@article{58472,
  abstract     = {{The “kill chain”—involving the analysis of data by human users of military technologies, the understanding of that data, and human decisions—has fast been replaced by the “kill cloud” that necessitates, allows, and exacerbates increased thirst for domination, violence against distant populations, and a culture of experimentation with human lives. This commentary reports an interdisciplinary discussion organised by the Disruption Network Lab that brought together whistleblowers, artists, and experts investigating the impact of artificial intelligence and other emerging technologies on networked warfare. Exposing the problematics of networked warfare and the kill cloud, their colonial overtones, effects on human subjects in real life, erroneous scientific rationalities, and the (business) practices and logics that enable this algorithmic machinery of violence. The conference took place from the 29th of November to the 1st of December 2024 at the Kunstquartier Bethanien in Berlin, Germany.}},
  author       = {{Bhila, Ishmael}},
  issn         = {{2662-1975}},
  journal      = {{Digital War}},
  keywords     = {{autonomous weapons systems, algorithmic warfare, cloud computing, war on terror}},
  number       = {{4}},
  publisher    = {{Springer Science and Business Media LLC}},
  title        = {{{Investigating the kill cloud: information warfare, autonomous weapons & AI}}},
  doi          = {{10.1057/s42984-025-00101-x}},
  volume       = {{6}},
  year         = {{2025}},
}

@inproceedings{17667,
  abstract     = {{Resolving distributed attacks benefits from collaboration between networks. We present three approaches for the same multi-domain defensive action that can be applied in such an alliance: 1) Counteract Everywhere, 2) Minimize Countermeasures, and 3) Minimize Propagation. First, we provide a formula to compute efficiency of a defense; then we use this formula to compute the efficiency of the approaches under various circumstances. Finally, we discuss how task execution order and timing influence defense efficiency. Our results show that the Minimize Propagation approach is the most efficient method when defending against the chosen attack.}},
  author       = {{Koning, Ralph and Polevoy, Gleb and Meijer, Lydia and de Laat, Cees and Grosso, Paola}},
  booktitle    = {{2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)}},
  issn         = {{null}},
  keywords     = {{computer network security, multinetwork environments, multidomain defensive action, task execution order, timing influence defense efficiency, distributed attacks, collaborative security defence approach, minimize propagation approach, minimize countermeasure approach, counteract everywhere approach, Conferences, Cloud computing, Computer crime, Edge computing, Security, Defense Approaches, Multi-Domain Defense, Collaborative Defense, Defense Algorithms, Computer Networks}},
  pages        = {{113--123}},
  title        = {{{Approaches for Collaborative Security Defences in Multi Network Environments}}},
  doi          = {{10.1109/CSCloud/EdgeCom.2019.000-9}},
  year         = {{2019}},
}

@inproceedings{9809,
  abstract     = {{Remarkable advantages of Containers (CNs) over Virtual Machines (VMs) such as lower overhead and faster startup has gained the attention of Communication Service Providers (CSPs) as using CNs for providing Virtual Network Functions (VNFs) can save costs while increasing the service agility. However, as it is not feasible to realise all types of VNFs in CNs, the coexistence of VMs and CNs is proposed. To put VMs and CNs together, an orchestration framework that can chain services across distributed and heterogeneous domains is required. To this end, we implemented a framework by extending and consolidating state-of-the-art tools and technologies originated from Network Function Virtualization (NFV), Software-defined Networking (SDN) and cloud computing environments. This framework chains services provisioned across Kubernetes and OpenStack domains. During the demo, we deploy a service consist of CN- and VM-based VNFs to demonstrate different features provided by our framework.}},
  author       = {{Razzaghi Kouchaksaraei, Hadi and Karl, Holger}},
  booktitle    = {{13th ACM International Conference on Distributed and Event-based Systems}},
  keywords     = {{Network Function Virtualization, Software-defined Networking, Cloud Computing, service orchestration, OpenStack, Kubernetes}},
  location     = {{Darmstadt}},
  title        = {{{Service Function Chaining Across OpenStack and Kubernetes Domains}}},
  doi          = {{10.1145/3328905.3332505}},
  year         = {{2019}},
}

@inproceedings{13292,
  abstract     = {{Building on 5G and network function virtualization (NFV), smart manufacturing has the potential to drastically increase productivity, reduce cost, and introduce novel, flexible manufacturing services. Current work mostly focuses on high-level scenarios or emulation-based prototype deployments. 

Extending our previous work, we showcase one of the first cloud-native 5G verticals focusing on the deployment of smart manufacturing use cases on production infrastructure. In particular, we use the 5GTANGO service platform to deploy our developed network services on Kubernetes. For this demo, we implemented a series of cloud-native virtualized network functions (VNFs) and created suitable service descriptors. Their light-weight, stateless deployment on Kubernetes enables quick instantiation, scalability, and robustness.}},
  author       = {{Schneider, Stefan Balthasar and Peuster, Manuel and Hannemann, Kai and Behnke, Daniel and Müller, Marcel and Bök, Patrick-Benjamin and Karl, Holger}},
  booktitle    = {{IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) Demo Track}},
  keywords     = {{5G, NFV, Smart Manufacturing, Cloud-Native, Kubernetes}},
  location     = {{Dallas, TX, USA}},
  publisher    = {{IEEE}},
  title        = {{{"Producing Cloud-Native": Smart Manufacturing Use Cases on Kubernetes}}},
  year         = {{2019}},
}

@article{28354,
  abstract     = {{This paper discusses the findings of an empirical study that explores the relationship between study-abroad experiences, learner identity, and pronunciation. We argue that the role of pronunciation as a personal domain of
meaning-making warrants more attention than it has hitherto received. To this end, we investigate the narratives of Canadian learners, studying abroad in Germany, in relation to discourses of language learning, culture, and identity,
using a Critical Discourse Analysis approach. Our data, which we gained from semi-structured interviews and e-journals, shows that learners’ perceptions of pronunciation are closely linked to their views of the native-speaker ideal, impacting their self-constructions and interpretations of learning experience. In conclusion, we argue for a more differentiated understanding of pronunciation and its implications for language teaching and study abroad.}},
  author       = {{Müller, Mareike and Schmenk, Barbara}},
  issn         = {{0802-6106}},
  journal      = {{International Journal of Applied Linguistics}},
  keywords     = {{learner identity, study abroad, pronunciation, native-speaker ideal, critical discourse analysis}},
  number       = {{1}},
  pages        = {{132--151}},
  title        = {{{Narrating the sound of self: The role of pronunciation in learners’ self-constructions in study-abroad contexts}}},
  doi          = {{10.1111/ijal.12109}},
  volume       = {{27}},
  year         = {{2017}},
}

@article{17657,
  abstract     = {{Inter-datacenter transfers of non-interactive but timely large flows over a private (managed) network is an important problem faced by many cloud service providers. The considered flows are non-interactive because they do not explicitly target the end users. However, most of them must be performed on a timely basis and are associated with a deadline. We propose to schedule these flows by a centralized controller, which determines when to transmit each flow and which path to use. Two scheduling models are presented in this paper. In the first, the controller also determines the rate of each flow, while in the second bandwidth is assigned by the network according to the TCP rules. We develop scheduling algorithms for both models and compare their complexity and performance.}},
  author       = {{Cohen, R. and Polevoy, Gleb}},
  issn         = {{2168-7161}},
  journal      = {{Cloud Computing, IEEE Transactions on}},
  keywords     = {{Approximation algorithms, Approximation methods, Bandwidth, Cloud computing, Routing, Schedules, Scheduling}},
  number       = {{99}},
  pages        = {{1--1}},
  title        = {{{Inter-Datacenter Scheduling of Large Data Flows}}},
  doi          = {{10.1109/TCC.2015.2487964}},
  volume       = {{PP}},
  year         = {{2015}},
}

@article{5679,
  abstract     = {{Cloud computing promises the flexible delivery of computing services in a pay-as-you-go manner. It allows customers to easily scale their infrastructure and save on the overall cost of operation. However Cloud service offerings can only thrive if customers are satisfied with service performance. Allow-ing instantaneous access and flexible scaling while maintaining the service levels and offering competitive prices poses a significant challenge to Cloud Computing providers. Furthermore services will remain available in the long run only if this business generates a stable revenue stream. To address these challenges we introduce novel policy-based service admission control mod-els that aim at maximizing the revenue of Cloud providers while taking in-formational uncertainty regarding resource requirements into account. Our evaluation shows that policy-based approaches statistically significantly out-perform first come first serve approaches, which are still state of the art. Furthermore the results give insights in how and to what extent uncertainty has a negative impact on revenue.}},
  author       = {{Püschel, Tim and Schryen, Guido and Hristova, Diana and Neumann, Dirk}},
  journal      = {{European Journal of Operational Research}},
  keywords     = {{admission control, informational uncertainty, revenue management, cloud computing}},
  number       = {{2}},
  pages        = {{637--647}},
  publisher    = {{Elsevier}},
  title        = {{{Revenue Management for Cloud Computing Providers: Decision Models for Service Admission Control under Non-probabilistic Uncertainty}}},
  volume       = {{244}},
  year         = {{2015}},
}

@article{28353,
  abstract     = {{This article aims to reconceptualize pronunciation teaching and learning according to the tenets of the 2007 MLA Report and its call for translingual/transcultural competence. The critical discussion of current teaching and research practices shows that the realm of pronunciation has benefitted little from debates on intercultural language learning. In order to link the teaching of pronunciation with learner needs in intercultural encounters, this article develops the concept of pronunciation‐as‐language. The theoretical exploration of this concept is supported by a narrative analysis of study-abroad learners’ accounts, contrasting learners’ perceptions of teaching practices with the complex role pronunciation plays in second language‐mediated interactions. The results underline the importance of pedagogical approaches that encourage the critical reflection on and creative use of pronunciation beyond structural elements and native‐speaker
norms.}},
  author       = {{Müller, Mareike}},
  issn         = {{0015-718X}},
  journal      = {{Foreign Language Annals}},
  keywords     = {{critical language awareness, native‐speaker ideal, pronunciation, study abroad, translingual and transcultural competence}},
  number       = {{2}},
  pages        = {{213--229}},
  title        = {{{Conceptualizing pronunciation as part of translingual/transcultural competence: New impulses for SLA research and the L2 classroom}}},
  doi          = {{10.1111/flan.12024}},
  volume       = {{46}},
  year         = {{2013}},
}

