Littérature scientifique sur le sujet « Cloud computing – Popular works »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Cloud computing – Popular works ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Cloud computing – Popular works"

1

Djamba, Kalema Josue. « Cloud-Based Centralizing system for academic history, plagiarism prevention management in Higher Education Institution IN DRC : Benefit, Challenges ». British Journal of Multidisciplinary and Advanced Studies 3, no 2 (16 décembre 2022) : 142–52. http://dx.doi.org/10.37745/bjmas.2022.0062.

Texte intégral
Résumé :
Cloud computing is becoming increasingly popular in the twenty-first century, with demand coming from all sectors of industry, including higher education institutions. In this paper, we address the benefits and limitations of cloud computing in the context of higher education institutions in DRC. Adopting modern cloud computing technology is projected to minimize the cost of IT-based solutions and services, as well as ICT infrastructure. The purpose of this work is to establish a system on cloud based that will enable the centralization and exchange of data on students' academic careers, to prevent plagiarism, to avoid fraud and falsification of transcripts, Share the researches and academic works between the universities to avoid plagiarism. Many challenges must be resolved before cloud computing can be successfully deployed in higher education.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Karthiga, T. « Cloud Based Video on Demand (VoD) Using DCRP Algorithm ». Asian Journal of Computer Science and Technology 1, no 1 (5 mai 2012) : 107–10. http://dx.doi.org/10.51983/ajcst-2012.1.1.1662.

Texte intégral
Résumé :
The attempt to display media files through internet was started from mid-20th century. Several research works have been reported to provide Video on Demand model in distributed like RMI, SOA and Grid Computing. Internet-based cloud computing is a new computing paradigm aiming to provide agile and scalable resource access in a utility-like fashion. The fundamental question is how to configure the cloud utility to meet the highly dynamic demands of such applications at a modest cost. In this paper, a queueing network based model is used to characterize the viewing behaviors of users in a multichannel VoD application, and derive the server capacities needed to support smooth playback in the channels for two popular streaming models, client-server and P2P.Disk Scheduling is used to allocate separate disks to users. A dynamic cloud resource provisioning algorithm is used in which the derived capacities and instantaneous network statistics as inputs, can effectively support VoD streaming with low cloud utilization cost. Analysis and algorithm design are verified and extensively evaluated by applying large-scale experiments under dynamic realistic settings on a cloud platform.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Xiangyang, Zhu, Dai Hua, Yi Xun, Yang Geng et Li Xiao. « MUSE : An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data ». Security and Communication Networks 2017 (2017) : 1–17. http://dx.doi.org/10.1155/2017/1923476.

Texte intégral
Résumé :
With the development of cloud computing, services outsourcing in clouds has become a popular business model. However, due to the fact that data storage and computing are completely outsourced to the cloud service provider, sensitive data of data owners is exposed, which could bring serious privacy disclosure. In addition, some unexpected events, such as software bugs and hardware failure, could cause incomplete or incorrect results returned from clouds. In this paper, we propose an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data based on hierarchical agglomerative clustering, which is named MUSE. In order to improve the efficiency of text searching, we proposed a novel index structure, HAC-tree, which is based on a hierarchical agglomerative clustering method and tends to gather the high-relevance documents in clusters. Based on the HAC-tree, a noncandidate pruning depth-first search algorithm is proposed, which can filter the unqualified subtrees and thus accelerate the search process. The secure inner product algorithm is used to encrypted the HAC-tree index and the query vector. Meanwhile, a completeness verification algorithm is given to verify search results. Experiment results demonstrate that the proposed method outperforms the existing works, DMRS and MRSE-HCI, in efficiency and accuracy, respectively.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sang, Yongxuan, Junqiang Cheng, Bo Wang et Ming Chen. « A three-stage heuristic task scheduling for optimizing the service level agreement satisfaction in device-edge-cloud cooperative computing ». PeerJ Computer Science 8 (18 janvier 2022) : e851. http://dx.doi.org/10.7717/peerj-cs.851.

