Academic literature on the topic 'MOBILE STORAGE SHARING'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MOBILE STORAGE SHARING.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MOBILE STORAGE SHARING"

1

Jiang, Bing, Guo Yu Ma, Sheng Ma, and Jian Feng Xie. "Mobile Sync Client Design of Cloud Storage System." Applied Mechanics and Materials 464 (November 2013): 358–64. http://dx.doi.org/10.4028/www.scientific.net/amm.464.358.

Full text
Abstract:
This paper introduces the client design based on Android mobile sync of cloud storage system, including system architecture and its module design. Through the Android mobile sync client software, user can access the cloud server to implement some functions, such as upload and download, data backup and restore, file management and sharing in the distance. Under the LAN environment, the client system has successfully completed the tests of both function module and assembly verification. The results show that the whole system runs in good condition.
APA, Harvard, Vancouver, ISO, and other styles
2

Delbracio, Mauricio, Damien Kelly, Michael S. Brown, and Peyman Milanfar. "Mobile Computational Photography: A Tour." Annual Review of Vision Science 7, no. 1 (September 15, 2021): 571–604. http://dx.doi.org/10.1146/annurev-vision-093019-115521.

Full text
Abstract:
The first mobile camera phone was sold only 20 years ago, when taking pictures with one's phone was an oddity, and sharing pictures online was unheard of. Today, the smartphone is more camera than phone. How did this happen? This transformation was enabled by advances in computational photography—the science and engineering of making great images from small-form-factor, mobile cameras. Modern algorithmic and computing advances, including machine learning, have changed the rules of photography, bringing to it new modes of capture, postprocessing, storage, and sharing. In this review, we give a brief history of mobile computational photography and describe some of the key technological components, including burst photography, noise reduction, and super-resolution. At each step, we can draw naive parallels to the human visual system.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, En, Peiyan Yuan, and Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.

Full text
Abstract:
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
APA, Harvard, Vancouver, ISO, and other styles
4

Komen, Leah. "“Here you can use it”: Understanding mobile phone sharing and the concerns it elicits in rural Kenya." for(e)dialogue 1, no. 1 (March 16, 2016): 52–65. http://dx.doi.org/10.29311/for(e)dialogue.v1i1.532.

Full text
Abstract:
Globally, mobile phones are mostly used as personal items largely due to their data storage and services provision. However, various features enable mobile phone sharing and this subverts the notion of a single individual use. In cultures where communal sharing is valued and seen as normal, it is natural for mobile phones to be incorporated into other traditionally shared support systems, such as meetings summoned by elders, which involve social, economic, cultural and political activities. This paper draws on a recent doctoral thesis to examine the role of mobile telephony in the social transformation and development of Marakwet, a sub-ethnic group of the Kalenjin community in the Rift Valley region of western Kenya. The paper argues that the adoption and domestication of mobile telephony is both innovative and a source of problems for the Marakwet, depending on how the device is used in everyday life. The paper shows that while mobile phone sharing amongst the Marakwet is the most preferred practice, privacy and data security are key concerns among users.
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Han, Yonggang Wen, and Dusit Niyato. "Public Cloud Storage-Assisted Mobile Social Video Sharing: A Supermodular Game Approach." IEEE Journal on Selected Areas in Communications 35, no. 3 (March 2017): 545–56. http://dx.doi.org/10.1109/jsac.2017.2659478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Daradkeh, Yousef Ibrahim, Mujahed ALdhaifallah, and Dmitry Namiot. "Mobile Clouds for Smart Cities." International Journal of Online Engineering (iJOE) 13, no. 01 (January 18, 2017): 76. http://dx.doi.org/10.3991/ijoe.v13i01.6320.

Full text
Abstract:
This paper is devoted to mobile cloud services in Smart City projects. As per mobile cloud computing paradigm, the data processing and storage are moved from the mobile device to a cloud. In the same time, Smart City services typically contain a set of applications with data sharing options. Most of the services in Smart Cities are actually mashups combined data from several sources. This means that access to all available data is vital to the services. And the mobile cloud is vital because the mobile terminals are one of the main sources for data gathering. In our work, we discuss criteria for selecting mobile cloud services.
APA, Harvard, Vancouver, ISO, and other styles
7

Kasai, Hiroyuki. "Implementation of distributed mobile storage and location-based message sharing among smart phones." ACM SIGMOBILE Mobile Computing and Communications Review 16, no. 4 (February 4, 2013): 20–21. http://dx.doi.org/10.1145/2436196.2436208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Najwa, Nina Fadilah, Muhammad Ariful Furqon, and Eki Saputra. "Ulasan Literatur: Faktor-Faktor yang Mempengaruhi Adopsi Mobile Cloud Computing pada Mahasiswa." Ultimatics : Jurnal Teknik Informatika 12, no. 2 (December 29, 2020): 72–79. http://dx.doi.org/10.31937/ti.v12i2.1836.

Full text
Abstract:
Mobile Cloud Computing provides cloud storage services to users inside a cloud. This study focuses on the factors that influence the adoption of mobile cloud storage usage in the higher education. The research methods used in this study include: (1) problem formulation; (2) literature search; and (3) formulation of factors for adopting mobile cloud computing (4) validation and reliability test. The results obtained is a conceptual model that can be tested empirically. The main five factors are: (1) knowledge sharing variables; (2) Perceived usefulness variable (3) trust variable; (4) the attitude towards variable; and (5) the variable of behavioral intention of use. Each variable formulated in the conceptual model will be developed into items that are measurement indicators. The research contribution is in the form of a research model that is useful for empirical research on the factors of adoption of the use of Mobile Cloud Computing in the education sector.
APA, Harvard, Vancouver, ISO, and other styles
9

D, Uma Nandhini, Udhayakumar S, Latha Tamilselvan, and Silviya Nancy J. "Client Aware Scalable Cloudlet to Augment Edge Computing with Mobile Cloud Migration Service." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 12 (July 31, 2020): 165. http://dx.doi.org/10.3991/ijim.v14i12.14407.

Full text
Abstract:
<p class="0abstract">Computing with mobile is still in its infancy due to its limitations of computational power, battery lifetime and storage capacity. These limitations hinder the growth of mobile computing, which in-turn affects the growth of computationally intensive applications developed for the mobile devices. So in-order to help execute complex applications within the mobile device, mobile cloud computing (MCC) emerged as a feasible solution. The job of offloading the task to the cloud data center for storage and execution from the mobile seems to gain popularity, however, issues related to network bandwidth, loss of mobile data connectivity, and connection setup does not augment well to extend the benefits offered by MCC. Cloudlet servers filled this gab by assisting the mobile cloud environment as an edge device, offering compute power to the connected devices with high speed wireless LAN connectivity. Implementation constraints of cloudlet faces severe challenges in-terms of its storage, network sharing, and VM provisioning. Moreover, the number of connected devices of the cloudlet and its load conditions vary drastically leading to unexpected bottleneck, in which case the availability to server becomes an issue. Therefore, a scalable cloudlet, Client Aware Scalable Cloudlet (CASC) is proposed with linear regression analysis, predicting the knowledge of expected load conditions for provisioning new virtual machines and to perform resource migration.</p>
APA, Harvard, Vancouver, ISO, and other styles
10

N.K, Sreelesh, and Santhosh Kumar B J. "An Advanced Hierarchical Attribute Based Encryption Access Control in Mobile Cloud Computing." International Journal of Engineering & Technology 7, no. 3.10 (July 15, 2018): 18. http://dx.doi.org/10.14419/ijet.v7i3.10.15621.

Full text
Abstract:
Cloud computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet is widely popular. Since the most attractive part of cloud computing is computation outsourcing, it is far beyond enough to just conduct access control. Unfortunately, the data in the cloud is out of user’s control in most cases, privacy risks would rise dramatically due to the access of unauthorized users. The security of the data is the major concern. Coordinating mobile devices into cloud computing is a rising but encouraging illustration. The coordination happens in a cloud based multi-layered client information sharing condition. With the coordination of cloud computing with mobile devices may result in security issues such as information privacy and client rights.The proposed work makes use of a technology using Advanced Hierarchical Attribute Based Encryption (A-HABE) architecture, in which the data storage will be in hierarchical structure and the retrieval of data will also be in the form of access level. Data confidentiality should be guaranteed and the system should be resilient. The secure storage and sharing of data without the fear of an unauthorized access in the cloud can result in growth in many sectors.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "MOBILE STORAGE SHARING"

1

Subbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Full text
Abstract:
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and confidentiality properties of the data storage service. This dissertation investigates the design of a proactively-secure distributed data storage system. Data can be stored at storage servers using encoding schemes called secret sharing, or encryption-with-replication. The primary challenge is that the protocols that the servers run periodically to maintain integrity and confidentiality must scale with large amounts of stored data. Determining how much data can be proactively-secured in practical settings is an important objective of this dissertation. The protocol for maintain the confidentiality of stored data is developed in the context of data storage using secret sharing. We propose a new technique called the GridSharing framework that uses a combination of XOR secret sharing and replication for storing data efficiently. We experimentally show that the algorithm can secure several hundred GBs of data. We give distributed protocols run periodically by the servers for maintaining the integrity of replicated data under the mobile adversary model. This protocol is integrated into a document repository to make it proactively-secure. The proactively-secure document repository is implemented and evaluated on the Emulab cluster (http://www.emulab.net). The experimental evaluation shows that several 100 GBs of data can be proactively-secured. This dissertation also includes work on fault and intrusion detection - a necessary component in any secure system. We give a novel Byzantine-fault detection algorithm for quorum systems, and experimentally evaluate its performance using simulations and by deploying it in the AgileFS distributed file system.
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Xi. "METADATA-BASED IMAGE COLLECTING AND DATABASING FOR SHARING AND ANALYSIS." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/80.

Full text
Abstract:
Data collecting and preparing is generally considered a crucial process in data science projects. Especially for image data, adding semantic attributes when preparing image data provides much more insights for data scientists. In this project, we aim to implement a general-purpose central image data repository that allows image researchers to collect data with semantic properties as well as data query. One of our researchers has come up with the specific challenge of collecting images with weight data of infants in least developed countries with limited internet access. The rationale is to predict infant weights based on image data by applying Machine Learning techniques. To address the data collecting issue, I implemented a mobile application which features online and offline image and annotation upload and a web application which features image query functionality. This work is derived and partly decoupled from the previous project – ImageSfERe (Image Sharing for Epilepsy Research), which is a web-based platform to collect and share epilepsy patient imaging.
APA, Harvard, Vancouver, ISO, and other styles
3

SUTHAR, NITESH. "PERSONAL MOBILE STORAGE SHARING." Thesis, 2020. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19110.

Full text
Abstract:
In this era of Mobile devices, every user is willing to use mobile devices, which are capable of providing high performance, and which can provides more storage spaces. People are getting aware about using various cloud-based applications provided by network operator and service providers. Among those applications, there are multiple cloud-based usability’s which provide the access to the Cloud Storage. There are many cloud-based application available which provide private storage, such as Microsoft OneDrive, Google Cloud, Dropbox, etc. All of them store date on cloud servers. Even though these are secured still data is exposed to service provider so there is always a risk of data being stolen by some hackers or intruders. We are living in the era of smartphones, every user is having a smart phone with different storage capabilities such as 8, 16, 32, 64 and 128 GB of space and even more storage is going to be embedded in near future. We always find some user, which are not using even 50% of total available storage in their smartphone, which remains unused throughout the lifetime of Mobile device. Therefore, in this Major Project – II, we propose a new framework, which provides a system where a user can share his device's free or unused storage space with other users. Consider a family; where we have n members with n different mobile devices then the aggregated free storage space of all n number of mobile phones can be used as common private storage. The proposed system is called Personal Mobile Storage Sharing (PMS-Sharing). PMS-Sharing enables user to form a local group of users and allow them to access shared storage directory. The system removes dependencies on cloud storage service provider to store the data on servers in order to access it anywhere around the globe. User’s data is stored on the devices within the known group of family members, by this way his data is safe and reachable physically in case network is not available due to some natural hazard. PMS Sharing will be very useful application for the military, secure forces, corporate network, and for those users who do not want to upload their personal data on cloud-storage service and user does not know physical location of storage.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MOBILE STORAGE SHARING"

1

Wang, Xu An, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan, and Zuliang Wang. "Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing." In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 478–85. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02607-3_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Fang, Wenbo Wang, and Zhe Tang. "Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 374–82. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49148-6_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Laghi, Maria Chiara, Michele Amoretti, and Gianni Conte. "Peer-to-Peer Service Sharing on Mobile Platforms." In Handheld Computing for Mobile Commerce, 180–201. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-761-9.ch009.

Full text
Abstract:
True ubiquitous computing requires peer-to-peer service sharing on mobile platforms, with application entities communicating and providing services to each other and to users. In order to enforce this paradigm to devices with limited processing and storage resources, lightweight middleware components are required. In this chapter, we define a theoretical model for autonomic and altruistic computational entities, and we use it to build a framework for peer-to-peer service-oriented infrastructures, focusing on three key aspects: overlay scheme, dynamic service composition and self-configuration of peers. Based on this framework, JXTA-SOAP Mobile Edition is a software component that completes the Sun MicroSystem’s JXTA platform, supporting peer-to-peer sharing of Web Services.
APA, Harvard, Vancouver, ISO, and other styles
4

Yuan, Soe-Tsyr, and Fang-Yu Chen. "UbiSrvInt." In Mobile and Ubiquitous Commerce, 135–71. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-366-1.ch009.

Full text
Abstract:
Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P applications concern merely the sharing of a variety of contents. For magnifying the sharing extent for wireless service provision in the vicinity (i.e., the wireless P2P environments), this chapter presents a novel approach (briefly named UbiSrvInt) that is an attempt to enable a pure P2P solution that is context aware and fault tolerant for ad-hoc wireless service provision. This approach empowers an autonomous peer to propel distributed problem solving (e.g., in the travel domain) through service sharing and execution in an intelligent P2P way. This approach of ad-hoc wireless service provision is not only highly robust to failure (based on a specific clustering analysis of failure correlation among peers) but also capable of inferring a user’s service needs (through a BDI reasoning mechanism utilizing the surrounding context) in ad-hoc wireless environments. The authors have implemented UbiSrvInt into a system platform with P-JXTA that shows good performance results on fault tolerance and context awareness.
APA, Harvard, Vancouver, ISO, and other styles
5

El Moussaid, Nadya, and Ahmed Toumanari. "A Cloud Intrusion Detection Based on Classification of Activities and Mobile Agent." In Security Management in Mobile Cloud Computing, 29–42. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0602-7.ch002.

Full text
Abstract:
Cloud computing becomes the technology trend that attracts more and more both of the different forms of companies and attackers, for the reason that cloud computing provides a sharing pool of configured computing resources, such as servers, networks, applications, storage, and services, to end users. Therefore, securing sensitive data of companies from threats and attacks performed by internal or external attackers is a necessary requirement and exigency. For that purpose, in this paper presents an intrusion detection system that is based on mobile agent to collect and analysis gathered data from several virtual machines, in order to benefit from the advantages of mobile agents. The authors of this chapter propose to use C4.5 algorithm which is one of tree decision algorithms that classify data into normal and malicious one. The main purpose of our solution is creating a model of normal and abnormal behaviour.
APA, Harvard, Vancouver, ISO, and other styles
6

Chow, C., H. Leong, and A. Chan. "Peer-to-Peer Cooperative Caching in Mobile Environments." In Encyclopedia of Mobile Computing and Commerce, 749–53. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch126.

Full text
Abstract:
An infrastructure-based mobile environment is formed with a wireless network connecting mobile hosts (MHs) and mobile support stations (MSSs). MHs are clients equipped with portable devices, such as laptops, personal digital assistants, cellular phones, and so on, while MSSs are stationary servers providing information access for the MHs residing in their service areas. With the recent widespread deployment of contemporary peer-to-peer (known as P2P throughout this chapter) wireless communication technologies, such as IEEE 802.11 (IEEE Standard 802-11, 1997) and Bluetooth (Bluetooth SIG, 2004), coupled with the fact that the computation power and storage capacity of most portable devices have been improving at a fast pace, a new information sharing paradigm known as P2P information access has rapidly taken shape. The MHs can share information among themselves rather than having to rely solely on their connections to the MSS. This article reviews a hybrid communication framework - that is, mobile cooperative caching - which combines the P2P information access paradigm into the infrastructure-based mobile environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Dass, Stephen, and Prabhu J. "Amelioration of Big Data Analytics by Employing Big Data Tools and Techniques." In Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management, 212–32. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4044-1.ch011.

Full text
Abstract:
This chapter describes how in the digital data era, a large volume of data became accessible to data science engineers. With the reckless growth in networking, communication, storage, and data collection capability, the Big Data science is quickly growing in each engineering and science domain. This paper aims to study many numbers of the various analytics ways and tools which might be practiced to Big Data. The important deportment in this paper is step by step process to handle the large volume and variety of data expeditiously. The rapidly evolving big data tools and Platforms have given rise to numerous technologies to influence completely different Big Data portfolio.In this paper, we debate in an elaborate manner about analyzing tools, processing tools and querying tools for Big datahese tools used for data analysis Big Data tools utilize numerous tasks, like Data capture, storage, classification, sharing, analysis, transfer, search, image, and deciding which might also apply to Big data.
APA, Harvard, Vancouver, ISO, and other styles
8

Delakouridis, Constantinos, and Leonidas Kazatzopoulos. "On the Use of Optimal Stopping Theory for Secret Sharing Scheme Update." In Intelligent Technologies and Techniques for Pervasive Computing, 276–95. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4038-2.ch015.

Full text
Abstract:
The location privacy issue has been addressed thoroughly so far. Cryptographic techniques, k-anonymity-based approaches, spatial obfuscation methods, mix-zones, pseudonyms, and dummy location signals have been proposed to enhance location privacy. In this chapter, the authors propose an approach, called STS (Share The Secret) that segments and distributes the location information to various, non-trusted, entities from where it will be reachable by authenticated location services. This secret sharing approach prevents location information disclosure even in situation where there is a direct observation of the target. The proposed approach facilitates end-users or location-based services to classify flexible privacy levels for different contexts of operation. The authors provide the optimal thresholds to alter the privacy policy levels when there is a need for relaxing or strengthening the required privacy. Additionally, they discuss the robustness of the proposed approach against various adversary models. Finally, the authors evaluate the approach in terms of computational and energy efficiency, using real mobile applications and location update scenarios over a cloud infrastructure, which is used to support storage and computational tasks.
APA, Harvard, Vancouver, ISO, and other styles
9

Kavitha, T. "Vehicular Cloud Computing." In Advances in Computer and Electrical Engineering, 30–56. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3981-0.ch002.

Full text
Abstract:
Cloud computing provides a way to avail hardware and software to provide services over the networks to users, whereas in mobile cloud computing, mobile devices are a part of cloud users and service providers. Vehicular ad hoc networks (VANETs) are developed with the help of mobile ad hoc networks (MANET) with the difference that the data are exchanged among mobile vehicles to enhance the road safety and traffic efficiency. VANETs safety applications includes traffic signal violation, curve speed warning, emergency brake lights, pre-crash sensing, collision warning, left turn assist, lane change warning, and stop sign assist. But due to the requirement of smaller size, one of the significant challenges of the vehicular network is the limited resource with respect to memory, computation power, and bandwidth. It leads to slow data processing capability. However, the demanding requirement of emerging application is complex computation with high storage capacity. This necessity can be fulfilled by sharing the available resource among all the vehicles which are in near proximity. It can be achieved by integrating the vehicular network with cloud computing which is called as vehicular cloud computing (VCC). VCC is a new technological shift that can take the advantages of cloud computing to afford the services to drivers of VANET. But VCC is still in early stage and due to its unique features and applications it has become a significant emerging research area which needs to be explored further.
APA, Harvard, Vancouver, ISO, and other styles
10

Pouliakis, Abraham, Stavros Archondakis, Efrossyni Karakitsou, and Petros Karakitsos. "Cloud Computing for Cytopathologists." In Cloud Computing Applications for Quality Health Care Delivery, 250–71. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6118-9.ch013.

Full text
Abstract:
Cloud computing is changing the way enterprises, institutions, and people understand, perceive, and use current software systems. Cloud computing is an innovative concept of creating a computer grid using the Internet facilities aiming at the shared use of resources such as computer software and hardware. Cloud-based system architectures provide many advantages in terms of scalability, maintainability, and massive data processing. By means of cloud computing technology, cytopathologists can efficiently manage imaging units by using the latest software and hardware available without having to pay for it at non-affordable prices. Cloud computing systems used by cytopathology departments can function on public, private, hybrid, or community models. Using cloud applications, infrastructure, storage services, and processing power, cytopathology laboratories can avoid huge spending on maintenance of costly applications and on image storage and sharing. Cloud computing allows imaging flexibility and may be used for creating a virtual mobile office. Security and privacy issues have to be addressed in order to ensure Cloud computing wide implementation in the near future. Nowadays, cloud computing is not widely used for the various tasks related to cytopathology; however, there are numerous fields for which it can be applied. The envisioned advantages for the everyday practice in laboratories' workflow and eventually for the patients are significant. This is explored in this chapter.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MOBILE STORAGE SHARING"

1

Feng, Chao, GangPeng Duan, Die You, and XiuWei Zhang. "Secure data sharing solution for mobile cloud storage." In International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022), edited by Yuanchang Zhong. SPIE, 2022. http://dx.doi.org/10.1117/12.2646302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Riestenberg, David. "The SECARB Anthropogenic Test: CO2 Injection & Storage Site." In International MVA/MMV Knowledge Sharing Workshop Mobile, AL May 2012. US DOE, 2012. http://dx.doi.org/10.2172/1747979.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jian Wang, Zyxia, and L. Harn. "Storage-optimal key sharing with authentication in sensor networks." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.243759.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jian Wang, Zyxia, and L. Harn. "Storage-optimal key sharing with authentication in sensor networks." In IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEE, 2005. http://dx.doi.org/10.1049/cp:20051549.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shen, Yueqing, Tong Qian, Yin Zhang, and Wenhu Tang. "Mobile Energy Storage Sharing Schemes for Enhancing Power Distribution System Resilience." In 2023 8th Asia Conference on Power and Electrical Engineering (ACPEE). IEEE, 2023. http://dx.doi.org/10.1109/acpee56931.2023.10135758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moura, Pedro, Uday Sriram, and Javad Mohammadi. "Sharing Mobile and Stationary Energy Storage Resources in Transactive Energy Communities." In 2021 IEEE Madrid PowerTech. IEEE, 2021. http://dx.doi.org/10.1109/powertech46648.2021.9494999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dubois, Daniel J., Yosuke Bando, Konosuke Watanabe, Arata Miyamoto, Munehiko Sato, William Papper, and V. Michael Bove. "Supporting heterogeneous networks and pervasive storage in mobile content-sharing middleware." In 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2015. http://dx.doi.org/10.1109/ccnc.2015.7158086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sagor, M., R. Stoleru, A. Haroon, S. Bhunia, M. Chao, A. Altaweel, M. Maurice, and R. Blalock. "R-Drive: Resilient Data Storage and Sharing for Mobile Edge Clouds." In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 2022. http://dx.doi.org/10.1109/mass56207.2022.00030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Silva, Joao A., Pedro Vieira, and Herve Paulino. "Data Storage and Sharing for Mobile Devices in Multi-region Edge Networks." In 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2020. http://dx.doi.org/10.1109/wowmom49955.2020.00021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fulu Li, David P. Reed, and Andrew Lippman. "Collaborative storage with mobile devices in wireless networks for P2P media sharing." In 2008 Wireless Telecomunications Symposium (WTS 2008). IEEE, 2008. http://dx.doi.org/10.1109/wts.2008.4547546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography