Gotowa bibliografia na temat „Cloud computing – Popular works”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cloud computing – Popular works”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Cloud computing – Popular works"

1

Djamba, Kalema Josue. "Cloud-Based Centralizing system for academic history, plagiarism prevention management in Higher Education Institution IN DRC: Benefit, Challenges". British Journal of Multidisciplinary and Advanced Studies 3, nr 2 (16.12.2022): 142–52. http://dx.doi.org/10.37745/bjmas.2022.0062.

Pełny tekst źródła
Streszczenie:
Cloud computing is becoming increasingly popular in the twenty-first century, with demand coming from all sectors of industry, including higher education institutions. In this paper, we address the benefits and limitations of cloud computing in the context of higher education institutions in DRC. Adopting modern cloud computing technology is projected to minimize the cost of IT-based solutions and services, as well as ICT infrastructure. The purpose of this work is to establish a system on cloud based that will enable the centralization and exchange of data on students' academic careers, to prevent plagiarism, to avoid fraud and falsification of transcripts, Share the researches and academic works between the universities to avoid plagiarism. Many challenges must be resolved before cloud computing can be successfully deployed in higher education.
Style APA, Harvard, Vancouver, ISO itp.
2

Karthiga, T. "Cloud Based Video on Demand (VoD) Using DCRP Algorithm". Asian Journal of Computer Science and Technology 1, nr 1 (5.05.2012): 107–10. http://dx.doi.org/10.51983/ajcst-2012.1.1.1662.

Pełny tekst źródła
Streszczenie:
The attempt to display media files through internet was started from mid-20th century. Several research works have been reported to provide Video on Demand model in distributed like RMI, SOA and Grid Computing. Internet-based cloud computing is a new computing paradigm aiming to provide agile and scalable resource access in a utility-like fashion. The fundamental question is how to configure the cloud utility to meet the highly dynamic demands of such applications at a modest cost. In this paper, a queueing network based model is used to characterize the viewing behaviors of users in a multichannel VoD application, and derive the server capacities needed to support smooth playback in the channels for two popular streaming models, client-server and P2P.Disk Scheduling is used to allocate separate disks to users. A dynamic cloud resource provisioning algorithm is used in which the derived capacities and instantaneous network statistics as inputs, can effectively support VoD streaming with low cloud utilization cost. Analysis and algorithm design are verified and extensively evaluated by applying large-scale experiments under dynamic realistic settings on a cloud platform.
Style APA, Harvard, Vancouver, ISO itp.
3

Xiangyang, Zhu, Dai Hua, Yi Xun, Yang Geng i Li Xiao. "MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data". Security and Communication Networks 2017 (2017): 1–17. http://dx.doi.org/10.1155/2017/1923476.

Pełny tekst źródła
Streszczenie:
With the development of cloud computing, services outsourcing in clouds has become a popular business model. However, due to the fact that data storage and computing are completely outsourced to the cloud service provider, sensitive data of data owners is exposed, which could bring serious privacy disclosure. In addition, some unexpected events, such as software bugs and hardware failure, could cause incomplete or incorrect results returned from clouds. In this paper, we propose an efficient and accurate verifiable privacy-preserving multikeyword text search over encrypted cloud data based on hierarchical agglomerative clustering, which is named MUSE. In order to improve the efficiency of text searching, we proposed a novel index structure, HAC-tree, which is based on a hierarchical agglomerative clustering method and tends to gather the high-relevance documents in clusters. Based on the HAC-tree, a noncandidate pruning depth-first search algorithm is proposed, which can filter the unqualified subtrees and thus accelerate the search process. The secure inner product algorithm is used to encrypted the HAC-tree index and the query vector. Meanwhile, a completeness verification algorithm is given to verify search results. Experiment results demonstrate that the proposed method outperforms the existing works, DMRS and MRSE-HCI, in efficiency and accuracy, respectively.
Style APA, Harvard, Vancouver, ISO itp.
4

Sang, Yongxuan, Junqiang Cheng, Bo Wang i Ming Chen. "A three-stage heuristic task scheduling for optimizing the service level agreement satisfaction in device-edge-cloud cooperative computing". PeerJ Computer Science 8 (18.01.2022): e851. http://dx.doi.org/10.7717/peerj-cs.851.