Texte intégral
Résumé :
Device-edge-cloud cooperative computing is increasingly popular as it can effectively address the problem of the resource scarcity of user devices. It is one of the most challenging issues to improve the resource efficiency by task scheduling in such computing environments. Existing works used limited resources of devices and edge servers in preference, which can lead to not full use of the abundance of cloud resources. This article studies the task scheduling problem to optimize the service level agreement satisfaction in terms of the number of tasks whose hard-deadlines are met for device-edge-cloud cooperative computing. This article first formulates the problem into a binary nonlinear programming, and then proposes a heuristic scheduling method with three stages to solve the problem in polynomial time. The first stage is trying to fully exploit the abundant cloud resources, by pre-scheduling user tasks in the resource priority order of clouds, edge servers, and local devices. In the second stage, the proposed heuristic method reschedules some tasks from edges to devices, to provide more available shared edge resources for other tasks cannot be completed locally, and schedules these tasks to edge servers. At the last stage, our method reschedules as many tasks as possible from clouds to edges or devices, to improve the resource cost. Experiment results show that our method has up to 59% better performance in service level agreement satisfaction without decreasing the resource efficiency, compared with eight of classical methods and state-of-the-art methods.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Yogi, Manas Kumar, K. Ganga et Devi Bhavani. « Green IOT : Principles, Current Trends, Future Directions ». International Journal of Advance Research and Innovation 6, no 3 (2018) : 27–32. http://dx.doi.org/10.51976/ijari.631805.

Texte intégral
Résumé :
The two trending and popular technologies are Cloud Computing (CC) and the Internet of Things (IoT) are current hot discussions in the field of agriculture and healthcare applications. Motivated by achieving a sustainable world, this paper discusses various technologies and issues regarding green cloud computing and green Internet of Things, further improves the discussion with the reduction in energy consumption of the two techniques (CC and IoT) combination in agriculture and healthcare systems. The history and concept of the hot green information and communications technologies (ICT’s) which are enabling green IoT will be discussed. Green computing introduction first and later focuses on the recent works done regarding the emerging technologies. Finally, lists out the advantages, challenges, and future research directions related to green application design. Our research aims to make green area broad and contribution to sustainable application world.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Luo, Yingyu. « Semantic Characteristics of the Emerging Popular Construction "Cloud X" in Modern Chinese Language ». Transactions on Social Science, Education and Humanities Research 7 (6 mai 2024) : 134–43. http://dx.doi.org/10.62051/8njcxg38.

Texte intégral
Résumé :
Accompanied by the development of the Internet and big data, "cloud X" has become a popular construction that is more frequently used in the Internet in recent years. Studying and analyzing the generation mechanism and evolution process of "Cloud X" is of great reference significance for understanding the development of popular words in the new period and the word formation process of popular words. Therefore, this paper analyzes the popular word "cloud X" from the semantic perspective, taking the semantic evolution of "Yun (cloud)" as the entry point. In the process of exploring "Yun (cloud)", this paper will focus on the transformation of the semantic features of "Yun (cloud)", observing the original meaning of "Yun (cloud)",Yun (cloud)" in "cloud computing", and the semantic features of "Yun (cloud)" after "cloud X" has become a construction. By examining the similarities and differences of the semantic features, we can explore the process of "Yun (cloud)" gradually changing from a real word to a class of affixes and the reasons for the change.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Narawade, Dr Navnath. « Campus Automation Using Cloud Computing ». INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no 04 (20 avril 2024) : 1–5. http://dx.doi.org/10.55041/ijsrem31117.

