Littérature scientifique sur le sujet « MOBILE STORAGE SHARING »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « MOBILE STORAGE SHARING ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "MOBILE STORAGE SHARING"

1

Jiang, Bing, Guo Yu Ma, Sheng Ma et Jian Feng Xie. « Mobile Sync Client Design of Cloud Storage System ». Applied Mechanics and Materials 464 (novembre 2013) : 358–64. http://dx.doi.org/10.4028/www.scientific.net/amm.464.358.

Texte intégral
Résumé :
This paper introduces the client design based on Android mobile sync of cloud storage system, including system architecture and its module design. Through the Android mobile sync client software, user can access the cloud server to implement some functions, such as upload and download, data backup and restore, file management and sharing in the distance. Under the LAN environment, the client system has successfully completed the tests of both function module and assembly verification. The results show that the whole system runs in good condition.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Delbracio, Mauricio, Damien Kelly, Michael S. Brown et Peyman Milanfar. « Mobile Computational Photography : A Tour ». Annual Review of Vision Science 7, no 1 (15 septembre 2021) : 571–604. http://dx.doi.org/10.1146/annurev-vision-093019-115521.

Texte intégral
Résumé :
The first mobile camera phone was sold only 20 years ago, when taking pictures with one's phone was an oddity, and sharing pictures online was unheard of. Today, the smartphone is more camera than phone. How did this happen? This transformation was enabled by advances in computational photography—the science and engineering of making great images from small-form-factor, mobile cameras. Modern algorithmic and computing advances, including machine learning, have changed the rules of photography, bringing to it new modes of capture, postprocessing, storage, and sharing. In this review, we give a brief history of mobile computational photography and describe some of the key technological components, including burst photography, noise reduction, and super-resolution. At each step, we can draw naive parallels to the human visual system.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zhang, En, Peiyan Yuan et Jiao Du. « Verifiable Rational Secret Sharing Scheme in Mobile Networks ». Mobile Information Systems 2015 (2015) : 1–7. http://dx.doi.org/10.1155/2015/462345.

Texte intégral
Résumé :
With the development of mobile network, lots of people now have access to mobile phones and the mobile networks give users ubiquitous connectivity. However, smart phones and tablets are poor in computational resources such as memory size, processor speed, and disk capacity. So far, all existing rational secret sharing schemes cannot be suitable for mobile networks. In this paper, we propose a verifiable rational secret sharing scheme in mobile networks. The scheme provides a noninteractively verifiable proof for the correctness of participants’ share and handshake protocol is not necessary; there is no need for certificate generation, propagation, and storage in the scheme, which is more suitable for devices with limited size and processing power; in the scheme, every participant uses her encryption on number of each round as the secret share and the dealer does not have to distribute any secret share; every participant cannot gain more by deviating the protocol, so rational participant has an incentive to abide by the protocol; finally, every participant can obtain the secret fairly (means that either everyone receives the secret, or else no one does) in mobile networks. The scheme is coalition-resilient and the security of our scheme relies on a computational assumption.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Komen, Leah. « “Here you can use it” : Understanding mobile phone sharing and the concerns it elicits in rural Kenya ». for(e)dialogue 1, no 1 (16 mars 2016) : 52–65. http://dx.doi.org/10.29311/for(e)dialogue.v1i1.532.

Texte intégral
Résumé :
Globally, mobile phones are mostly used as personal items largely due to their data storage and services provision. However, various features enable mobile phone sharing and this subverts the notion of a single individual use. In cultures where communal sharing is valued and seen as normal, it is natural for mobile phones to be incorporated into other traditionally shared support systems, such as meetings summoned by elders, which involve social, economic, cultural and political activities. This paper draws on a recent doctoral thesis to examine the role of mobile telephony in the social transformation and development of Marakwet, a sub-ethnic group of the Kalenjin community in the Rift Valley region of western Kenya. The paper argues that the adoption and domestication of mobile telephony is both innovative and a source of problems for the Marakwet, depending on how the device is used in everyday life. The paper shows that while mobile phone sharing amongst the Marakwet is the most preferred practice, privacy and data security are key concerns among users.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hu, Han, Yonggang Wen et Dusit Niyato. « Public Cloud Storage-Assisted Mobile Social Video Sharing : A Supermodular Game Approach ». IEEE Journal on Selected Areas in Communications 35, no 3 (mars 2017) : 545–56. http://dx.doi.org/10.1109/jsac.2017.2659478.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Daradkeh, Yousef Ibrahim, Mujahed ALdhaifallah et Dmitry Namiot. « Mobile Clouds for Smart Cities ». International Journal of Online Engineering (iJOE) 13, no 01 (18 janvier 2017) : 76. http://dx.doi.org/10.3991/ijoe.v13i01.6320.

