Academic literature on the topic 'Fragmentation (computing)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Fragmentation (computing).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Fragmentation (computing)"

1

Hudic, Aleksandar, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, and Edgar R. Weippl. "Data confidentiality using fragmentation in cloud computing." International Journal of Pervasive Computing and Communications 9, no. 1 (2013): 37–51. http://dx.doi.org/10.1108/17427371311315743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Y. T., P. Sthapit, and J. Y. Pyun. "Energy Efficient Data Fragmentation for Ubiquitous Computing." Computer Journal 57, no. 2 (2013): 263–72. http://dx.doi.org/10.1093/comjnl/bxt080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher, and Sebastian Böcker. "Computing Fragmentation Trees from Tandem Mass Spectrometry Data." Analytical Chemistry 83, no. 4 (2011): 1243–51. http://dx.doi.org/10.1021/ac101825k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Scheubert, Kerstin, Franziska Hufsky, Florian Rasche, and Sebastian Böcker. "Computing Fragmentation Trees from Metabolite Multiple Mass Spectrometry Data." Journal of Computational Biology 18, no. 11 (2011): 1383–97. http://dx.doi.org/10.1089/cmb.2011.0168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Beckham, Olly, Gord Oldman, Julie Karrie, and Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption." International research journal of management, IT and social sciences 6, no. 6 (2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.

Full text
Abstract:
Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud computing. In this work, we presented a two-tier architecture for security in mul
APA, Harvard, Vancouver, ISO, and other styles
6

Rasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher, and Sebastian Böcker. "Correction to Computing Fragmentation Trees from Tandem Mass Spectrometry Data." Analytical Chemistry 83, no. 17 (2011): 6911. http://dx.doi.org/10.1021/ac201785d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vivek, V., R. Srinivasan, R. Elijah Blessing, and R. Dhanasekaran. "Payload fragmentation framework for high-performance computing in cloud environment." Journal of Supercomputing 75, no. 5 (2018): 2789–804. http://dx.doi.org/10.1007/s11227-018-2660-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Salman, Mahdi Abed, Hasanain Ali Al Essa, and Khaldoon Alhussayni. "A Distributed Approach for Disk Defragmentation." JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, no. 3 (2018): 1–5. http://dx.doi.org/10.29196/jub.v26i3.548.

Full text
Abstract:
Fragmentation is a computing problem that occurs when files of a computer system are replaced frequently. In this paper, the fragments of each file are collected and grouped, thanks to ant-colony optimization ACO, in one place as a mission for a group of ants. The study shows the ability of ants to work in a distributed environment such as cloud computing systems to solve such problem. The model is simulated using NetLogo.
APA, Harvard, Vancouver, ISO, and other styles
9

Pei, Xin, Huiqun Yu, and Guisheng Fan. "Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing." International Journal of Software Engineering and Knowledge Engineering 25, no. 09n10 (2015): 1709–14. http://dx.doi.org/10.1142/s0218194015710047.

Full text
Abstract:
One primary challenge of enforcing access control in cloud computing is how to ensure access with high efficiency while preserving data security. This paper proposes a fine-grained access control method for cloud resources. The basic idea is to use XACML as access control language and to optimize policies by data fragmentation and policy refinement algorithms. Through data fragmentation, the accessible resources are divided into disjoint data blocks, and each of them will be combined with a set of policy rules. This helps to refine the policy and to avoid data leakage caused by rule conflictin
APA, Harvard, Vancouver, ISO, and other styles
10

Mariam O. Alrashidi, Mariam O. Alrashidi. "A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud Service Providers." journal of King Abdulaziz University Computing and Information Technology Sciences 8, no. 2 (2019): 69–92. http://dx.doi.org/10.4197/comp.8-2.6.

Full text
Abstract:
Most companies are sceptical about the security and insurance measures offered by cloud services and are reluctant to store sensitive data, such as employee records, in the cloud. Thus, more effort is needed to support the security of information in cloud computing. This paper proposes a cryptography algorithm called ―random algorithm‖ because it is built on the idea of randomising the encryption of uploaded files among four encryption algorithms. The proposed fragmentation technique helps add security and privacy to cloud storage applications. Based on earlier studies, we have created a file-
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Fragmentation (computing)"

1

Kapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment." Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.