Texte intégral
Résumé :
The project, we propose is “Campus automation”, which is considered a website for a college, the main aim of this project is to change college website content dynamically online and provide a user interface application. The above aim can be established by creating a layout Structural module and each module may have a sub-module. This will provide information about the college campus in which staff, students, and HOD can access this information and will be familiar with the college campus. When campus automation technology is integrated with popular web services it can be utilized securely by an even larger audience. By leveraging the power of cloud computing, the system offers scalability, reliability, and accessibility. It allows users to access the platform from anywhere, at any time, using a web browser, thereby facilitating seamless collaboration and communication among stakeholders. Overall, the proposed Campus Automation System aims to modernize campus management processes, streamline administrative tasks, improve communication, and enhance the overall efficiency of educational institutions. By harnessing the capabilities of cloud computing and the MERN stack, the system promises to deliver a robust, scalable, and user-friendly solution tailored to the needs of modern educational institutions. Key Words: Campus automation, cloud computing, MERN stack, web services
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wasim Akram, Sk, Dr P. Rajesh et SK Shama. « A review report on challenges and opportunities of edge, fog and cloud computing by employing IoT technology ». International Journal of Engineering & ; Technology 7, no 3.29 (24 août 2018) : 263. http://dx.doi.org/10.14419/ijet.v7i3.29.18808.

Texte intégral
Résumé :
In the future, various information and things will be connected to the network. People can now live more convenient and comfortable life where the things and information coordinated together. A world where things are connected to network is referred as IOT (Internet of Things). A huge amount of incomplete data is generated by IOT need to process and responded to very short time. This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed. To achieve this objective, cloud computing is a treated as one of the popular choice due to its scalability, storage, computational and other capabilities. However current cloud models are not intended to handle the essentials of IOT– volume, variety, and velocity of data. Moreover, as the physical distance between cloud and user increases, transmission latency increases with it, increasing response time and stressing of the user. In addition to that, the processing speed in this environment is largely dependent on the performance of user device. The viable solution to these problems is identified as Edge Computing. The Edge Computing platform works by allowing some application processing to be performed by a small edge server position between the cloud and user, and crucially in a location physically closed to the user. This paper comprehensively presents various research trends that are available in Edge, Fog computing along with a comparison is made among Cloud. Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Antonova, Аlfiia, et Svitlana Bartkova. « An overview of the advantages of cloud computing and online IDE ». Automation of technological and business processes 12, no 3 (5 novembre 2020) : 47–50. http://dx.doi.org/10.15673/atbp.v12i3.1927.

Texte intégral
Résumé :
The article discusses cloud computing and their impact on the field of software development, and analyzes several issues of developers that can be solved using the online IDE. Usage of cloud computing in the enterprise is not new, and it is not difficult in terms of implementation. That is why it is gaining popularity. First, due to the large number of technologies that allow you to optimize internal processes. Secondly, due to the large number of giant companies and small businesses that use these technologies. Cloud computing is very interesting in financial terms. After all, they allow not spending money on building and supporting the infrastructure. One can also not worry about risks, such as, for example, equipment that affects the system, weather conditions, and so on. It takes on all these moments. Evolving of architectural solutions also increases the impact on cloud technology. A service-oriented approach to software development is becoming increasingly popular. It is less and less possible to see the usual thin client and a single server-monolith. Clients are becoming more complex, attracting part of the business logic, servers are divided into parts, each of which is responsible for a particular part of the subject area, and in some cases may not know about the existence of others. The IDE, which requires developers for programming, also has analogs on the web platform. The online IDE has its advantages for solving some tasks and has become increasingly popular lately. Users of the online IDE can create, run, and customize software that works with a simple browser. The main goal of this study is to determine the main advantages of cloud technologies in the application development process, analyze the segment of online IDE. Based on these data to identify the main situations that determine their use, predict further development, and identify principles and technologies used in this area.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Carvalho, Juliana, Dario Vieira, Christiano Rodrigues et Fernando Trinta. « LM2K Model for Hosting an Application Based on Microservices in Multi-Cloud ». Sensors 23, no 9 (2 mai 2023) : 4450. http://dx.doi.org/10.3390/s23094450.