Pełny tekst źródła
Streszczenie:
Device-edge-cloud cooperative computing is increasingly popular as it can effectively address the problem of the resource scarcity of user devices. It is one of the most challenging issues to improve the resource efficiency by task scheduling in such computing environments. Existing works used limited resources of devices and edge servers in preference, which can lead to not full use of the abundance of cloud resources. This article studies the task scheduling problem to optimize the service level agreement satisfaction in terms of the number of tasks whose hard-deadlines are met for device-edge-cloud cooperative computing. This article first formulates the problem into a binary nonlinear programming, and then proposes a heuristic scheduling method with three stages to solve the problem in polynomial time. The first stage is trying to fully exploit the abundant cloud resources, by pre-scheduling user tasks in the resource priority order of clouds, edge servers, and local devices. In the second stage, the proposed heuristic method reschedules some tasks from edges to devices, to provide more available shared edge resources for other tasks cannot be completed locally, and schedules these tasks to edge servers. At the last stage, our method reschedules as many tasks as possible from clouds to edges or devices, to improve the resource cost. Experiment results show that our method has up to 59% better performance in service level agreement satisfaction without decreasing the resource efficiency, compared with eight of classical methods and state-of-the-art methods.
Style APA, Harvard, Vancouver, ISO itp.
5

Yogi, Manas Kumar, K. Ganga i Devi Bhavani. "Green IOT: Principles, Current Trends, Future Directions". International Journal of Advance Research and Innovation 6, nr 3 (2018): 27–32. http://dx.doi.org/10.51976/ijari.631805.

Pełny tekst źródła
Streszczenie:
The two trending and popular technologies are Cloud Computing (CC) and the Internet of Things (IoT) are current hot discussions in the field of agriculture and healthcare applications. Motivated by achieving a sustainable world, this paper discusses various technologies and issues regarding green cloud computing and green Internet of Things, further improves the discussion with the reduction in energy consumption of the two techniques (CC and IoT) combination in agriculture and healthcare systems. The history and concept of the hot green information and communications technologies (ICT’s) which are enabling green IoT will be discussed. Green computing introduction first and later focuses on the recent works done regarding the emerging technologies. Finally, lists out the advantages, challenges, and future research directions related to green application design. Our research aims to make green area broad and contribution to sustainable application world.
Style APA, Harvard, Vancouver, ISO itp.
6

Luo, Yingyu. "Semantic Characteristics of the Emerging Popular Construction "Cloud X" in Modern Chinese Language". Transactions on Social Science, Education and Humanities Research 7 (6.05.2024): 134–43. http://dx.doi.org/10.62051/8njcxg38.

Pełny tekst źródła
Streszczenie:
Accompanied by the development of the Internet and big data, "cloud X" has become a popular construction that is more frequently used in the Internet in recent years. Studying and analyzing the generation mechanism and evolution process of "Cloud X" is of great reference significance for understanding the development of popular words in the new period and the word formation process of popular words. Therefore, this paper analyzes the popular word "cloud X" from the semantic perspective, taking the semantic evolution of "Yun (cloud)" as the entry point. In the process of exploring "Yun (cloud)", this paper will focus on the transformation of the semantic features of "Yun (cloud)", observing the original meaning of "Yun (cloud)",Yun (cloud)" in "cloud computing", and the semantic features of "Yun (cloud)" after "cloud X" has become a construction. By examining the similarities and differences of the semantic features, we can explore the process of "Yun (cloud)" gradually changing from a real word to a class of affixes and the reasons for the change.
Style APA, Harvard, Vancouver, ISO itp.
7

Narawade, Dr Navnath. "Campus Automation Using Cloud Computing". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, nr 04 (20.04.2024): 1–5. http://dx.doi.org/10.55041/ijsrem31117.

Pełny tekst źródła
Streszczenie:
The project, we propose is “Campus automation”, which is considered a website for a college, the main aim of this project is to change college website content dynamically online and provide a user interface application. The above aim can be established by creating a layout Structural module and each module may have a sub-module. This will provide information about the college campus in which staff, students, and HOD can access this information and will be familiar with the college campus. When campus automation technology is integrated with popular web services it can be utilized securely by an even larger audience. By leveraging the power of cloud computing, the system offers scalability, reliability, and accessibility. It allows users to access the platform from anywhere, at any time, using a web browser, thereby facilitating seamless collaboration and communication among stakeholders. Overall, the proposed Campus Automation System aims to modernize campus management processes, streamline administrative tasks, improve communication, and enhance the overall efficiency of educational institutions. By harnessing the capabilities of cloud computing and the MERN stack, the system promises to deliver a robust, scalable, and user-friendly solution tailored to the needs of modern educational institutions. Key Words: Campus automation, cloud computing, MERN stack, web services
Style APA, Harvard, Vancouver, ISO itp.
8

Wasim Akram, Sk, Dr P. Rajesh i SK Shama. "A review report on challenges and opportunities of edge, fog and cloud computing by employing IoT technology". International Journal of Engineering & Technology 7, nr 3.29 (24.08.2018): 263. http://dx.doi.org/10.14419/ijet.v7i3.29.18808.

Pełny tekst źródła
Streszczenie:
In the future, various information and things will be connected to the network. People can now live more convenient and comfortable life where the things and information coordinated together. A world where things are connected to network is referred as IOT (Internet of Things). A huge amount of incomplete data is generated by IOT need to process and responded to very short time. This pose challenge of dealing with big data from many geometrically distributed data sources which are to be managed and processed. To achieve this objective, cloud computing is a treated as one of the popular choice due to its scalability, storage, computational and other capabilities. However current cloud models are not intended to handle the essentials of IOT– volume, variety, and velocity of data. Moreover, as the physical distance between cloud and user increases, transmission latency increases with it, increasing response time and stressing of the user. In addition to that, the processing speed in this environment is largely dependent on the performance of user device. The viable solution to these problems is identified as Edge Computing. The Edge Computing platform works by allowing some application processing to be performed by a small edge server position between the cloud and user, and crucially in a location physically closed to the user. This paper comprehensively presents various research trends that are available in Edge, Fog computing along with a comparison is made among Cloud. Particularly the architecture, characteristics, key technologies, potential applications, security issues and challenges of Edge, Fog and Cloud Computing are discussed and summarized.
Style APA, Harvard, Vancouver, ISO itp.
9

Antonova, Аlfiia, i Svitlana Bartkova. "An overview of the advantages of cloud computing and online IDE". Automation of technological and business processes 12, nr 3 (5.11.2020): 47–50. http://dx.doi.org/10.15673/atbp.v12i3.1927.

Pełny tekst źródła
Streszczenie:
The article discusses cloud computing and their impact on the field of software development, and analyzes several issues of developers that can be solved using the online IDE. Usage of cloud computing in the enterprise is not new, and it is not difficult in terms of implementation. That is why it is gaining popularity. First, due to the large number of technologies that allow you to optimize internal processes. Secondly, due to the large number of giant companies and small businesses that use these technologies. Cloud computing is very interesting in financial terms. After all, they allow not spending money on building and supporting the infrastructure. One can also not worry about risks, such as, for example, equipment that affects the system, weather conditions, and so on. It takes on all these moments. Evolving of architectural solutions also increases the impact on cloud technology. A service-oriented approach to software development is becoming increasingly popular. It is less and less possible to see the usual thin client and a single server-monolith. Clients are becoming more complex, attracting part of the business logic, servers are divided into parts, each of which is responsible for a particular part of the subject area, and in some cases may not know about the existence of others. The IDE, which requires developers for programming, also has analogs on the web platform. The online IDE has its advantages for solving some tasks and has become increasingly popular lately. Users of the online IDE can create, run, and customize software that works with a simple browser. The main goal of this study is to determine the main advantages of cloud technologies in the application development process, analyze the segment of online IDE. Based on these data to identify the main situations that determine their use, predict further development, and identify principles and technologies used in this area.
Style APA, Harvard, Vancouver, ISO itp.
10

Carvalho, Juliana, Dario Vieira, Christiano Rodrigues i Fernando Trinta. "LM2K Model for Hosting an Application Based on Microservices in Multi-Cloud". Sensors 23, nr 9 (2.05.2023): 4450. http://dx.doi.org/10.3390/s23094450.

Pełny tekst źródła
Streszczenie:
Cloud computing has become a popular delivery model service, offering several advantages. However, there are still challenges that need to be addressed when applying the cloud model to specific scenarios. Two of such challenges involve deploying and executing applications across multiple providers, each comprising several services with similar functionalities and different capabilities. Therefore, dealing with application distributions across various providers can be a complex task for a software architect due to the differing characteristics of the application components. Some works have proposed solutions to address the challenges discussed here, but most of them focus on service providers. To facilitate the decision-making process of software architects, we previously presented PacificClouds, an architecture for managing the deployment and execution of applications based on microservices and distributed in a multi-cloud environment. Therefore, in this work, we focus on the challenges of selecting multiple clouds for PacificClouds and choosing providers that best meet the microservices and software architect requirements. We propose a selection model and three approaches to address various scenarios. We evaluate the performance of the approaches and conduct a comparative analysis of them. The results demonstrate their feasibility regarding performance.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Cloud computing – Popular works"

1

Anderson, Joanna M., i Wendy Doucette. "Instant, Easy, Free Cloud Computing With Google and Microsoft 365". Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/388.

Pełny tekst źródła
Streszczenie:
Getting into the cloud is easier than you think, and its advantages are immediate. Would you like a backup of all your files you can access from anywhere? How about keeping all your files in sync and editing and sharing them with a group, from wherever you all are? We will discuss the advantages of the Google and Microsoft cloud suites, and why both are better than Dropbox or other standalone storage services. If you and your patrons are interested in a synchronized mailbox and calendar with free access to documents, spreadsheets, forms, presentation software and more, we’ll show you how to get started, increase your productivity and streamline your life.
Style APA, Harvard, Vancouver, ISO itp.
2

Tolley, Rebecca. "Review of Getting Started with Cloud Computing: A LITA Guide". Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/5620.

Pełny tekst źródła
Streszczenie:
Review of Getting Started with Cloud Computing: A LITA Guide. Eds. Edward M. Corrado and Heather Lea Moulaison. New York: Neal-Schuman Publisher, Inc., 2011. 214p. alk. paper, $65 (ISBN 9781555707491).
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Cloud computing – Popular works"

1

Hurwitz, Judith. Hybrid cloud for dummies. Hoboken, New Jersey: John Wiley & Sons, Inc., 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

McGrath, Alister E. A cloud of witnesses: Ten great Christian thinkers. Grand Rapids, Mich: Zondervan Pub. House, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

McGrath, Alister E. A cloud of witnesses: Ten great Christian thinkers. Leicester, England: Inter-Varsity Press, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Talking back: Custom-made online computing. Englewood Cliffs, N.J: Micro Text Publications, 1985.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

White, Ron. PC/Computing how computers work. Emeryville, Calif: Ziff-Davis Press, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Chartier, Timothy P. Math bytes: Google bombs, chocolate-covered pi, and other cool bits in computing. Princeton, NJ, USA: Princeton University Press, 2014.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Watson, Ian. The universal machine: From the dawn of computing to digital consciousness. New York: Copernicus Books, 2012.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Williams, Colin P. Ultimate zero and one: Computing at the quantum frontier. New York: Copernicus, 2000.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Parsons, June Jamrich. Computer concepts. Wyd. 7. Australia: Course Technology Cengage Learning, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Dan, Oja, red. Computer concepts: Illustrated, brief. Wyd. 6. Boston, Mass: Thomson/Course Technology, 2007.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Cloud computing – Popular works"

1

García-López, Pedro, Marc Sánchez-Artigas, Simon Shillaker, Peter Pietzuch, David Breitgand, Gil Vernik, Pierre Sutra, Tristan Tarrant, Ana Juan-Ferrer i Gerard París. "Trade-Offs and Challenges of Serverless Data Analytics". W Technologies and Applications for Big Data Value, 41–61. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78307-5_3.

Pełny tekst źródła
Streszczenie:
AbstractServerless computing has become very popular today since it largely simplifies cloud programming. Developers do no longer need to worry about provisioning or operating servers, and they have to pay only for the compute resources used when their code is run. This new cloud paradigm suits well for many applications, and researchers have already begun investigating the feasibility of serverless computing for data analytics. Unfortunately, today’s serverless computing presents important limitations that make it really difficult to support all sorts of analytics workloads. This chapter first starts by analyzing three fundamental trade-offs of today’s serverless computing model and their relationship with data analytics. It studies how by relaxing disaggregation, isolation, and simple scheduling, it is possible to increase the overall computing performance, but at the expense of essential aspects of the model such as elasticity, security, or sub-second activations, respectively. The consequence of these trade-offs is that analytics applications may well end up embracing hybrid systems composed of serverless and serverful components, which we call ServerMix in this chapter. We will review the existing related work to show that most applications can be actually categorized as ServerMix.
Style APA, Harvard, Vancouver, ISO itp.
2

Venkatesh, K., R. Velvizhi, K. Selva Banu Priya i N. Sivaranjani. "Deep Dive on Popular Security Models and Strategies of Cloud Computing". W Privacy and Security Challenges in Cloud Computing, 147–70. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003219880-8.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zhang, Yan. "Mobile Edge Computing". W Simula SpringerBriefs on Computing, 9–21. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-83944-4_2.

Pełny tekst źródła
Streszczenie:
AbstractMobile edge computing is a promising paradigm that brings computing resources to mobile users at the network edge, allowing computing-intensive and delay-sensitive applications to be quickly processed by edge servers to satisfy the requirements of mobile users. In this chapter, we first introduce a hierarchical architecture of mobile edge computing that consists of a cloud plane, an edge plane, and a user plane. We then introduce three typical computation offloading decisions. Finally, we review state-of-the-art works on computation offloading and present the use case of joint computation offloading.
Style APA, Harvard, Vancouver, ISO itp.
4

Kannan, M., C. Priya, L. William Mary, S. Madhan i V. Sri Priya. "Effective Role of Cloud-Based IoT Technology in Smart and Precision Horticulture Works: A Novel". W Intelligent Computing and Innovation on Data Science, 69–79. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3284-9_9.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chang, Ruay-Shiung, i Jih-Sheng Chang. "Pervasive Grid and its Applications". W Grid and Cloud Computing, 260–71. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0879-5.ch112.

Pełny tekst źródła
Streszczenie:
With the advancements of computer system and communication technologies, Grid computing can be seen as the popular technology bringing about significant revolution for the next generation distributed computing application. As regards general users, a grid middleware is complex to setup and necessitates a steep learning curve. How to access to the grid system transparently from the point of view of users turns into a critical issue then. Therefore, various challenges may arise from the incomprehensive system design as coordinating existing computing resources for the sake of achieving pervasive grid environment. The authors are going to investigate into the current research works of pervasive grid as well as analyze the most important factors and components for constructing a pervasive grid system here. Finally, in order to facilitate the efficiency in respect of teaching and research within a campus, they would like to introduce their pervasive grid platform.
Style APA, Harvard, Vancouver, ISO itp.
6

Faheem, Muhammad, Mohand-Tahar Kechadi i Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment". W Mobile Computing and Wireless Networks, 2111–31. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-8751-6.ch092.

Pełny tekst źródła
Streszczenie:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
Style APA, Harvard, Vancouver, ISO itp.
7

Chitra, M. P., R. S. Ponmagal, N. P. G. Bhavani i V. Srividhya. "An Approach to Cloud Computing for Medical Image Analysis". W AI Innovation in Medical Imaging Diagnostics, 164–93. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3092-4.ch010.

Pełny tekst źródła
Streszczenie:
Cloud computing has become popular among users in organizations and companies. Security and efficiency are the two major problems facing cloud service providers and their customers. Cloud data allocation facilities that allow groups of users to work together to access the shared data are the most standard and effective working styles in the enterprises. So, in spite of having advantages of scalability and flexibility, cloud storage service comes with confidential and security concerns. A direct method to defend the user data is to encrypt the data stored at the cloud. In this research work, a secure cloud model (SCM) that contains user authentication and data scheduling approach is scheduled. An innovative digital signature with chaotic secure hashing (DS-CS) is used for user authentication, followed by an enhanced work scheduling based on improved genetic algorithm to reduce the execution cost.
Style APA, Harvard, Vancouver, ISO itp.
8

Rathore, Maya, i Ugrasen Suman. "A Collaborative Ranking Approach for Discovery and Selection of Cloud Services". W Encyclopedia of Information Science and Technology, Fifth Edition, 190–206. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3479-3.ch015.

Pełny tekst źródła
Streszczenie:
Cloud computing is getting more popular due to its extraordinary features such as on-demand availability of computing resources and software services. A variety of services have been deployed to offer analogous functionalities. However, the difficulty to identify reliable services has fascinated the attention of researchers. Thus, the trust and reputation concept have been introduced to evaluate the trustworthiness of services over cloud. Most of the existing research works fully trust on service user's feedback rating for ranking cloud services, which may often lead to biasness towards positive and negative feedback rating. To avoid aforementioned issues, this chapter proposes a novel approach to evaluate cloud service reputation along with cloud service reputation evaluation model to discover reliable cloud services. Experimental result shows that proposed approach provides effective solution for prediction of cloud service reputation, which can be helpful in performing reliable service discovery and selection over cloud.
Style APA, Harvard, Vancouver, ISO itp.
9

Faheem, Muhammad, Mohand-Tahar Kechadi i Nhien An Le-Khac. "The State of the Art Forensic Techniques in Mobile Cloud Environment". W Web-Based Services, 2324–44. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch103.

Pełny tekst źródła
Streszczenie:
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
Style APA, Harvard, Vancouver, ISO itp.
10

Mishra, Nilamadhab, Basanta Kumar Padhi i Banaja Basini Rath. "Mobile Cloud Computing Framework for an Android-Based Metaverse Ecosystem Platform". W Advances in Computational Intelligence and Robotics, 237–54. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-8851-5.ch012.

Pełny tekst źródła
Streszczenie:
Mobile cloud computing (MCC), which combines mobile computing and cloud computing, has become one of the industry's most common terms and a major topic of discussion in the IT world. Mobile clients are becoming popular clients for consuming any web resources, particularly web services (WS), as mobile network infrastructures improve. However, there are problems connecting mobile devices to existing WS. This research focuses on three of the following challenges: loss of connection, bandwidth, latency, and limited resources. This research proposes to develop and implement a cross-platform architecture for connecting mobile devices to the web. The architecture includes mobile service clients that work on any platform and a Metaverse ecosystem that makes it easier for mobile clients and WS to talk to each other. Finally, the Metaverse ecosystem can be deployed on the cloud metaverse platform, which may create more immersive and dynamic virtual worlds that are accessible to a wider audience by utilizing the power of the cloud.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Cloud computing – Popular works"

1

R. S, Bala Kumar, i Sujitha R. "Efficient Privacy-Preserving Biometric Identification in Cloud Computing". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/ieko8866/ngcesi23p5.

Pełny tekst źródła
Streszczenie:
Benefited from its reliability and convenience, biometric identification has become one of the most popular authentication technologies. Due to the sensitivity of biometric data, various privacy-preserving biometric identification protocols have been proposed. However, the low computational efficiency or the security vulnerabilities of these protocols limit their wide deployment in practice. To further improve the efficiency and enhance the security, in this project, propose two new privacy-preserving biometric identification outsourcing protocols. One mainly utilizes the efficient Householder transformation and permutation technique to realize the high-efficiency intention under the known candidate attack model. The other initializes a novel random split technique and combines it with the invertible linear transformation to achieve a higher security requirement under the known-plaintext attack model. Also, argue the security of our proposed two protocols with a strict theoretical analysis and, by comparing them with the prior existing works, comprehensively evaluate their efficiency.
Style APA, Harvard, Vancouver, ISO itp.
2

Jiang, Fan, Carson Kai-Sang Leung i Syed K. Tanbeer. "Finding Popular Friends in Social Networks". W 2012 International Conference on Cloud and Green Computing (CGC). IEEE, 2012. http://dx.doi.org/10.1109/cgc.2012.99.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Cui, Anqi, Min Zhang, Yiqun Liu i Shaoping Ma. "Are the URLs really popular in microblog messages?" W 2011 IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS). IEEE, 2011. http://dx.doi.org/10.1109/ccis.2011.6045021.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jiang, Fan, Carson Kai-Sang Leung, Dacheng Liu i Aaron M. Peddle. "Discovery of Really Popular Friends from Social Networks". W 2014 IEEE International Conference on Big Data and Cloud Computing (BdCloud). IEEE, 2014. http://dx.doi.org/10.1109/bdcloud.2014.110.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Devi, Niketa, Dr Deepak Asrani i Dr Komal Asrani. "A Critical Review on Cloud Brokerage Services". W Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.1.

Pełny tekst źródła
Streszczenie:
Cloud Brokerage Service (CBS) budding technology that has become popular with cloud computing. CBS is a middleman providing value added services. This paper provides a systematic literature review on this topic, covering multiple publications during last preceding 10 years. The paper is aiming to provide an overview of CBS research status, and give suggestions on how CBS research should proceed.
Style APA, Harvard, Vancouver, ISO itp.
6

Zinn, Daniel, Quinn Hart, Bertram Ludascher i Yogesh Simmhan. "Streaming satellite data to cloud workflows for on-demand computing of environmental data products". W 2010 5th Workshop on Workflows in Support of Large-Scale Science (WORKS). IEEE, 2010. http://dx.doi.org/10.1109/works.2010.5671841.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Zhu, Li, i Xiangtao Qi. "Research on The Construction of Ontology-based Music Works Knowledge Base". W ICCBDC 2023: 2023 7th International Conference on Cloud and Big Data Computing. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3616131.3616143.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Saab, Salwa Adriana, Ali Chehab i Ayman Kayssi. "Energy efficiency in Mobile Cloud Computing: Total offloading selectively works. Does selective offloading totally work?" W 2013 Fourth Annual International Conference on Energy Aware Computing Systems and Applications (ICEAC). IEEE, 2013. http://dx.doi.org/10.1109/iceac.2013.6737657.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

S, Divya, i Gini R. "Enhancing Data Security in Cloud Computing using Block chain". W The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/kjqt5979/ngcesi23p26.

Pełny tekst źródła
Streszczenie:
Block chain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Block chain and SDN in the cloud computing platform. In this research, we introduce the “DistB-SD Cloud” architecture to better secure clouds. Moreover, we leverage a distributed Block chain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BCbased implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.
Style APA, Harvard, Vancouver, ISO itp.
10

Suciu, George, Muneeb Anwar i Roxana Mihalcioiu. "VIRTUALIZED VIDEO AND CLOUD COMPUTING FOR EFFICIENT ELEARNING". W eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-114.

Pełny tekst źródła
Streszczenie:
Multimedia content has become more and more popular in current eLearning platforms. However, there are still many use cases which require virtualized resources from cloud platforms: gamification, video analytics, and surveillance during exams, video conferencing for coaching, and video streaming (live and video-on-demand) services. This paper has the purpose to present how video services can exploit the virtualization techniques to provide ubiquitous video learning experience. Virtualization consists of multiple operating systems on a single physical system. Virtualization shares the underlying hardware resources, providing multiple execution environments for software partitioning and time-sharing. Furthermore, virtualization is the basis for cloud computing, which is adaptable and secure sharing of resources as a service, leading to ease of use for different types of computing platforms. This gives to the teachers the authority to deploy their curricula to new channels and to promote it with efficient video communication solutions. It is expected, from this point of view, that virtualization will contribute in a beneficial way to these use cases. The main concept we present in this paper is how to virtualize the video services and utilizing them combined with other eLearning techniques, whereas the virtualization technique permits virtualization for full server machines along with the whole operating system. The main objective is to demonstrate they can be monitored and easily be maintained, as well being extremely secure and provide uninterrupted services. Furthermore, virtualized video using Cloud would establish and provide quality eLearning relationships regardless of distance and devices or operating systems, being accessible through a web browser.
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Cloud computing – Popular works"

1

Osadcha, Kateryna P., i Viacheslav V. Osadchyi. The use of cloud computing technology in professional training of future programmers. [б. в.], czerwiec 2021. http://dx.doi.org/10.31812/123456789/4435.

Pełny tekst źródła
Streszczenie:
The article provides a brief analysis of the current state of the study of cloud technologies by future software engineers at foreign and Ukrainian universities. The author experience in the application of cloud technologies in the training of future software engineers in Ukraine is presented. The application of cloud business automation systems, online services to monitor the implementation of the software projects, Google services for collaboration, planning and productivity while studying professional disciplines and carrying out diploma projects is described. Based on the survey conducted at Stackoverflow, the state of application of cloud technologies by software engineers around the world has been analyzed. The cloud technologies that are not studied at the analyzed universities of Ukraine and those that are not popular with software developers in the world, but studied at Ukrainian universities by future software engineers are outlined. Conclusions are made on the modernization of training programs for future software engineers. Topics for the study of cloud technologies by future software engineers in the content of professional disciplines are proposed.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii