{"id":199,"date":"2022-03-01T09:45:31","date_gmt":"2022-03-01T09:45:31","guid":{"rendered":"https:\/\/c3.itec.aau.at\/?p=199"},"modified":"2022-03-01T09:45:32","modified_gmt":"2022-03-01T09:45:32","slug":"paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data","status":"publish","type":"post","link":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/","title":{"rendered":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data"},"content":{"rendered":"\n<p><strong>Title:&nbsp;<\/strong>Big Data Pipelines on the Computing Continuum: Tapping the Dark Data<\/p>\n\n\n\n<p><strong>Authors<\/strong>: Dumitru Roman, <strong>Radu Prodan<\/strong>, Nikolay Nikolov, Ahmet Soylu, Mihhail Matskin, Andrea Marrella, <strong>Dragi Kimovski<\/strong>, Brian Elves\u00e6ter, Anthony Simonet-Boulogne, Giannis Ledakis, Hui Song, Francesco Leotta, Evgeny Kharlamov<\/p>\n\n\n\n<p><strong>Abstract<\/strong>: Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and turned into value. However, tapping their potential requires going beyond existing approaches and frameworks for Big Data processing. The Computing Continuum enables new opportunities for managing Big Data pipelines concerning efficient management of heterogeneous and untrustworthy resources. This article discusses the Big Data pipelines lifecycle on the Computing Continuum, its associated challenges and outlines a future research agenda in this area.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Title:&nbsp;Big Data Pipelines on the Computing Continuum: Tapping the Dark Data Authors: Dumitru Roman, Radu Prodan, Nikolay Nikolov, Ahmet Soylu, Mihhail Matskin, Andrea Marrella, Dragi Kimovski, Brian Elves\u00e6ter, Anthony Simonet-Boulogne, Giannis Ledakis, Hui Song, Francesco Leotta, Evgeny Kharlamov Abstract: Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3\" \/>\n<meta property=\"og:description\" content=\"Title:&nbsp;Big Data Pipelines on the Computing Continuum: Tapping the Dark Data Authors: Dumitru Roman, Radu Prodan, Nikolay Nikolov, Ahmet Soylu, Mihhail Matskin, Andrea Marrella, Dragi Kimovski, Brian Elves\u00e6ter, Anthony Simonet-Boulogne, Giannis Ledakis, Hui Song, Francesco Leotta, Evgeny Kharlamov Abstract: Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/\" \/>\n<meta property=\"og:site_name\" content=\"C3\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-01T09:45:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-01T09:45:32+00:00\" \/>\n<meta name=\"author\" content=\"Dragi Kimovski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dragi Kimovski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/\"},\"author\":{\"name\":\"Dragi Kimovski\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/#\\\/schema\\\/person\\\/40f037aaa2d1d20b5a6beb655d80c2ec\"},\"headline\":\"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data\",\"datePublished\":\"2022-03-01T09:45:31+00:00\",\"dateModified\":\"2022-03-01T09:45:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/\"},\"wordCount\":137,\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/\",\"url\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/\",\"name\":\"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/#website\"},\"datePublished\":\"2022-03-01T09:45:31+00:00\",\"dateModified\":\"2022-03-01T09:45:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/#\\\/schema\\\/person\\\/40f037aaa2d1d20b5a6beb655d80c2ec\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/c3.itec.aau.at\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/#website\",\"url\":\"https:\\\/\\\/c3.itec.aau.at\\\/\",\"name\":\"C3\",\"description\":\"The Carinthian Computing Continuum\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/c3.itec.aau.at\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/c3.itec.aau.at\\\/#\\\/schema\\\/person\\\/40f037aaa2d1d20b5a6beb655d80c2ec\",\"name\":\"Dragi Kimovski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g\",\"caption\":\"Dragi Kimovski\"},\"url\":\"https:\\\/\\\/c3.itec.aau.at\\\/index.php\\\/author\\\/dragi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/","og_locale":"en_US","og_type":"article","og_title":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3","og_description":"Title:&nbsp;Big Data Pipelines on the Computing Continuum: Tapping the Dark Data Authors: Dumitru Roman, Radu Prodan, Nikolay Nikolov, Ahmet Soylu, Mihhail Matskin, Andrea Marrella, Dragi Kimovski, Brian Elves\u00e6ter, Anthony Simonet-Boulogne, Giannis Ledakis, Hui Song, Francesco Leotta, Evgeny Kharlamov Abstract: Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and [&hellip;]","og_url":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/","og_site_name":"C3","article_published_time":"2022-03-01T09:45:31+00:00","article_modified_time":"2022-03-01T09:45:32+00:00","author":"Dragi Kimovski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dragi Kimovski","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/#article","isPartOf":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/"},"author":{"name":"Dragi Kimovski","@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec"},"headline":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data","datePublished":"2022-03-01T09:45:31+00:00","dateModified":"2022-03-01T09:45:32+00:00","mainEntityOfPage":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/"},"wordCount":137,"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/","url":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/","name":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data - C3","isPartOf":{"@id":"https:\/\/c3.itec.aau.at\/#website"},"datePublished":"2022-03-01T09:45:31+00:00","dateModified":"2022-03-01T09:45:32+00:00","author":{"@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec"},"breadcrumb":{"@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/c3.itec.aau.at\/index.php\/paper-accepted-in-ieee-computer-magazine-big-data-pipelines-on-the-computing-continuum-tapping-the-dark-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/c3.itec.aau.at\/"},{"@type":"ListItem","position":2,"name":"Paper accepted in IEEE Computer Magazine: Big Data Pipelines on the Computing Continuum: Tapping the Dark Data"}]},{"@type":"WebSite","@id":"https:\/\/c3.itec.aau.at\/#website","url":"https:\/\/c3.itec.aau.at\/","name":"C3","description":"The Carinthian Computing Continuum","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/c3.itec.aau.at\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/c3.itec.aau.at\/#\/schema\/person\/40f037aaa2d1d20b5a6beb655d80c2ec","name":"Dragi Kimovski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69f9c67e421b3ea3cb1096163c89fb751722295afb1ef52f18258722953e4d36?s=96&d=mm&r=g","caption":"Dragi Kimovski"},"url":"https:\/\/c3.itec.aau.at\/index.php\/author\/dragi\/"}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"amoteam-general":false,"1536x1536":false,"2048x2048":false,"sydney-large-thumb":false,"sydney-medium-thumb":false,"sydney-small-thumb":false,"sydney-service-thumb":false,"sydney-mas-thumb":false},"uagb_author_info":{"display_name":"Dragi Kimovski","author_link":"https:\/\/c3.itec.aau.at\/index.php\/author\/dragi\/"},"uagb_comment_info":0,"uagb_excerpt":"Title:&nbsp;Big Data Pipelines on the Computing Continuum: Tapping the Dark Data Authors: Dumitru Roman, Radu Prodan, Nikolay Nikolov, Ahmet Soylu, Mihhail Matskin, Andrea Marrella, Dragi Kimovski, Brian Elves\u00e6ter, Anthony Simonet-Boulogne, Giannis Ledakis, Hui Song, Francesco Leotta, Evgeny Kharlamov Abstract: Big Data pipelines are essential for leveraging Dark Data, i.e., data collected but not used and&hellip;","_links":{"self":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":1,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/199\/revisions"}],"predecessor-version":[{"id":200,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/posts\/199\/revisions\/200"}],"wp:attachment":[{"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/media?parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/categories?post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/c3.itec.aau.at\/index.php\/wp-json\/wp\/v2\/tags?post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}