Texte intégral
Résumé :
Cloud computing has become a popular delivery model service, offering several advantages. However, there are still challenges that need to be addressed when applying the cloud model to specific scenarios. Two of such challenges involve deploying and executing applications across multiple providers, each comprising several services with similar functionalities and different capabilities. Therefore, dealing with application distributions across various providers can be a complex task for a software architect due to the differing characteristics of the application components. Some works have proposed solutions to address the challenges discussed here, but most of them focus on service providers. To facilitate the decision-making process of software architects, we previously presented PacificClouds, an architecture for managing the deployment and execution of applications based on microservices and distributed in a multi-cloud environment. Therefore, in this work, we focus on the challenges of selecting multiple clouds for PacificClouds and choosing providers that best meet the microservices and software architect requirements. We propose a selection model and three approaches to address various scenarios. We evaluate the performance of the approaches and conduct a comparative analysis of them. The results demonstrate their feasibility regarding performance.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Cloud computing – Popular works"

1

Anderson, Joanna M., et Wendy Doucette. « Instant, Easy, Free Cloud Computing With Google and Microsoft 365 ». Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/388.

Texte intégral
Résumé :
Getting into the cloud is easier than you think, and its advantages are immediate. Would you like a backup of all your files you can access from anywhere? How about keeping all your files in sync and editing and sharing them with a group, from wherever you all are? We will discuss the advantages of the Google and Microsoft cloud suites, and why both are better than Dropbox or other standalone storage services. If you and your patrons are interested in a synchronized mailbox and calendar with free access to documents, spreadsheets, forms, presentation software and more, we’ll show you how to get started, increase your productivity and streamline your life.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Tolley, Rebecca. « Review of Getting Started with Cloud Computing : A LITA Guide ». Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/5620.

Texte intégral
Résumé :
Review of Getting Started with Cloud Computing: A LITA Guide. Eds. Edward M. Corrado and Heather Lea Moulaison. New York: Neal-Schuman Publisher, Inc., 2011. 214p. alk. paper, $65 (ISBN 9781555707491).
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Cloud computing – Popular works"

1

Hurwitz, Judith. Hybrid cloud for dummies. Hoboken, New Jersey : John Wiley & Sons, Inc., 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

McGrath, Alister E. A cloud of witnesses : Ten great Christian thinkers. Grand Rapids, Mich : Zondervan Pub. House, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

McGrath, Alister E. A cloud of witnesses : Ten great Christian thinkers. Leicester, England : Inter-Varsity Press, 1990.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Miller, Darby. Talking back : Custom-made online computing. Englewood Cliffs, N.J : Micro Text Publications, 1985.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

White, Ron. PC/Computing how computers work. Emeryville, Calif : Ziff-Davis Press, 1993.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Chartier, Timothy P. Math bytes : Google bombs, chocolate-covered pi, and other cool bits in computing. Princeton, NJ, USA : Princeton University Press, 2014.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Watson, Ian. The universal machine : From the dawn of computing to digital consciousness. New York : Copernicus Books, 2012.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Williams, Colin P. Ultimate zero and one : Computing at the quantum frontier. New York : Copernicus, 2000.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Parsons, June Jamrich. Computer concepts. 7e éd. Australia : Course Technology Cengage Learning, 2009.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Dan, Oja, dir. Computer concepts : Illustrated, brief. 6e éd. Boston, Mass : Thomson/Course Technology, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Cloud computing – Popular works"

1

García-López, Pedro, Marc Sánchez-Artigas, Simon Shillaker, Peter Pietzuch, David Breitgand, Gil Vernik, Pierre Sutra, Tristan Tarrant, Ana Juan-Ferrer et Gerard París. « Trade-Offs and Challenges of Serverless Data Analytics ». Dans Technologies and Applications for Big Data Value, 41–61. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78307-5_3.