Texte intégral
Résumé :
This paper is devoted to mobile cloud services in Smart City projects. As per mobile cloud computing paradigm, the data processing and storage are moved from the mobile device to a cloud. In the same time, Smart City services typically contain a set of applications with data sharing options. Most of the services in Smart Cities are actually mashups combined data from several sources. This means that access to all available data is vital to the services. And the mobile cloud is vital because the mobile terminals are one of the main sources for data gathering. In our work, we discuss criteria for selecting mobile cloud services.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kasai, Hiroyuki. « Implementation of distributed mobile storage and location-based message sharing among smart phones ». ACM SIGMOBILE Mobile Computing and Communications Review 16, no 4 (4 février 2013) : 20–21. http://dx.doi.org/10.1145/2436196.2436208.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Najwa, Nina Fadilah, Muhammad Ariful Furqon et Eki Saputra. « Ulasan Literatur : Faktor-Faktor yang Mempengaruhi Adopsi Mobile Cloud Computing pada Mahasiswa ». Ultimatics : Jurnal Teknik Informatika 12, no 2 (29 décembre 2020) : 72–79. http://dx.doi.org/10.31937/ti.v12i2.1836.

Texte intégral
Résumé :
Mobile Cloud Computing provides cloud storage services to users inside a cloud. This study focuses on the factors that influence the adoption of mobile cloud storage usage in the higher education. The research methods used in this study include: (1) problem formulation; (2) literature search; and (3) formulation of factors for adopting mobile cloud computing (4) validation and reliability test. The results obtained is a conceptual model that can be tested empirically. The main five factors are: (1) knowledge sharing variables; (2) Perceived usefulness variable (3) trust variable; (4) the attitude towards variable; and (5) the variable of behavioral intention of use. Each variable formulated in the conceptual model will be developed into items that are measurement indicators. The research contribution is in the form of a research model that is useful for empirical research on the factors of adoption of the use of Mobile Cloud Computing in the education sector.
Styles APA, Harvard, Vancouver, ISO, etc.
9

D, Uma Nandhini, Udhayakumar S, Latha Tamilselvan et Silviya Nancy J. « Client Aware Scalable Cloudlet to Augment Edge Computing with Mobile Cloud Migration Service ». International Journal of Interactive Mobile Technologies (iJIM) 14, no 12 (31 juillet 2020) : 165. http://dx.doi.org/10.3991/ijim.v14i12.14407.

Texte intégral
Résumé :
<p class="0abstract">Computing with mobile is still in its infancy due to its limitations of computational power, battery lifetime and storage capacity. These limitations hinder the growth of mobile computing, which in-turn affects the growth of computationally intensive applications developed for the mobile devices. So in-order to help execute complex applications within the mobile device, mobile cloud computing (MCC) emerged as a feasible solution. The job of offloading the task to the cloud data center for storage and execution from the mobile seems to gain popularity, however, issues related to network bandwidth, loss of mobile data connectivity, and connection setup does not augment well to extend the benefits offered by MCC. Cloudlet servers filled this gab by assisting the mobile cloud environment as an edge device, offering compute power to the connected devices with high speed wireless LAN connectivity. Implementation constraints of cloudlet faces severe challenges in-terms of its storage, network sharing, and VM provisioning. Moreover, the number of connected devices of the cloudlet and its load conditions vary drastically leading to unexpected bottleneck, in which case the availability to server becomes an issue. Therefore, a scalable cloudlet, Client Aware Scalable Cloudlet (CASC) is proposed with linear regression analysis, predicting the knowledge of expected load conditions for provisioning new virtual machines and to perform resource migration.</p>
Styles APA, Harvard, Vancouver, ISO, etc.
10

N.K, Sreelesh, et Santhosh Kumar B J. « An Advanced Hierarchical Attribute Based Encryption Access Control in Mobile Cloud Computing ». International Journal of Engineering & ; Technology 7, no 3.10 (15 juillet 2018) : 18. http://dx.doi.org/10.14419/ijet.v7i3.10.15621.

