Radu Prodan

Radu Prodan
Alpen-Adria-Universität Klagenfurt · Institute of Information Technology

Professor

About

363
Publications
80,075
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
7,868
Citations
Additional affiliations
August 2004 - present
University of Innsbruck
Position
  • Professor (Associate)

Publications

Publications (363)
Preprint
Full-text available
This paper analyzes the timing performance of a persistent storage designed for distributed container-based architectures in industrial control applications. The storage ensures data availability and consistency while accommodating faults. The analysis considers four aspects: 1) placement strategy, 2) design options, 3) data size, and 4) evaluation...
Chapter
Cloud storage adoption has increased over the years as more and more data has been produced with particularly high demand for fast processing and low latency. To meet the users’ demands and to provide a cost-effective solution, cloud service providers (CSPs) have offered tiered storage; however, keeping the data in one tier is not a cost-effective...
Article
The emerging concept of big data pipelines provides relevant solutions and is one of the main enablers of telemedicine. We present a data pipeline for remote patient monitoring and show a real-world example of how data pipelines help address the stringent requirements of telemedicine.
Article
Full-text available
Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing democratic and trustworthy news relying on ordinary citizens arriving at breaking news locations and capturing relevant vide...
Chapter
Service discovery is a vital process that enables low latency provisioning of Internet of Things (IoT) applications across the computing continuum. Unfortunately, it becomes increasingly difficult to identify a proper service within strict time constraints due to the high heterogeneity of the computing continuum. Moreover, the plethora of network t...
Article
Full-text available
The article discusses the emerging non-von Neumann computer architectures and their integration in the computing continuum for supporting modern distributed applications, including artificial intelligence, big data, and scientific computing. It provides a detailed summary of the available and emerging non-von Neumann architectures, which range from...
Article
As part of TIV's DHW on Vehicle 5.0, this letter introduces a novel concept, Logistics 5.0, to address high complexities in logistics Cyber-Physical-Social Systems (CPSS). Building upon the theory of parallel intelligence and leveraging advanced technologies and methods such as blockchain, scenarios engineering, Decentralized Autonomous Organizatio...
Article
Full-text available
Fog computing platforms became essential for deploying low-latency applications at the network's edge. However, placing and managing time-critical applications over a Fog infrastructure with many heterogeneous and resource-constrained devices over a dynamic network is challenging. This paper proposes an incremental multilayer resource-aware partiti...
Article
Full-text available
Although telemedicine has emerged as an everyday necessity for health monitoring, still current solutions are built for a small number of patients or use sensors that do not stream data with high velocity and volume. In this article, we explore a novel architecture for distributing health monitoring computations over distributed cloud regions, both...
Conference Paper
Full-text available
The accelerating growth of modern distributed applications with low delivery deadlines leads to a paradigm shift towards the multi-tier computing continuum. However, the geographical dispersion, heterogeneity, and availability of the continuum resources may result in failures and quality of service degradation, significantly negating its advantages...
Conference Paper
Full-text available
5G and 6G networks are expected to support various novel emerging adaptive video streaming services (e.g., live, VoD, immersive media, and online gaming) with versatile Quality of Experience (QoE) requirements such as high bitrate, low latency, and sufficient reliability. It is widely agreed that these requirements can be satisfied by adopting emer...
Preprint
Full-text available
Host load prediction is essential for dynamic resource scaling and job scheduling in a cloud computing environment. In this context, workload prediction is challenging because of several issues. First, it must be accurate to enable precise scheduling decisions. Second, it must be fast to schedule at the right time. Third, a model must be able to ac...
Preprint
Full-text available
Media production and consumption behaviors are changing in response to new technologies and demands, giving birth to a new generation of social applications. Among them, crowd journalism represents a novel way of constructing democratic and trustworthy news relying on ordinary citizens arriving at breaking news locations and capturing relevant vide...
Article
Full-text available
Big data pipelines are developed to process data characterized by one or more of the three big data features, commonly known as the three Vs (volume, velocity, and variety), through a series of steps (e.g., extract, transform, and move), making the ground work for the use of advanced analytics and ML/AI techniques. Computing continuum (i.e., cloud/...
Article
Full-text available
Purpose: The gap between software development requirements and the available resources of software developers continues to widen. This requires changes in the development and organization of software development. Objectives: Presented is a model introducing a quantitative software development management methodology that estimates the relative impor...
Conference Paper
Full-text available
Video streaming is the dominating traffic in today's data-sharing world. Media service providers stream video content for their viewers, while worldwide users create and distribute videos using mobile or video system applications that significantly increase the traffic share. We propose a multilayer and pipeline encoding on the computing continuum...
Conference Paper
Many researchers migrate scientific serverless workflows or function choreographies (FCs) on Function-as-a-Service (FaaS) to benefit from its high scalability and elasticity. Unfortunately, the heterogeneity of federated FaaS hampers decisions on appropriate parameter setup to run FCs. Consequently, scientists must choose between accurate but tedio...
Article
The computing continuum enables new opportunities for managing big data pipelines concerning efficient management of heterogeneous and untrustworthy resources. We discuss the big data pipelines lifecycle on the computing continuum and its associated challenges, and we outline a future research agenda in this area.
Preprint
Full-text available
Blockchain (BC) technology provides a secure distributed transactional database, that can enhance the security and privacy of decentralized systems and applications, e.g. distributed identity, supply chain and Internet of Things (IoT). The most known secure consensus mechanism for permissionless BCs is the Proof-of-Wok (PoW) algorithm. Many argue t...
Preprint
Full-text available
Blockchain (BC) technology provides a secure distributed transactional database, that can enhance the security and privacy of decentralized systems and applications, e.g. distributed identity, supply chain and Internet of Things (IoT). The most known secure consensus mechanism for permissionless BCs is the Proof-of-Wok (PoW) algorithm. Many argue t...
Article
Full-text available
The introduction of electronic personal health records (EHRs) enables nationwide information exchange and curation among different health-care systems. However, current EHR systems are centrally orchestrated, which could potentially lead to a single point of failure.
Preprint
Full-text available
The introduction of electronic personal health records (EHR) enables nationwide information exchange and curation among different health care systems. However, the current EHR systems do not provide transparent means for diagnosis support, medical research or can utilize the omnipresent data produced by the personal medical devices. Besides, the EH...
Article
Full-text available
Online social media enables low cost, easy access, rapid propagation, and easy communication of information, including spreading low-quality fake news. Fake news has become a huge threat to every sector in society, and resulting in decrements in the trust quotient for media and leading the audience into bewilderment. In this paper, we proposed a ne...
Preprint
Hybrid on/off-blockchain vehicle data management approaches have received a lot of attention in recent years. However, there are various technical challenges remained to deal with. In this paper we relied on real-world data from Austria to investigate the effects of connectivity on the transport of personal protective equipment. We proposed a three...
Chapter
Social media platforms are becoming increasingly popular and essential for next-generation connectivity. However, the emergence of social media also poses critical trust challenges due to the vast amount of created and propagated content. This paper proposes a data-driven tool called SMART for trust and reputation management based on community enga...
Article
Full-text available
HTTP Adaptive Streaming (HAS) of video content is becoming an undivided part of the Internet and accounts for most of today's network traffic. Video compression technology plays a vital role in efficiently utilizing network channels, but encoding videos into multiple representations with selected encoding parameters is a significant challenge. Howe...
Conference Paper
Full-text available
Contemporary control processes and methods in multi-scale, cyber-physical systems require precise data collection at various levels, timely transmission, and analysis involving large number of computing and storage elements connected within high-performance permissioned consensus networks. For example, in transport networks, resources tend to form...
Article
Full-text available
With the advancement in technology and the exponential growth of mobile devices, network traffic has increased manifold in cellular networks. Due to this reason, latency reduction has become a challenging issue for mobile devices. In order to achieve seamless connectivity and minimal disruption during movement, latency reduction is crucial in the h...
Conference Paper
Full-text available
HTTP adaptive video streaming is a widespread and sought-after technology on the Internet that allows clients to dynamically switch between different stream qualities presented in the bitrate ladder to optimize overall received video quality. Currently, there exist several approaches of different complexity for building such a ladder. The simplest...
Article
Full-text available
The execution of complex distributed applications in exascale systems faces many challenges, as it involves empirical evaluation of countless code variations and application run-time parameters over a heterogeneous set of resources. To mitigate these challenges, the research field of autotuning has gained momentum. The autotuning automates identify...
Article
Full-text available
Employing general-purpose graphics processing units (GPGPU) with the help of OpenCL has resulted in greatly reducing the execution time of data-parallel applications by taking advantage of the massive available parallelism. However, when a small data size application is executed on GPU there is a wastage of GPU resources as the application cannot f...
Conference Paper
Full-text available
The unprecedented pace of technological development in smart systems, incorporating sensing, actuation, and control functions, have the following properties and needs: (𝑖) they are interconnected and need scalable, virtualized resources to run, store and process data, (𝑖𝑖) they are mobile and can potentially access and build on user data made avail...
Article
Full-text available
HTTP adaptive streaming of video content becomes an integrated part of the Internet and dominates other streaming protocols and solutions. The duration of creating video content for adaptive streaming ranges from seconds or up to several hours or days, due to the plethora of video transcoding parameters and video source types. Although, the computi...
Conference Paper
Full-text available
The ADAPT project started during the most critical phase of the COVID-19 outbreak in Europe when the demand for Personal Protective Equipment (PPE) from each country's healthcare system surpassed national stock amounts. Due to national shutdowns, reduced transport logistics, and containment measures on the federal and provincial levels, the authori...
Article
Full-text available
The Edge computing extension of the Cloud services towards the network boundaries raises important placement challenges for IoT applications running in a heterogeneous environment with limited computing capacities. Unfortunately, existing works only partially address this challenge by optimizing a single or aggregate objective (e.g., response time)...
Chapter
The push for agile pandemic analytic solutions has attained development-stage software modules of applications instead of functioning as full-fledged production-stage applications – i.e., performance, scalability, and energy-related concerns are not optimized for the underlying computing domains. And while the research continues to support the idea...
Preprint
Full-text available
Video streaming became an undivided part of the Internet. To efficiently utilize the limited network bandwidth it is essential to encode the video content. However, encoding is a computationally intensive task, involving high-performance resources provided by private infrastructures or public clouds. Public clouds, such as Amazon EC2, provide a lar...
Chapter
Full-text available
This article proposes an approach to the problem of computational capacities analysis of the computing continuum via theoretical framework of equilibrium phase-transitions and numerical simulations. We introduce the concept of phase transitions in computing continuum and show how this phenomena can be explored in the context of workflow makespan, w...
Article
Peak mitigation is of interest to power companies as peak periods may require the operator to over provision supply in order to meet the peak demand. Flattening the usage curve can result in cost savings, both for the power companies and the end users. Integration of renewable energy into the energy infrastructure presents an opportunity to use exc...
Preprint
Full-text available
Fog computing emerged as a crucial platform for the deployment of IoT applications. The complexity of such applications requires methods that handle the resource diversity and network structure of Fog devices while maximizing the service placement and reducing resource wastage. Prior studies in this domain primarily focused on optimizing specific a...
Preprint
Full-text available
Latency-sensitive and bandwidth-intensive stream processing applications are dominant traffic generators over the Internet network. A stream consists of a continuous sequence of data elements, which require processing in nearly real-time. To improve communication latency and reduce the network congestion, Fog computing complements the Cloud service...
Article
Full-text available
Social media applications are essential for next generation connectivity. Today, social media are centralized platforms with a single proprietary organization controlling the network and posing critical trust and governance issues over the created and propagated content. The ARTICONF project [1] funded by the European Union’s Horizon 2020 program r...
Article
Full-text available
Social media is a popular medium for the dissemination of real-time news all over the world. Easy and quick information proliferation is one of the reasons for its popularity. An extensive number of users with different age groups, gender, and societal beliefs are engaged in social media websites. Despite these favorable aspects, a significant disa...
Conference Paper
Full-text available
Fog computing emerged as a crucial platform for the deployment of IoT applications. The complexity of such applications require methods that handle the resource diversity and network structure of Fog devices, while maximizing the service placement and reducing the resource wastage. Prior studies in this domain primarily focused on optimizing applic...
Article
Full-text available
COVID-19 (also known as SARS-COV-2) pandemic has spread in the entire world. It is a contagious disease that easily spreads from one person in direct contact to another, classified by experts in five categories: asymptomatic, mild, moderate, severe, and critical. Already more than 66 million people got infected worldwide with more than 22 million a...
Article
Full-text available
Automated bank cheque verification using image processing is an attempt to complement the present cheque truncation system, as well as to provide an alternate methodology for the processing of bank cheques with minimal human intervention. When it comes to the clearance of the bank cheques and monetary transactions, this should not only be reliable...
Preprint
The computing continuum extends the high-performance cloud data centers with energy-efficient and low-latency devices close to the data sources located at the edge of the network. However, the heterogeneity of the computing continuum raises multiple challenges related to application management. These include where to offload an application - from t...
Article
The computing continuum extends the high-performance cloud data centers with energy-efficient and low-latency devices close to the data sources located at the edge of the network. However, the heterogeneity of the computing continuum raises multiple challenges related to application management. These include where to offload an application – from t...