Texte intégral
Résumé :
AbstractServerless computing has become very popular today since it largely simplifies cloud programming. Developers do no longer need to worry about provisioning or operating servers, and they have to pay only for the compute resources used when their code is run. This new cloud paradigm suits well for many applications, and researchers have already begun investigating the feasibility of serverless computing for data analytics. Unfortunately, today’s serverless computing presents important limitations that make it really difficult to support all sorts of analytics workloads. This chapter first starts by analyzing three fundamental trade-offs of today’s serverless computing model and their relationship with data analytics. It studies how by relaxing disaggregation, isolation, and simple scheduling, it is possible to increase the overall computing performance, but at the expense of essential aspects of the model such as elasticity, security, or sub-second activations, respectively. The consequence of these trade-offs is that analytics applications may well end up embracing hybrid systems composed of serverless and serverful components, which we call ServerMix in this chapter. We will review the existing related work to show that most applications can be actually categorized as ServerMix.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Venkatesh, K., R. Velvizhi, K. Selva Banu Priya et N. Sivaranjani. « Deep Dive on Popular Security Models and Strategies of Cloud Computing ». Dans Privacy and Security Challenges in Cloud Computing, 147–70. Boca Raton : CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zhang, Yan. « Mobile Edge Computing ». Dans Simula SpringerBriefs on Computing, 9–21. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83944-4_2.

Texte intégral
Résumé :
AbstractMobile edge computing is a promising paradigm that brings computing resources to mobile users at the network edge, allowing computing-intensive and delay-sensitive applications to be quickly processed by edge servers to satisfy the requirements of mobile users. In this chapter, we first introduce a hierarchical architecture of mobile edge computing that consists of a cloud plane, an edge plane, and a user plane. We then introduce three typical computation offloading decisions. Finally, we review state-of-the-art works on computation offloading and present the use case of joint computation offloading.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Kannan, M., C. Priya, L. William Mary, S. Madhan et V. Sri Priya. « Effective Role of Cloud-Based IoT Technology in Smart and Precision Horticulture Works : A Novel ». Dans Intelligent Computing and Innovation on Data Science, 69–79. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3284-9_9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Chang, Ruay-Shiung, et Jih-Sheng Chang. « Pervasive Grid and its Applications ». Dans Grid and Cloud Computing, 260–71. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0879-5.ch112.

Texte intégral
Résumé :
With the advancements of computer system and communication technologies, Grid computing can be seen as the popular technology bringing about significant revolution for the next generation distributed computing application. As regards general users, a grid middleware is complex to setup and necessitates a steep learning curve. How to access to the grid system transparently from the point of view of users turns into a critical issue then. Therefore, various challenges may arise from the incomprehensive system design as coordinating existing computing resources for the sake of achieving pervasive grid environment. The authors are going to investigate into the current research works of pervasive grid as well as analyze the most important factors and components for constructing a pervasive grid system here. Finally, in order to facilitate the efficiency in respect of teaching and research within a campus, they would like to introduce their pervasive grid platform.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Faheem, Muhammad, Mohand-Tahar Kechadi et Nhien An Le-Khac. « The State of the Art Forensic Techniques in Mobile Cloud Environment ». Dans Mobile Computing and Wireless Networks, 2111–31. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8751-6.ch092.

Texte intégral
Résumé :
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Chitra, M. P., R. S. Ponmagal, N. P. G. Bhavani et V. Srividhya. « An Approach to Cloud Computing for Medical Image Analysis ». Dans AI Innovation in Medical Imaging Diagnostics, 164–93. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3092-4.ch010.

Texte intégral
Résumé :
Cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major problems facing cloud service providers and their customers. Cloud data allocation facilities that allow groups of users to work together to access the shared data are the most standard and effective working styles in the enterprises. So, in spite of having advantages of scalability and flexibility, cloud storage service comes with confidential and security concerns. A direct method to defend the user data is to encrypt the data stored at the cloud. In this research work, a secure cloud model (SCM) that contains user authentication and data scheduling approach is scheduled. An innovative digital signature with chaotic secure hashing (DS-CS) is used for user authentication, followed by an enhanced work scheduling based on improved genetic algorithm to reduce the execution cost.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Rathore, Maya, et Ugrasen Suman. « A Collaborative Ranking Approach for Discovery and Selection of Cloud Services ». Dans Encyclopedia of Information Science and Technology, Fifth Edition, 190–206. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3479-3.ch015.