Full text
Abstract:
La thèse revient sur les techniques de fragmentation en les rendant plus rapides et/ou moins gourmand en mémoire. Le but ultime est de fournir à un utilisateur un ensemble de méthodes de fragmentation rapide pouvant être directement appliqué dans un contexte industrielle afin de renforcer la confidentialité des données stockées ou d'accélérer le processus de protection. Premièrement, une enquête riche sur la fragmentation en tant que moyen de préserver la confidentialité des données a été effectué et a donné comme résultat une vaste analyse de l'état de l'art. Deuxièmement, la famille des algo
APA, Harvard, Vancouver, ISO, and other styles
2

Ahuja, Ankit. "Contextinator: Recreating the context lost amid information fragmentation on the web." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23120.

Full text
Abstract:
The web browser has emerged as a central workspace for information workers, where they make use of cloud-based applications to access their information. While this solution nicely supports access to their data from multiple devices, it presents a nightmare for organizing and coordinating data between tools for a single project. Information is typically scattered between various online tools, where storage and organization structures are replicated. Information workers are interrupted and have to switch between projects frequently. Once interrupted, resuming work on a project can be hard. To ad
APA, Harvard, Vancouver, ISO, and other styles
3

Denis, Bacelar Ana Maria. "Isomeric ratios of high-spin states in neutron-deficient N≈126 nuclei produced in projectile fragmentation reactions." Thesis, University of Brighton, 2012. https://research.brighton.ac.uk/en/studentTheses/62edb7eb-7e42-4e1e-be42-6926ccf600d0.

Full text
Abstract:
The population of high-spin isomeric states in neutron-deficient N≈126 nuclei has been studied in order to further understand the reaction mechanism of projectile fragmentation. The nuclei of interest were populated following projectile-fragmentation of a 1 GeV/A 238U beam on a 9Be target at GSI, Germany. The reaction products were selected and separated in the FRS FRagment Separator and brought to rest in an 8 mm plastic stopper placed at the focus of the RISING gamma-ray detector array. The results on the development of an add-back method for the RISING array are presented and discussed for
APA, Harvard, Vancouver, ISO, and other styles
4

Cherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage." Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.

Full text
Abstract:
Un service du nuage peut employer des techniques de sécurités pour assurer la sécurité de l’information. Ces techniques protègent une donnée personnelle en la rendant inintelligible pour toutes personnes autres que l’utilisateur du service. En contrepartie, certaines fonctionnalités ne peuvent plus être implémentées. Par exemple, la technique du chiffrement symétrique rend les données inintelligibles, mais empêche le calcul sur ces données.Cette thèse avance qu’un service du nuage doit composer les techniques pour assurer la sécurité de l’information sans perdre de fonctionnalités. Elle se bas
APA, Harvard, Vancouver, ISO, and other styles
5

Solat, Siamak. "Novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture using innovative sharding to enable the use of BFT consensus mechanisms in very large-scale networks." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7025.

Full text
Abstract:
Cette thèse de doctorat se compose de 6 chapitres. Dans le premier chapitre, en guise d'introduction, nous donnons un aperçu des objectifs généraux et des motivations des réseaux décentralisés et permissionless, ainsi que des obstacles auxquels ils sont confrontés. Dans l'introduction, nous évoquons également la solution irrationnelle et illogique, connue sous le nom de « blockchain permissioned », qui a été proposée pour améliorer les performances des réseaux similaires à Bitcoin. Cette question a été détaillée au chapitre 5. Dans le chapitre 2, nous rendons clairs et intelligibles les systèm
APA, Harvard, Vancouver, ISO, and other styles
6

Kao, Chen-Kang, and 高振綱. "Utilization of Resource Fragmentation in High-Performance Computing System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/00939400485072812169.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>103<br>In high-performance computing (HPC) systems, resources are al-located to users according to configurable scheduling policies. Unfor-tunately, these policies often create resource fragments which reduce overall resource utilization. In this paper, we propose an HPC archi-tecture which maximizes the resource utilization by allocating unused resource fragments for jobs which are malleable in the sense that these jobs can be created and terminated at any time without severe penalties. Hence, the whole HPC system can utilize almost 100% of its computing resource
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Qingan. "Detailed Modeling of Soot Formation/Oxidation in Laminar Coflow Diffusion Flames." Thesis, 2009. http://hdl.handle.net/1807/19251.

Full text
Abstract:
The first goal of this thesis is to develop and validate a modeling tool into which fundamental combustion chemistry and aerosol dynamics theory are implemented for investigating soot formation/oxidation in multi-dimensional laminar coflow diffusion flames taking into account soot polydispersity and fractal-like aggregate structure. The second goal is to use the tool to study soot aggregate formation/oxidation in experimentally studied laminar coflow diffusion flames to advance the understanding of soot aggregate formation/oxidation mechanism. The first part of the thesis deals with the large
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Fragmentation (computing)"

1

Tierney, Margaret. Thef ormation and fragmentation of computing as an occupation: A review of shifting 'expertise'. Research Centre for Social Sciences, University of Edinburgh, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Fragmentation (computing)"

1

Ghosh, Debdulal, and Jitendra Kumar. "Existence of Equilibrium Solution of the Coagulation–Fragmentation Equation with Linear Fragmentation Kernel." In Mathematics and Computing. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2095-8_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coffman, Ed. "Computer Storage Fragmentation: Pioneering Work of Brian Randell." In Dependable and Historic Computing. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24541-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Rakesh Kumar, Rashmikiran Pandey, Sankhayan Choudhury, and Nabendu Chaki. "Device Fragmentation: A Case Study using “NeSen”." In Advances in Intelligent Systems and Computing. Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3373-5_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Alsirhani, Amjad, Peter Bodorik, and Srinivas Sampalli. "Data Fragmentation Scheme: Improving Database Security in Cloud Computing." In Recent Trends in Computer Applications. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89914-5_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Scheubert, Kerstin, Franziska Hufsky, Florian Rasche, and Sebastian Böcker. "Computing Fragmentation Trees from Metabolite Multiple Mass Spectrometry Data." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20036-6_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dharavath, Ramesh, Vikas Kumar, Chiranjeev Kumar, and Amit Kumar. "An Apriori-Based Vertical Fragmentation Technique for Heterogeneous Distributed Database Transactions." In Intelligent Computing, Networking, and Informatics. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fabre, Jean-Charles, Yves Deswarte, and Brian Randell. "Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: an Object-Oriented Approach." In Predictably Dependable Computing Systems. Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/978-3-642-79789-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fabre, Jean-Charles, Yves Deswarte, and Brian Randell. "Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach." In Dependable Computing — EDCC-1. Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58426-9_122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gayathri Devi, K., S. Raksha, and Kavitha Sooda. "Enhancing Restore Speed of In-line Deduplication Cloud-Based Backup Systems by Minimizing Fragmentation." In Smart Intelligent Computing and Applications. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Castillo-García, Abraham, Lisbeth Rodríguez-Mazahua, Felipe Castro-Medina, Beatriz A. Olivares-Zepahua, and María A. Abud-Figueroa. "A Review of Horizontal Fragmentation Methods Considering Multimedia Data and Dynamic Access Patterns." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89909-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Fragmentation (computing)"

1

Odom, William, John Zimmerman, Jodi Forlizzi, et al. "Fragmentation and transition." In CHI '13: CHI Conference on Human Factors in Computing Systems. ACM, 2013. http://dx.doi.org/10.1145/2470654.2466242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghali, Cesar, Ashok Narayanan, David Oran, Gene Tsudik, and Christopher A. Wood. "Secure Fragmentation for Content-Centric Networks." In 2015 IEEE 14th International Symposium on Network Computing and Applications (NCA). IEEE, 2015. http://dx.doi.org/10.1109/nca.2015.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alsirhani, Amjad, Peter Bodorik, and Srinivas Sampalli. "Improving Database Security in Cloud Computing by Fragmentation of Data." In 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017. http://dx.doi.org/10.1109/comapp.2017.8079737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Andreas, Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos Markakis, and George Mastorakis. "Ensuring Confidentiality of Healthcare Data Using Fragmentation in Cloud Computing." In GLOBECOM 2023 - 2023 IEEE Global Communications Conference. IEEE, 2023. http://dx.doi.org/10.1109/globecom54140.2023.10436812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mrabti, Almokhtar Ait El, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, and Mina De Montfort. "Mobile app security by fragmentation "MASF"." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. ACM, 2017. http://dx.doi.org/10.1145/3018896.3036371.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Goovaerts, Griet, Bert Vandenberk, Carolina Varon, Rik Willems, and Sabine Van Huffel. "Phase:Rectified Signal Averaging for Automatic Detection of QRS Fragmentation." In 2016 Computing in Cardiology Conference. Computing in Cardiology, 2016. http://dx.doi.org/10.22489/cinc.2016.186-403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dai, Tianxiang, Haya Shulman, and Michael Waidner. "Poster: Fragmentation Attacks on DNS over TCP." In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dai, Tianxiang, Haya Shulman, and Michael Waidner. "Poster: Fragmentation Attacks on DNS over TCP." In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Creedon, Eoin, and Michael Manzke. "Impact of Fragmentation Strategy on Ethernet Performance." In 2009 Sixth IFIP International Conference on Network and Parallel Computing (NPC). IEEE, 2009. http://dx.doi.org/10.1109/npc.2009.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christos, B., K. Vaggelis, and M. Ioannis. "Web page fragmentation for personalized portal construction." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286475.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!