{"id":"https://openalex.org/W3140348519","doi":"https://doi.org/10.1109/icin51074.2021.9385525","title":"Leveraging the serverless paradigm for realizing machine learning pipelines across the edge-cloud continuum","display_name":"Leveraging the serverless paradigm for realizing machine learning pipelines across the edge-cloud continuum","publication_year":2021,"publication_date":"2021-03-01","ids":{"openalex":"https://openalex.org/W3140348519","doi":"https://doi.org/10.1109/icin51074.2021.9385525","mag":"3140348519"},"language":"en","primary_location":{"id":"doi:10.1109/icin51074.2021.9385525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin51074.2021.9385525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020924832","display_name":"Efterpi Paraskevoulakou","orcid":"https://orcid.org/0000-0002-0542-5636"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Efterpi Paraskevoulakou","raw_affiliation_strings":["University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069674161","display_name":"Dimosthenis Kyriazis","orcid":"https://orcid.org/0000-0001-7019-7214"},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Dimosthenis Kyriazis","raw_affiliation_strings":["University of Piraeus, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"University of Piraeus, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020924832"],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":3.0296,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.92173141,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"110","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8160635232925415},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7742506861686707},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6907886862754822},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6731415390968323},{"id":"https://openalex.org/keywords/workflow","display_name":"Workflow","score":0.5598868131637573},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.5549050569534302},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.538884162902832},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.5209671258926392},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5087459683418274},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5010454654693604},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.35134148597717285},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3328184485435486},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.22920092940330505},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21113505959510803}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8160635232925415},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7742506861686707},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6907886862754822},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6731415390968323},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.5598868131637573},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.5549050569534302},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.538884162902832},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.5209671258926392},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5087459683418274},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5010454654693604},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.35134148597717285},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3328184485435486},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.22920092940330505},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21113505959510803},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icin51074.2021.9385525","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icin51074.2021.9385525","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 24th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6399999856948853}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1572499759","https://openalex.org/W2148143831","https://openalex.org/W2519706319","https://openalex.org/W2591324491","https://openalex.org/W2626970695","https://openalex.org/W2734791431","https://openalex.org/W2735380434","https://openalex.org/W2738972230","https://openalex.org/W2792643794","https://openalex.org/W2902240649","https://openalex.org/W2918828872","https://openalex.org/W2920834220","https://openalex.org/W2963551995","https://openalex.org/W2963988417","https://openalex.org/W2995419643","https://openalex.org/W3005390470","https://openalex.org/W3005926919","https://openalex.org/W4289293306","https://openalex.org/W6634384834","https://openalex.org/W6765483917","https://openalex.org/W6773360655"],"related_works":["https://openalex.org/W2020017125","https://openalex.org/W2364921833","https://openalex.org/W2385146268","https://openalex.org/W1596010778","https://openalex.org/W2744277773","https://openalex.org/W2899407724","https://openalex.org/W1969164381","https://openalex.org/W4385730917","https://openalex.org/W1767718647","https://openalex.org/W2490975221"],"abstract_inverted_index":{"The":[0,90,191],"exceedingly":[1],"exponential-growing":[2],"data":[3,24,150,222],"rate":[4],"highlighted":[5],"numerous":[6],"requirements":[7],"and":[8,20,34,56,63,88,140,157,216,234,238],"several":[9],"approaches":[10],"have":[11,113],"been":[12],"released":[13],"to":[14,31,60,108,116,170],"maximize":[15],"the":[16,45,48,51,57,70,75,83,106,114,121,125,132,134,145,149,154,172,184,220,227,230],"added-value":[17],"of":[18,53,78,86,92,127,160,174,200,205,229],"cloud":[19],"edge":[21],"resources.":[22],"Whereas":[23],"scientists":[25],"utilize":[26],"algorithmic":[27],"models":[28],"in":[29,124],"order":[30],"transform":[32],"datasets":[33],"extract":[35],"actionable":[36],"knowledge,":[37],"a":[38,95,101,178,241],"key":[39],"challenge":[40],"is":[41,98],"oriented":[42],"towards":[43],"abstracting":[44,143],"underline":[46],"layers:":[47],"ones":[49,58,202],"enabling":[50,82],"management":[52],"infrastructure":[54,135],"resources":[55,136],"responsible":[59],"provide":[61],"frameworks":[62],"components":[64],"as":[65,74,94,100,177,211],"services.":[66,89],"In":[67],"this":[68],"sense,":[69],"serverless":[71,110,189],"approach":[72,169,193,231],"features":[73],"novel":[76],"paradigm":[77],"new":[79],"cloud-related":[80],"technology,":[81],"agile":[84],"implementation":[85],"applications":[87,119],"concept":[91],"Function":[93],"Service":[96,179],"(FaaS)":[97],"introduced":[99],"revolutionary":[102],"model":[103],"that":[104,198],"offers":[105],"means":[107],"exploit":[109],"offerings.":[111],"Developers":[112],"potential":[115],"design":[117],"their":[118],"with":[120],"necessary":[122],"scalability":[123],"form":[126],"nanoservices":[128],"without":[129],"addressing":[130],"themselves":[131],"way":[133],"should":[137],"be":[138],"deployed":[139],"managed.":[141],"By":[142],"away":[144],"underlying":[146],"hardware":[147],"allocations,":[148],"scientist":[151],"concentrates":[152],"on":[153],"business":[155],"logic":[156],"critical":[158],"problems":[159],"Machine":[161],"Learning":[162],"(ML)":[163],"algorithms.":[164],"This":[165],"paper":[166],"introduces":[167],"an":[168],"realize":[171],"provision":[173],"ML":[175,206],"Functions":[176],"(i.e.,":[180],"ML-FaaS),":[181],"by":[182],"exploiting":[183,240],"Apache":[185],"OpenWhisk":[186],"event-driven,":[187],"distributed":[188],"platform.":[190],"presented":[192],"tackles":[194],"also":[195,225],"composite":[196],"services":[197],"consist":[199],"single":[201],"i.e.,":[203],"workflows":[204],"tasks":[207],"including":[208],"processes":[209],"such":[210],"aggregation,":[212],"cleaning,":[213],"feature":[214],"extraction,":[215],"analytics;":[217],"thus,":[218],"reflecting":[219],"complete":[221],"path.":[223],"We":[224],"illustrate":[226],"operation":[228],"mentioned":[232],"above":[233],"assess":[235],"its":[236],"performance":[237],"effectiveness":[239],"holistic,":[242],"end-toend":[243],"anti-fraud":[244],"detection":[245],"machine":[246],"learning":[247],"pipeline.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