Texte intégral
Résumé :
Cloud computing is getting more popular due to its extraordinary features such as on-demand availability of computing resources and software services. A variety of services have been deployed to offer analogous functionalities. However, the difficulty to identify reliable services has fascinated the attention of researchers. Thus, the trust and reputation concept have been introduced to evaluate the trustworthiness of services over cloud. Most of the existing research works fully trust on service user's feedback rating for ranking cloud services, which may often lead to biasness towards positive and negative feedback rating. To avoid aforementioned issues, this chapter proposes a novel approach to evaluate cloud service reputation along with cloud service reputation evaluation model to discover reliable cloud services. Experimental result shows that proposed approach provides effective solution for prediction of cloud service reputation, which can be helpful in performing reliable service discovery and selection over cloud.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Faheem, Muhammad, Mohand-Tahar Kechadi et Nhien An Le-Khac. « The State of the Art Forensic Techniques in Mobile Cloud Environment ». Dans Web-Based Services, 2324–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch103.

Texte intégral
Résumé :
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Mishra, Nilamadhab, Basanta Kumar Padhi et Banaja Basini Rath. « Mobile Cloud Computing Framework for an Android-Based Metaverse Ecosystem Platform ». Dans Advances in Computational Intelligence and Robotics, 237–54. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8851-5.ch012.

Texte intégral
Résumé :
Mobile cloud computing (MCC), which combines mobile computing and cloud computing, has become one of the industry's most common terms and a major topic of discussion in the IT world. Mobile clients are becoming popular clients for consuming any web resources, particularly web services (WS), as mobile network infrastructures improve. However, there are problems connecting mobile devices to existing WS. This research focuses on three of the following challenges: loss of connection, bandwidth, latency, and limited resources. This research proposes to develop and implement a cross-platform architecture for connecting mobile devices to the web. The architecture includes mobile service clients that work on any platform and a Metaverse ecosystem that makes it easier for mobile clients and WS to talk to each other. Finally, the Metaverse ecosystem can be deployed on the cloud metaverse platform, which may create more immersive and dynamic virtual worlds that are accessible to a wider audience by utilizing the power of the cloud.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Cloud computing – Popular works"

1

R. S, Bala Kumar, et Sujitha R. « Efficient Privacy-Preserving Biometric Identification in Cloud Computing ». Dans The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Texte intégral
Résumé :
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Jiang, Fan, Carson Kai-Sang Leung et Syed K. Tanbeer. « Finding Popular Friends in Social Networks ». Dans 2012 International Conference on Cloud and Green Computing (CGC). IEEE, 2012. http://dx.doi.org/10.1109/cgc.2012.99.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cui, Anqi, Min Zhang, Yiqun Liu et Shaoping Ma. « Are the URLs really popular in microblog messages ? » Dans 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045021.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Jiang, Fan, Carson Kai-Sang Leung, Dacheng Liu et Aaron M. Peddle. « Discovery of Really Popular Friends from Social Networks ». Dans 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud). IEEE, 2014. http://dx.doi.org/10.1109/bdcloud.2014.110.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Devi, Niketa, Dr Deepak Asrani et Dr Komal Asrani. « A Critical Review on Cloud Brokerage Services ». Dans Computing for Sustainable Innovation : Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.1.

Texte intégral
Résumé :
Cloud Brokerage Service (CBS) budding technology that has become popular with cloud computing. CBS is a middleman providing value added services. This paper provides a systematic literature review on this topic, covering multiple publications during last preceding 10 years. The paper is aiming to provide an overview of CBS research status, and give suggestions on how CBS research should proceed.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zinn, Daniel, Quinn Hart, Bertram Ludascher et Yogesh Simmhan. « Streaming satellite data to cloud workflows for on-demand computing of environmental data products ». Dans 2010 5th Workshop on Workflows in Support of Large-Scale Science (WORKS). IEEE, 2010. http://dx.doi.org/10.1109/works.2010.5671841.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zhu, Li, et Xiangtao Qi. « Research on The Construction of Ontology-based Music Works Knowledge Base ». Dans ICCBDC 2023 : 2023 7th International Conference on Cloud and Big Data Computing. New York, NY, USA : ACM, 2023. http://dx.doi.org/10.1145/3616131.3616143.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Saab, Salwa Adriana, Ali Chehab et Ayman Kayssi. « Energy efficiency in Mobile Cloud Computing : Total offloading selectively works. Does selective offloading totally work ? » Dans 2013 Fourth Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC). IEEE, 2013. http://dx.doi.org/10.1109/iceac.2013.6737657.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

S, Divya, et Gini R. « Enhancing Data Security in Cloud Computing using Block chain ». Dans The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Texte intégral
Résumé :
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Block chain and SDN in the cloud computing platform. In this research, we introduce the “DistB-SD Cloud” architecture to better secure clouds. Moreover, we leverage a distributed Block chain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BCbased implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Suciu, George, Muneeb Anwar et Roxana Mihalcioiu. « VIRTUALIZED VIDEO AND CLOUD COMPUTING FOR EFFICIENT ELEARNING ». Dans eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-114.

Texte intégral
Résumé :
Multimedia content has become more and more popular in current eLearning platforms. However, there are still many use cases which require virtualized resources from cloud platforms: gamification, video analytics, and surveillance during exams, video conferencing for coaching, and video streaming (live and video-on-demand) services. This paper has the purpose to present how video services can exploit the virtualization techniques to provide ubiquitous video learning experience. Virtualization consists of multiple operating systems on a single physical system. Virtualization shares the underlying hardware resources, providing multiple execution environments for software partitioning and time-sharing. Furthermore, virtualization is the basis for cloud computing, which is adaptable and secure sharing of resources as a service, leading to ease of use for different types of computing platforms. This gives to the teachers the authority to deploy their curricula to new channels and to promote it with efficient video communication solutions. It is expected, from this point of view, that virtualization will contribute in a beneficial way to these use cases. The main concept we present in this paper is how to virtualize the video services and utilizing them combined with other eLearning techniques, whereas the virtualization technique permits virtualization for full server machines along with the whole operating system. The main objective is to demonstrate they can be monitored and easily be maintained, as well being extremely secure and provide uninterrupted services. Furthermore, virtualized video using Cloud would establish and provide quality eLearning relationships regardless of distance and devices or operating systems, being accessible through a web browser.
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Cloud computing – Popular works"

1

Osadcha, Kateryna P., et Viacheslav V. Osadchyi. The use of cloud computing technology in professional training of future programmers. [б. в.], juin 2021. http://dx.doi.org/10.31812/123456789/4435.

Texte intégral
Résumé :
The article provides a brief analysis of the current state of the study of cloud technologies by future software engineers at foreign and Ukrainian universities. The author experience in the application of cloud technologies in the training of future software engineers in Ukraine is presented. The application of cloud business automation systems, online services to monitor the implementation of the software projects, Google services for collaboration, planning and productivity while studying professional disciplines and carrying out diploma projects is described. Based on the survey conducted at Stackoverflow, the state of application of cloud technologies by software engineers around the world has been analyzed. The cloud technologies that are not studied at the analyzed universities of Ukraine and those that are not popular with software developers in the world, but studied at Ukrainian universities by future software engineers are outlined. Conclusions are made on the modernization of training programs for future software engineers. Topics for the study of cloud technologies by future software engineers in the content of professional disciplines are proposed.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie