academic literature, scientific - the most extensive study to date.

10.1109/ms.2020.3023302 article EN IEEE Software 2020-09-09

Over the last five years, all major cloud platform providers have increased their serverless offerings. Many early adopters report significant benefits for serverless-based over traditional applications, and many companies are considering moving to themselves. However, currently there exist only few, scattered, sometimes even conflicting reports on when applications well suited what best practices implementation are. We address this problem in present study about state of applications....

10.1109/tse.2021.3113940 article EN IEEE Transactions on Software Engineering 2021-09-21

The address resolution protocol (ARP) is used by computers to map network addresses (IP) physical (MAC). has proved work well under regular circumstances, but it was not designed cope with malicious hosts. By performing ARP cache poisoning or spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access sensitive information. Several schemes mitigate, detect prevent these attacks have been proposed, each its limitations. In this paper we analyze of...

10.1109/icdcsw.2007.19 article EN 2007-01-01

The rapid adoption and the diversification of cloud computing technology exacerbate importance a sound experimental methodology for this domain. This work investigates how to measure report performance in cloud, well research community is already doing it. We propose set eight important methodological principles that combine best-practices from nearby fields with concepts applicable only clouds, new ideas about time-accuracy trade-off. show these are using practical use-case experiment. To...

10.1109/tse.2019.2927908 article EN publisher-specific-oa IEEE Transactions on Software Engineering 2019-07-10

As a key part of the serverless computing paradigm, Function-as-a-Service (FaaS) platforms enable users to run arbitrary functions without being concerned about operational issues. However, there are several performance-related issues surrounding state-of-the-art FaaS that can deter widespread adoption FaaS, including sizeable overheads, unreliable performance, and new forms cost-performance trade-off. In this work we, SPEC RG Cloud Group, identify six challenges arise specifically in model,...

10.1145/3185768.3186308 article EN 2018-04-02

Serverless functions are an emerging cloud computing paradigm that is being rapidly adopted by both industry and academia. In this model, the provider opaquely handles resource management tasks such as provisioning, deployment, auto-scaling. The only task developers still in charge of selecting how much resources allocated to each worker instance. However, optimal size serverless quite challenging, so often neglect it despite its significant cost performance benefits. Existing approaches...

10.1145/3464298.3493398 article EN 2021-12-02

Dispelling the confusion around serverless computing by capturing its essential and conceptual characteristics.

10.1145/3587249 article EN Communications of the ACM 2023-08-23

Intrusion detection is an important part of networked-systems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with limitations under current techniques. Therefore, improved techniques are needed. We argue the need for correlating data among different logs improve intrusion systems accuracy. show how attacks reflected in and that some not evident when single log analyzed. present experimental results using anomaly virus Yaha....

10.1109/csac.2003.1254330 article EN 2004-07-08

This paper presents Natjam, a system that supports arbitrary job priorities, hard real-time scheduling, and efficient preemption for Mapreduce clusters are resource-constrained. Our contributions include: i) exploration evaluation of smart eviction policies jobs tasks, based on resource usage, task runtime, deadlines; ii) work-conserving mechanism Mapreduce. We incorporated Natjam into the Hadoop YARN scheduler framework (in 0.23). present experiments from deployments test cluster, Emulab...

10.1145/2523616.2523624 article EN 2013-10-01

A huge increase in data storage and processing requirements has lead to Big Data, for which next generation systems are being designed implemented. However, we have a limited understanding of the workloads Data systems. We consider case one common type cluster: cluster dedicated supporting mix MapReduce jobs. analyze 6-month traces from two large Hadoop clusters at Yahoo! characterize file popularity, temporal locality, arrival patterns workloads. identify several interesting properties...

10.1109/iiswc.2012.6402909 article EN 2012-11-01

Fast deployment and execution of cloud functions in Function-as-a-Service (FaaS) platforms is critical, for example, microservices architectures. However, that require large packages or libraries are bloated start slowly. An optimization to cache at the worker nodes instead bundling them with functions. existing FaaS schedulers vanilla load balancers, agnostic cached response prior function executions, cannot properly reap benefits package caching. We study case package-aware scheduling...

10.1109/ccgrid.2019.00042 article EN 2019-05-01

Microservices, containers, and serverless computing belong to a trend toward applications composed of many small, self-contained, automatically managed components. Core computing, function-as-a-service (FaaS) platforms employ state-of-the-art container technology microservices-based architectures enable users manage complex without the need for system-level expertise. Victim its own success, partially due proprietary technology, currently community has limited overview these platforms. To...

10.1109/mic.2019.2952061 article EN IEEE Internet Computing 2019-11-01

In only a decade, cloud computing has emerged from pursuit for service-driven information and communication technology (ICT), becoming significant fraction of the ICT market. Responding to growth market, many alternative services their underlying systems are currently vying attention users providers. To make informed choices between competing service providers, permit cost-benefit analysis cloud-based systems, enable system DevOps evaluate tune performance these complex ecosystems,...

10.1145/3236332 article EN ACM Transactions on Modeling and Performance Evaluation of Computing Systems 2018-08-25

Data locality is a fundamental problem to data-parallel applications where data-processing tasks consume different amounts of time and resources at locations. The especially prominent under stressed conditions such as hot spots. While replication based on data popularity relieves spots due contention for single file, caused by skewed node popularity, files co-located with each other, are more complex, unpredictable, hence difficult deal with. We propose Pandas, light-weight acceleration...

10.1109/tnet.2016.2606900 article EN IEEE/ACM Transactions on Networking 2016-10-04

We consider the problem of scheduling small cloud functions on serverless computing platforms. Fast deployment and execution these is critical, for example, microservices architectures. However, that require large packages or libraries are bloated start slowly. A solution to cache at worker nodes instead bundling them with functions. existing FaaS schedulers vanilla load balancers, agnostic any may have been cached in response prior function executions, cannot reap benefits package caching...

10.1145/3185768.3186294 article EN 2018-04-02

The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) physical (MAC). protocol has proved work well under regular circumstances, but it was not designed cope with malicious hosts. By performing ARP cache poisoning or spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access sensitive information. Several schemes mitigate, detect prevent these attacks have been proposed, each its limitations. In this paper we...

10.1109/lanoms.2009.5338799 article EN Latin American Network Operations and Management Symposium 2009-10-01

Efficient namespace metadata management is increasingly important as next-generation file systems are designed for peta and exascales. New schemes have been proposed, however, their evaluation has insufficient due to a lack of appropriate traces. Specifically, no Big Data storage system trace publicly available existing ones poor replacement. We studied traces one from Yahoo! note some the differences implications studies. discuss insufficiency approaches present first step towards...

10.1109/ucc.2012.27 article EN 2012-11-01

Despite the increase in university courses and curricula on ethics of computing there are few studies about how computer science (CS) programs should account for diverse ways ethical dilemmas approaches to situated cultural, philosophical, governance systems, religions, languages. We draw experiences insights 46 educators practitioners Latin America, South-Asia, Africa, Middle East, Australian First Nations who participated surveys interviews. Our modest study seeks prompt conversation...

10.1145/3608113 article EN ACM Journal on Computing and Sustainable Societies 2023-08-25

Multicasting at the IP layer has not been widely adopted due to a combination of technical and non-technical issues. End-system multicast (also called application-layer multicast) is an attractive alternative for reasons user management (set-up control) attack avoidance. Sessions can be established on demand such that there are no static points failure target in advance. In end-system multicast, overlay network built top available services packets multicasted application layer. The organized...

10.1117/12.539416 article EN Proceedings of SPIE, the International Society for Optical Engineering/Proceedings of SPIE 2004-07-19

Cloud computing providers offer a variety of pricing models, complicating the client decision, as no single model is cheapest in all scenarios. In addition, small to medium-sized organizations frequently lack personnel that can navigate intricacies each model, and result, end up opting for sub-optimal strategy, leading overpaying resources or not being able meet performance goals. this paper, we: (1) present results study shows that, Ecuador, considerable percentage companies choose...

10.1109/etcm.2017.8247460 article EN 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM) 2017-10-01

Serverless computing services, such as Function-as-a-Service (FaaS), hold the attractive promise of a high level abstraction and performance, combined with minimization operational logic. Several large ecosystems serverless platforms, both open- closed-source, aim to realize this promise. Consequently, lucrative market has emerged. However, performance trade-offs these systems are not well-understood. Moreover, it is exactly opaqueness operational-side that make evaluation studies platforms...

10.1145/3375555.3384381 article EN 2020-04-20

We present the design and implementation of VisFlowConnect, a powerful new tool for visualizing network traffic flow dynamics situational awareness. The visualization capability provided by VisFlowConnect allows an operator to assess state large complex given overall view entire filter/drill-down features with friendly user interface that users request more detailed information interest such as specific protocol flows. value specifically security awareness is any event, only few minor...

10.1109/pccc.2004.1395108 article EN IEEE International Conference on Performance, Computing, and Communications, 2004 2005-02-22
Coming Soon ...