Texte intégral
Résumé :
Cloud computing is a revolutionary computing technique, by which computing resources are provided dynamically via Internet is widely popular. Since the most attractive part of cloud computing is computation outsourcing, it is far beyond enough to just conduct access control. Unfortunately, the data in the cloud is out of user’s control in most cases, privacy risks would rise dramatically due to the access of unauthorized users. The security of the data is the major concern. Coordinating mobile devices into cloud computing is a rising but encouraging illustration. The coordination happens in a cloud based multi-layered client information sharing condition. With the coordination of cloud computing with mobile devices may result in security issues such as information privacy and client rights.The proposed work makes use of a technology using Advanced Hierarchical Attribute Based Encryption (A-HABE) architecture, in which the data storage will be in hierarchical structure and the retrieval of data will also be in the form of access level. Data confidentiality should be guaranteed and the system should be resilient. The secure storage and sharing of data without the fear of an unauthorized access in the cloud can result in growth in many sectors.
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "MOBILE STORAGE SHARING"

1

Subbiah, Arun. « Efficient Proactive Security for Sensitive Data Storage ». Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Texte intégral
Résumé :
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and confidentiality properties of the data storage service. This dissertation investigates the design of a proactively-secure distributed data storage system. Data can be stored at storage servers using encoding schemes called secret sharing, or encryption-with-replication. The primary challenge is that the protocols that the servers run periodically to maintain integrity and confidentiality must scale with large amounts of stored data. Determining how much data can be proactively-secured in practical settings is an important objective of this dissertation. The protocol for maintain the confidentiality of stored data is developed in the context of data storage using secret sharing. We propose a new technique called the GridSharing framework that uses a combination of XOR secret sharing and replication for storing data efficiently. We experimentally show that the algorithm can secure several hundred GBs of data. We give distributed protocols run periodically by the servers for maintaining the integrity of replicated data under the mobile adversary model. This protocol is integrated into a document repository to make it proactively-secure. The proactively-secure document repository is implemented and evaluated on the Emulab cluster (http://www.emulab.net). The experimental evaluation shows that several 100 GBs of data can be proactively-secured. This dissertation also includes work on fault and intrusion detection - a necessary component in any secure system. We give a novel Byzantine-fault detection algorithm for quorum systems, and experimentally evaluate its performance using simulations and by deploying it in the AgileFS distributed file system.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Wu, Xi. « METADATA-BASED IMAGE COLLECTING AND DATABASING FOR SHARING AND ANALYSIS ». UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/80.

Texte intégral
Résumé :
Data collecting and preparing is generally considered a crucial process in data science projects. Especially for image data, adding semantic attributes when preparing image data provides much more insights for data scientists. In this project, we aim to implement a general-purpose central image data repository that allows image researchers to collect data with semantic properties as well as data query. One of our researchers has come up with the specific challenge of collecting images with weight data of infants in least developed countries with limited internet access. The rationale is to predict infant weights based on image data by applying Machine Learning techniques. To address the data collecting issue, I implemented a mobile application which features online and offline image and annotation upload and a web application which features image query functionality. This work is derived and partly decoupled from the previous project – ImageSfERe (Image Sharing for Epilepsy Research), which is a web-based platform to collect and share epilepsy patient imaging.
Styles APA, Harvard, Vancouver, ISO, etc.
3

SUTHAR, NITESH. « PERSONAL MOBILE STORAGE SHARING ». Thesis, 2020. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19110.

Texte intégral
Résumé :
In this era of Mobile devices, every user is willing to use mobile devices, which are capable of providing high performance, and which can provides more storage spaces. People are getting aware about using various cloud-based applications provided by network operator and service providers. Among those applications, there are multiple cloud-based usability’s which provide the access to the Cloud Storage. There are many cloud-based application available which provide private storage, such as Microsoft OneDrive, Google Cloud, Dropbox, etc. All of them store date on cloud servers. Even though these are secured still data is exposed to service provider so there is always a risk of data being stolen by some hackers or intruders. We are living in the era of smartphones, every user is having a smart phone with different storage capabilities such as 8, 16, 32, 64 and 128 GB of space and even more storage is going to be embedded in near future. We always find some user, which are not using even 50% of total available storage in their smartphone, which remains unused throughout the lifetime of Mobile device. Therefore, in this Major Project – II, we propose a new framework, which provides a system where a user can share his device's free or unused storage space with other users. Consider a family; where we have n members with n different mobile devices then the aggregated free storage space of all n number of mobile phones can be used as common private storage. The proposed system is called Personal Mobile Storage Sharing (PMS-Sharing). PMS-Sharing enables user to form a local group of users and allow them to access shared storage directory. The system removes dependencies on cloud storage service provider to store the data on servers in order to access it anywhere around the globe. User’s data is stored on the devices within the known group of family members, by this way his data is safe and reachable physically in case network is not available due to some natural hazard. PMS Sharing will be very useful application for the military, secure forces, corporate network, and for those users who do not want to upload their personal data on cloud-storage service and user does not know physical location of storage.
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "MOBILE STORAGE SHARING"

1

Wang, Xu An, Nadia Nedjah, Arun Kumar Sangaiah, Chun Shan et Zuliang Wang. « Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing ». Dans Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 478–85. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02607-3_44.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Qi, Fang, Wenbo Wang et Zhe Tang. « Distributed Multi-authority Attribute-Based Encryption for Secure Friend Discovery and Data Sharing in Mobile Social Networks ». Dans Security, Privacy, and Anonymity in Computation, Communication, and Storage, 374–82. Cham : Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49148-6_31.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Laghi, Maria Chiara, Michele Amoretti et Gianni Conte. « Peer-to-Peer Service Sharing on Mobile Platforms ». Dans Handheld Computing for Mobile Commerce, 180–201. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-761-9.ch009.

Texte intégral
Résumé :
True ubiquitous computing requires peer-to-peer service sharing on mobile platforms, with application entities communicating and providing services to each other and to users. In order to enforce this paradigm to devices with limited processing and storage resources, lightweight middleware components are required. In this chapter, we define a theoretical model for autonomic and altruistic computational entities, and we use it to build a framework for peer-to-peer service-oriented infrastructures, focusing on three key aspects: overlay scheme, dynamic service composition and self-configuration of peers. Based on this framework, JXTA-SOAP Mobile Edition is a software component that completes the Sun MicroSystem’s JXTA platform, supporting peer-to-peer sharing of Web Services.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Yuan, Soe-Tsyr, et Fang-Yu Chen. « UbiSrvInt ». Dans Mobile and Ubiquitous Commerce, 135–71. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-366-1.ch009.

Texte intégral
Résumé :
Peer-to-Peer applications harness sharing between free resources (storage, contents, services, human presence, etc.). Most existing wireless P2P applications concern merely the sharing of a variety of contents. For magnifying the sharing extent for wireless service provision in the vicinity (i.e., the wireless P2P environments), this chapter presents a novel approach (briefly named UbiSrvInt) that is an attempt to enable a pure P2P solution that is context aware and fault tolerant for ad-hoc wireless service provision. This approach empowers an autonomous peer to propel distributed problem solving (e.g., in the travel domain) through service sharing and execution in an intelligent P2P way. This approach of ad-hoc wireless service provision is not only highly robust to failure (based on a specific clustering analysis of failure correlation among peers) but also capable of inferring a user’s service needs (through a BDI reasoning mechanism utilizing the surrounding context) in ad-hoc wireless environments. The authors have implemented UbiSrvInt into a system platform with P-JXTA that shows good performance results on fault tolerance and context awareness.
Styles APA, Harvard, Vancouver, ISO, etc.
5

El Moussaid, Nadya, et Ahmed Toumanari. « A Cloud Intrusion Detection Based on Classification of Activities and Mobile Agent ». Dans Security Management in Mobile Cloud Computing, 29–42. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0602-7.ch002.

Texte intégral
Résumé :
Cloud computing becomes the technology trend that attracts more and more both of the different forms of companies and attackers, for the reason that cloud computing provides a sharing pool of configured computing resources, such as servers, networks, applications, storage, and services, to end users. Therefore, securing sensitive data of companies from threats and attacks performed by internal or external attackers is a necessary requirement and exigency. For that purpose, in this paper presents an intrusion detection system that is based on mobile agent to collect and analysis gathered data from several virtual machines, in order to benefit from the advantages of mobile agents. The authors of this chapter propose to use C4.5 algorithm which is one of tree decision algorithms that classify data into normal and malicious one. The main purpose of our solution is creating a model of normal and abnormal behaviour.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Chow, C., H. Leong et A. Chan. « Peer-to-Peer Cooperative Caching in Mobile Environments ». Dans Encyclopedia of Mobile Computing and Commerce, 749–53. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-002-8.ch126.

Texte intégral
Résumé :
An infrastructure-based mobile environment is formed with a wireless network connecting mobile hosts (MHs) and mobile support stations (MSSs). MHs are clients equipped with portable devices, such as laptops, personal digital assistants, cellular phones, and so on, while MSSs are stationary servers providing information access for the MHs residing in their service areas. With the recent widespread deployment of contemporary peer-to-peer (known as P2P throughout this chapter) wireless communication technologies, such as IEEE 802.11 (IEEE Standard 802-11, 1997) and Bluetooth (Bluetooth SIG, 2004), coupled with the fact that the computation power and storage capacity of most portable devices have been improving at a fast pace, a new information sharing paradigm known as P2P information access has rapidly taken shape. The MHs can share information among themselves rather than having to rely solely on their connections to the MSS. This article reviews a hybrid communication framework - that is, mobile cooperative caching - which combines the P2P information access paradigm into the infrastructure-based mobile environment.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dass, Stephen, et Prabhu J. « Amelioration of Big Data Analytics by Employing Big Data Tools and Techniques ». Dans Applications of Security, Mobile, Analytic, and Cloud (SMAC) Technologies for Effective Information Processing and Management, 212–32. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4044-1.ch011.

Texte intégral
Résumé :
This chapter describes how in the digital data era, a large volume of data became accessible to data science engineers. With the reckless growth in networking, communication, storage, and data collection capability, the Big Data science is quickly growing in each engineering and science domain. This paper aims to study many numbers of the various analytics ways and tools which might be practiced to Big Data. The important deportment in this paper is step by step process to handle the large volume and variety of data expeditiously. The rapidly evolving big data tools and Platforms have given rise to numerous technologies to influence completely different Big Data portfolio.In this paper, we debate in an elaborate manner about analyzing tools, processing tools and querying tools for Big datahese tools used for data analysis Big Data tools utilize numerous tasks, like Data capture, storage, classification, sharing, analysis, transfer, search, image, and deciding which might also apply to Big data.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Delakouridis, Constantinos, et Leonidas Kazatzopoulos. « On the Use of Optimal Stopping Theory for Secret Sharing Scheme Update ». Dans Intelligent Technologies and Techniques for Pervasive Computing, 276–95. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4038-2.ch015.

Texte intégral
Résumé :
The location privacy issue has been addressed thoroughly so far. Cryptographic techniques, k-anonymity-based approaches, spatial obfuscation methods, mix-zones, pseudonyms, and dummy location signals have been proposed to enhance location privacy. In this chapter, the authors propose an approach, called STS (Share The Secret) that segments and distributes the location information to various, non-trusted, entities from where it will be reachable by authenticated location services. This secret sharing approach prevents location information disclosure even in situation where there is a direct observation of the target. The proposed approach facilitates end-users or location-based services to classify flexible privacy levels for different contexts of operation. The authors provide the optimal thresholds to alter the privacy policy levels when there is a need for relaxing or strengthening the required privacy. Additionally, they discuss the robustness of the proposed approach against various adversary models. Finally, the authors evaluate the approach in terms of computational and energy efficiency, using real mobile applications and location update scenarios over a cloud infrastructure, which is used to support storage and computational tasks.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kavitha, T. « Vehicular Cloud Computing ». Dans Advances in Computer and Electrical Engineering, 30–56. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3981-0.ch002.

Texte intégral
Résumé :
Cloud computing provides a way to avail hardware and software to provide services over the networks to users, whereas in mobile cloud computing, mobile devices are a part of cloud users and service providers. Vehicular ad hoc networks (VANETs) are developed with the help of mobile ad hoc networks (MANET) with the difference that the data are exchanged among mobile vehicles to enhance the road safety and traffic efficiency. VANETs safety applications includes traffic signal violation, curve speed warning, emergency brake lights, pre-crash sensing, collision warning, left turn assist, lane change warning, and stop sign assist. But due to the requirement of smaller size, one of the significant challenges of the vehicular network is the limited resource with respect to memory, computation power, and bandwidth. It leads to slow data processing capability. However, the demanding requirement of emerging application is complex computation with high storage capacity. This necessity can be fulfilled by sharing the available resource among all the vehicles which are in near proximity. It can be achieved by integrating the vehicular network with cloud computing which is called as vehicular cloud computing (VCC). VCC is a new technological shift that can take the advantages of cloud computing to afford the services to drivers of VANET. But VCC is still in early stage and due to its unique features and applications it has become a significant emerging research area which needs to be explored further.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Pouliakis, Abraham, Stavros Archondakis, Efrossyni Karakitsou et Petros Karakitsos. « Cloud Computing for Cytopathologists ». Dans Cloud Computing Applications for Quality Health Care Delivery, 250–71. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-6118-9.ch013.

Texte intégral
Résumé :
Cloud computing is changing the way enterprises, institutions, and people understand, perceive, and use current software systems. Cloud computing is an innovative concept of creating a computer grid using the Internet facilities aiming at the shared use of resources such as computer software and hardware. Cloud-based system architectures provide many advantages in terms of scalability, maintainability, and massive data processing. By means of cloud computing technology, cytopathologists can efficiently manage imaging units by using the latest software and hardware available without having to pay for it at non-affordable prices. Cloud computing systems used by cytopathology departments can function on public, private, hybrid, or community models. Using cloud applications, infrastructure, storage services, and processing power, cytopathology laboratories can avoid huge spending on maintenance of costly applications and on image storage and sharing. Cloud computing allows imaging flexibility and may be used for creating a virtual mobile office. Security and privacy issues have to be addressed in order to ensure Cloud computing wide implementation in the near future. Nowadays, cloud computing is not widely used for the various tasks related to cytopathology; however, there are numerous fields for which it can be applied. The envisioned advantages for the everyday practice in laboratories' workflow and eventually for the patients are significant. This is explored in this chapter.
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "MOBILE STORAGE SHARING"

1

Feng, Chao, GangPeng Duan, Die You et XiuWei Zhang. « Secure data sharing solution for mobile cloud storage ». Dans International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2022), sous la direction de Yuanchang Zhong. SPIE, 2022. http://dx.doi.org/10.1117/12.2646302.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Riestenberg, David. « The SECARB Anthropogenic Test : CO2 Injection & ; Storage Site ». Dans International MVA/MMV Knowledge Sharing Workshop Mobile, AL May 2012. US DOE, 2012. http://dx.doi.org/10.2172/1747979.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Jian Wang, Zyxia et L. Harn. « Storage-optimal key sharing with authentication in sensor networks ». Dans IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEEE, 2005. http://dx.doi.org/10.1109/mtas.2005.243759.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Jian Wang, Zyxia et L. Harn. « Storage-optimal key sharing with authentication in sensor networks ». Dans IEE Mobility Conference 2005. The Second International Conference on Mobile Technology, Applications and Systems. IEE, 2005. http://dx.doi.org/10.1049/cp:20051549.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Shen, Yueqing, Tong Qian, Yin Zhang et Wenhu Tang. « Mobile Energy Storage Sharing Schemes for Enhancing Power Distribution System Resilience ». Dans 2023 8th Asia Conference on Power and Electrical Engineering (ACPEE). IEEE, 2023. http://dx.doi.org/10.1109/acpee56931.2023.10135758.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Moura, Pedro, Uday Sriram et Javad Mohammadi. « Sharing Mobile and Stationary Energy Storage Resources in Transactive Energy Communities ». Dans 2021 IEEE Madrid PowerTech. IEEE, 2021. http://dx.doi.org/10.1109/powertech46648.2021.9494999.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Dubois, Daniel J., Yosuke Bando, Konosuke Watanabe, Arata Miyamoto, Munehiko Sato, William Papper et V. Michael Bove. « Supporting heterogeneous networks and pervasive storage in mobile content-sharing middleware ». Dans 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2015. http://dx.doi.org/10.1109/ccnc.2015.7158086.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Sagor, M., R. Stoleru, A. Haroon, S. Bhunia, M. Chao, A. Altaweel, M. Maurice et R. Blalock. « R-Drive : Resilient Data Storage and Sharing for Mobile Edge Clouds ». Dans 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 2022. http://dx.doi.org/10.1109/mass56207.2022.00030.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Silva, Joao A., Pedro Vieira et Herve Paulino. « Data Storage and Sharing for Mobile Devices in Multi-region Edge Networks ». Dans 2020 IEEE 21st International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). IEEE, 2020. http://dx.doi.org/10.1109/wowmom49955.2020.00021.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Fulu Li, David P. Reed et Andrew Lippman. « Collaborative storage with mobile devices in wireless networks for P2P media sharing ». Dans 2008 Wireless Telecomunications Symposium (WTS 2008). IEEE, 2008. http://dx.doi.org/10.1109/wts.2008.4547546.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie