Literatura académica sobre el tema "Fragmentation (computing)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Fragmentation (computing)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Fragmentation (computing)"
Hudic, Aleksandar, Shareeful Islam, Peter Kieseberg, Sylvi Rennert y Edgar R. Weippl. "Data confidentiality using fragmentation in cloud computing". International Journal of Pervasive Computing and Communications 9, n.º 1 (29 de marzo de 2013): 37–51. http://dx.doi.org/10.1108/17427371311315743.
Texto completoPark, Y. T., P. Sthapit y J. Y. Pyun. "Energy Efficient Data Fragmentation for Ubiquitous Computing". Computer Journal 57, n.º 2 (1 de septiembre de 2013): 263–72. http://dx.doi.org/10.1093/comjnl/bxt080.
Texto completoRasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher y Sebastian Böcker. "Computing Fragmentation Trees from Tandem Mass Spectrometry Data". Analytical Chemistry 83, n.º 4 (15 de febrero de 2011): 1243–51. http://dx.doi.org/10.1021/ac101825k.
Texto completoScheubert, Kerstin, Franziska Hufsky, Florian Rasche y Sebastian Böcker. "Computing Fragmentation Trees from Metabolite Multiple Mass Spectrometry Data". Journal of Computational Biology 18, n.º 11 (noviembre de 2011): 1383–97. http://dx.doi.org/10.1089/cmb.2011.0168.
Texto completoBeckham, Olly, Gord Oldman, Julie Karrie y Dorth Craig. "Techniques used to formulate confidential data by means of fragmentation and hybrid encryption". International research journal of management, IT and social sciences 6, n.º 6 (15 de octubre de 2019): 68–86. http://dx.doi.org/10.21744/irjmis.v6n6.766.
Texto completoRasche, Florian, Aleš Svatoš, Ravi Kumar Maddula, Christoph Böttcher y Sebastian Böcker. "Correction to Computing Fragmentation Trees from Tandem Mass Spectrometry Data". Analytical Chemistry 83, n.º 17 (septiembre de 2011): 6911. http://dx.doi.org/10.1021/ac201785d.
Texto completoVivek, V., R. Srinivasan, R. Elijah Blessing y R. Dhanasekaran. "Payload fragmentation framework for high-performance computing in cloud environment". Journal of Supercomputing 75, n.º 5 (17 de noviembre de 2018): 2789–804. http://dx.doi.org/10.1007/s11227-018-2660-7.
Texto completoSalman, Mahdi Abed, Hasanain Ali Al Essa y Khaldoon Alhussayni. "A Distributed Approach for Disk Defragmentation". JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences 26, n.º 3 (9 de enero de 2018): 1–5. http://dx.doi.org/10.29196/jub.v26i3.548.
Texto completoPei, Xin, Huiqun Yu y Guisheng Fan. "Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing". International Journal of Software Engineering and Knowledge Engineering 25, n.º 09n10 (noviembre de 2015): 1709–14. http://dx.doi.org/10.1142/s0218194015710047.
Texto completoMariam O. Alrashidi, Mariam O. Alrashidi. "A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud Service Providers". journal of King Abdulaziz University Computing and Information Technology Sciences 8, n.º 2 (8 de marzo de 2019): 69–92. http://dx.doi.org/10.4197/comp.8-2.6.
Texto completoTesis sobre el tema "Fragmentation (computing)"
Kapusta, Katarzyna. "Protecting data confidentiality combining data fragmentation, encryption, and dispersal over a distributed environment". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0061.
Texto completoThis thesis dissertation revisits state-of-the-art fragmentation techniques making them faster and cost-efficient. The main focus is put on increasing data confidentiality without deteriorating the processing performance. The ultimate goal is to provide a user with a set of fast fragmentation methods that could be directly applied inside an industrial context to reinforce the confidentiality of the stored data and/or accelerate the fragmentation processing. First, a rich survey on fragmentation as a way of preserving data confidentiality is presented. Second, the family of all-or-nothing transforms is extended with three new proposals. They all aim at protecting encrypted and fragmented data against the exposure of the encryption key but are designed to be employed in three different contexts: for data fragmentation in a multi-cloud environment, a distributed storage system, and an environment composed of one storage provider and one private device. Third, a way of accelerating fragmentation is presented that achieves better performance than data encryption using the most common symmetric-key encryption algorithm. Fourth, a lightweight fragmentation scheme based on data encoding, permuting, and dispersing is introduced. It totally gets rid of data encryption allowing the fragmentation to be performed even faster; up to twice as fast as data encryption. Finally, fragmentation inside sensor networks is revisited, particularly in the Unattended Wireless Sensor Networks. The main focus in this case is put not solely on the fragmentation performance, but also on the reduction of storage and transmission costs by using data aggregation
Ahuja, Ankit. "Contextinator: Recreating the context lost amid information fragmentation on the web". Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23120.
Texto completoMaster of Science
Denis, Bacelar Ana Maria. "Isomeric ratios of high-spin states in neutron-deficient N≈126 nuclei produced in projectile fragmentation reactions". Thesis, University of Brighton, 2012. https://research.brighton.ac.uk/en/studentTheses/62edb7eb-7e42-4e1e-be42-6926ccf600d0.
Texto completoCherrueau, Ronan-Alexandre. "Un langage de composition des techniques de sécurité pour préserver la vie privée dans le nuage". Thesis, Nantes, Ecole des Mines, 2016. http://www.theses.fr/2016EMNA0233/document.
Texto completoA cloud service can use security techniques to ensure information privacy. These techniques protect privacy by converting the client’s personal data into unintelligible text. But they can also cause the loss of some functionalities of the service. For instance, a symmetric-key cipher protects privacy by converting readable personal data into unreadable one. However, this causes the loss of computational functionalities on this data.This thesis claims that a cloud service has to compose security techniques to ensure information privacy without the loss of functionalities. This claim is based on the study of the composition of three techniques: symmetric cipher, vertical data fragmentation and client-side computation. This study shows that the composition makes the service privacy preserving, but makes its formulation overwhelming. In response, the thesis offers a new language for the writing of cloud services that enforces information privacy using the composition of security techniques. This language comes with a set of algebraic laws to systematically transform a local service without protection into its cloud equivalent protected by composition. An Idris implementation harnesses the Idris expressive type system to ensure the correct composition of security techniques. Furthermore, an encoding translates the language intoProVerif, a model checker for automated reasoning about the security properties found in cryptographic protocols. This translation checks that the service preserves the privacy of its client
Solat, Siamak. "Novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture using innovative sharding to enable the use of BFT consensus mechanisms in very large-scale networks". Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7025.
Texto completoThis PhD thesis consists of 6 Chapters. In the first Chapter, as an introduction, we provide an overview of the general goals and motives of decentralized and permissionless networks, as well as the obstacles they face. In the introduction, we also refer to the irrational and illogical solution, known as "permissioned blockchain" that has been proposed to improve the performance of networks similar to Bitcoin. This matter has been detailed in Chapter 5. In Chapter 2, we make clear and intelligible the systems that the proposed idea, Parallel Committees, is based on such networks. We detail the indispensable features and essential challenges in replication systems. Then in Chapter 3, we discuss in detail the low performance and scalability limitations of replication systems that use consensus mechanisms to process transactions, and how these issues can be improved using the sharding technique. We describe the most important challenges in the sharding of distributed replication systems, an approach that has already been implemented in several blockchain-based replication systems and although it has shown remarkable potential to improve performance and scalability, yet current sharding techniques have several significant scalability and security issues. We explain why most current sharding protocols use a random assignment approach for allocating and distributing nodes between shards due to security reasons. We also detail how a transaction is processed in a sharded replication system, based on current sharding protocols. We describe how a shared-ledger across shards imposes additional scalability limitations and security issues on the network and explain why cross-shard or inter-shard transactions are undesirable and more costly, due to the problems they cause, including atomicity failure and state transition challenges, along with a review of proposed solutions. We also review some of the most considerable recent works that utilize sharding techniques for replication systems. This part of the work has been published as a peer-reviewed book chapter in "Building Cybersecurity Applications with Blockchain Technology and Smart Contracts" (Springer, 2023). In Chapter 4, we propose a novel sharding technique, Parallel Committees, supporting both processing and storage/state sharding, to improve the scalability and performance of distributed replication systems that use a consensus to process clients' requests. We introduce an innovative and novel approach of distributing nodes between shards, using a public key generation process that simultaneously mitigates Sybil attack and serves as a proof-of-work mechanism. Our approach effectively reduces undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions. The proposed idea has been published as peer-reviewed conference proceedings in the IEEE BCCA 2023. We then explain why we do not make use of a blockchain structure in the proposed idea, an issue that is discussed in great detail in Chapter 5. This clarification has been published in the Journal of Software (JSW), Volume 16, Number 3, May 2021. And, in the final Chapter of this thesis, Chapter 6, we summarize the important points and conclusions of this research
Kao, Chen-Kang y 高振綱. "Utilization of Resource Fragmentation in High-Performance Computing System". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/00939400485072812169.
Texto completo國立交通大學
資訊科學與工程研究所
103
In high-performance computing (HPC) systems, resources are al-located to users according to configurable scheduling policies. Unfor-tunately, these policies often create resource fragments which reduce overall resource utilization. In this paper, we propose an HPC archi-tecture which maximizes the resource utilization by allocating unused resource fragments for jobs which are malleable in the sense that these jobs can be created and terminated at any time without severe penalties. Hence, the whole HPC system can utilize almost 100% of its computing resources by filling its schedule with these malleable jobs. Malleable job computation can then be offered at a lower price for potential cus-tomers, allowing for multi-pricing schemes for the HPC system pro-vider.
Zhang, Qingan. "Detailed Modeling of Soot Formation/Oxidation in Laminar Coflow Diffusion Flames". Thesis, 2009. http://hdl.handle.net/1807/19251.
Texto completoLibros sobre el tema "Fragmentation (computing)"
Tierney, Margaret. Thef ormation and fragmentation of computing as an occupation: A review of shifting 'expertise'. Edinburgh: Research Centre for Social Sciences, University of Edinburgh, 1991.
Buscar texto completoCapítulos de libros sobre el tema "Fragmentation (computing)"
Ghosh, Debdulal y Jitendra Kumar. "Existence of Equilibrium Solution of the Coagulation–Fragmentation Equation with Linear Fragmentation Kernel". En Mathematics and Computing, 295–303. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2095-8_23.
Texto completoCoffman, Ed. "Computer Storage Fragmentation: Pioneering Work of Brian Randell". En Dependable and Historic Computing, 174–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24541-1_14.
Texto completoMishra, Rakesh Kumar, Rashmikiran Pandey, Sankhayan Choudhury y Nabendu Chaki. "Device Fragmentation: A Case Study using “NeSen”". En Advances in Intelligent Systems and Computing, 411–21. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3373-5_41.
Texto completoAlsirhani, Amjad, Peter Bodorik y Srinivas Sampalli. "Data Fragmentation Scheme: Improving Database Security in Cloud Computing". En Recent Trends in Computer Applications, 115–38. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-89914-5_8.
Texto completoScheubert, Kerstin, Franziska Hufsky, Florian Rasche y Sebastian Böcker. "Computing Fragmentation Trees from Metabolite Multiple Mass Spectrometry Data". En Lecture Notes in Computer Science, 377–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20036-6_36.
Texto completoDharavath, Ramesh, Vikas Kumar, Chiranjeev Kumar y Amit Kumar. "An Apriori-Based Vertical Fragmentation Technique for Heterogeneous Distributed Database Transactions". En Intelligent Computing, Networking, and Informatics, 687–95. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1665-0_69.
Texto completoFabre, Jean-Charles, Yves Deswarte y Brian Randell. "Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: an Object-Oriented Approach". En Predictably Dependable Computing Systems, 173–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 1995. http://dx.doi.org/10.1007/978-3-642-79789-7_11.
Texto completoFabre, Jean-Charles, Yves Deswarte y Brian Randell. "Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach". En Dependable Computing — EDCC-1, 21–38. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58426-9_122.
Texto completoGayathri Devi, K., S. Raksha y Kavitha Sooda. "Enhancing Restore Speed of In-line Deduplication Cloud-Based Backup Systems by Minimizing Fragmentation". En Smart Intelligent Computing and Applications, 9–21. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_2.
Texto completoCastillo-García, Abraham, Lisbeth Rodríguez-Mazahua, Felipe Castro-Medina, Beatriz A. Olivares-Zepahua y María A. Abud-Figueroa. "A Review of Horizontal Fragmentation Methods Considering Multimedia Data and Dynamic Access Patterns". En Advances in Intelligent Systems and Computing, 69–82. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89909-7_6.
Texto completoActas de conferencias sobre el tema "Fragmentation (computing)"
Odom, William, John Zimmerman, Jodi Forlizzi, Ana López Higuera, Mauro Marchitto, José Cañas, Youn-kyung Lim et al. "Fragmentation and transition". En CHI '13: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2470654.2466242.
Texto completoGhali, Cesar, Ashok Narayanan, David Oran, Gene Tsudik y Christopher A. Wood. "Secure Fragmentation for Content-Centric Networks". En 2015 IEEE 14th International Symposium on Network Computing and Applications (NCA). IEEE, 2015. http://dx.doi.org/10.1109/nca.2015.34.
Texto completoAlsirhani, Amjad, Peter Bodorik y Srinivas Sampalli. "Improving Database Security in Cloud Computing by Fragmentation of Data". En 2017 International Conference on Computer and Applications (ICCA). IEEE, 2017. http://dx.doi.org/10.1109/comapp.2017.8079737.
Texto completoAndreas, Andreou, Constandinos X. Mavromoustakis, Jordi Mongay Batalla, Evangelos Markakis y George Mastorakis. "Ensuring Confidentiality of Healthcare Data Using Fragmentation in Cloud Computing". En GLOBECOM 2023 - 2023 IEEE Global Communications Conference. IEEE, 2023. http://dx.doi.org/10.1109/globecom54140.2023.10436812.
Texto completoMrabti, Almokhtar Ait El, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman y Mina De Montfort. "Mobile app security by fragmentation "MASF"". En ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3036371.
Texto completoGoovaerts, Griet, Bert Vandenberk, Carolina Varon, Rik Willems y Sabine Van Huffel. "Phase:Rectified Signal Averaging for Automatic Detection of QRS Fragmentation". En 2016 Computing in Cardiology Conference. Computing in Cardiology, 2016. http://dx.doi.org/10.22489/cinc.2016.186-403.
Texto completoDai, Tianxiang, Haya Shulman y Michael Waidner. "Poster: Fragmentation Attacks on DNS over TCP". En 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00118.
Texto completoDai, Tianxiang, Haya Shulman y Michael Waidner. "Poster: Fragmentation Attacks on DNS over TCP". En 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 2021. http://dx.doi.org/10.1109/icdcs51616.2021.00118.
Texto completoCreedon, Eoin y Michael Manzke. "Impact of Fragmentation Strategy on Ethernet Performance". En 2009 Sixth IFIP International Conference on Network and Parallel Computing (NPC). IEEE, 2009. http://dx.doi.org/10.1109/npc.2009.15.
Texto completoChristos, B., K. Vaggelis y M. Ioannis. "Web page fragmentation for personalized portal construction". En International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286475.
Texto completo