Добірка наукової літератури з теми "Clod computing"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Clod computing".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Clod computing"

1

Et. al., Pavithra G,. "A Novel Watermarking and Re-Encryption Approach to Avoid Illegal Content Sharing In Cloud." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 2603–9. http://dx.doi.org/10.17762/turcomat.v12i2.2229.

Повний текст джерела
Анотація:
Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using watermarking and re-encryption technique we can overcome the problem of security thread in the cloud. In this article we briefly discuss about the above mentioned technique for implementing to overcome the security thread in the cloud computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Odhiambo, Fredrick, Thomas Mose, and Tobias Mwalili. "Precursors of Cloud Computing Adoption in Selected Banks in Kenya." International Journal of Technology and Systems 7, no. 2 (October 27, 2022): 56–94. http://dx.doi.org/10.47604/ijts.1676.

Повний текст джерела
Анотація:
Purpose: The study analyzed the precursors of adoption of cloud computing in selected banks in Kenya. Specifically, the study sought to establish the effect of data security on adoption of cloud computing in selected banks in Kenya, to establish how organizational culture affects adoption of cloud computing in selected banks in Kenya, to establish how supplier lock- in affects adoption of cloud computing in selected banks in Kenya and to establish how regulatory policy affects adoption of cloud computing in selected banks in Kenya. Methodology: The study employed descriptive research design and inferential statistics. The target population was 366 ICT staff from 3 selected banks namely NCBA, KCB Bank and Equity bank. The selected banks had the largest market share according to published CBK supervisory report for year 2020. The sample size was 191 respondents. A structured questionnaire was used to collect the data. Responses in the questionnaires were tabulated, coded and processed by use of a computer statistical package for social sciences version 28 (SPSS) program to analyze the data. The responses from the open-ended questions were listed to obtain proportions appropriately and then reported by descriptive narrative. Descriptive statistics like mean, standard deviation were used. The ANOVA test was used to establish the findings from the study and results presented in graphs and charts. Findings: Cloud computing adoption was evaluated for the select commercial banks across three areas namely core-banking systems, middle office and compliance systems and back-office, data science and innovation systems over a period of five years. The respondents indicated that no more than one cloud computing project was either in planning, implementation, failed or completed stages, indicating that despite the perceived benefits of cloud computing there are precursors that need to be addressed if the commercial banks are to fully embrace cloud computing. Unique contribution to theory, practice and policy: In terms of policy, the findings of the study will be important to regulators like CA, CBK and other institutions that regulate financial institutions in coming up with relevant guidelines when it comes to handling customer data within Cloud Computing environment. It gives banking sector perspective of some of the issues that require attention if the envisaged benefits of clod computing are to be fully realized. This is important not only to the policy makers but also to the cloud service providers . Additionally, the findings give a theoretical basis of validating the antecedents of cloud computing adoption in the banking sector in Kenya and this can be extended to the rest of the world. The findings give a practical perspective of the real concerns the banks have to contend with from a practical perspective and therefore very critical in advancement of cloud computing technologies.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Et. al., Krishan Tuli ,. "Comparisons of Energy Efficiency Management Techniques in Cloud Based Environment." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 491–99. http://dx.doi.org/10.17762/turcomat.v12i2.858.

Повний текст джерела
Анотація:
Cloud computing has been transforming large part of various IT services into virtualization which are made available as a utility services and scheduling plays a vital role here to get maximum utilization from various physical resources. Cloud Computing has been offering its virtual resources and services anywhere and anytime on pay-as-you-go basis. So, Cloud Computing becomes a backbone in the various fields of Industry and Academia for providing the storage backups, load balancing and most importantly providing the dynamic resource scheduling on a real-time basis. Therefore, energy consumption will be very high by the various clod data centers which lead to very high amount of operational cost and harm the environment as well. Hence, there is a requirement of Green Computing for the sustainability and ensuring the energy efficiency by energy efficient techniques. In present scenario, various energy efficient algorithms have been proposed by the researchers which reduce the energy efficiency of cloud environment. But all these algorithms have been evaluated using the same experimental environment which gives the related results and it becomes difficult for the researchers to choose the best algorithm among them. So to provide the better understanding on the various algorithms and helps researchers for choosing the best suitable algorithm, we have compared the various state of art energy efficient algorithm in more detailed way considering various prospective. Along with the comparison, we have also done studied the overview of investigated algorithm. Finally, we have the literature survey of various others related to different parameters and techniques. From the same literature survey, we have come to the conclusion of each author’s statement.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

ALEXANDER, E. B. "BULK DENSITY EQUATIONS FOR SOUTHERN ALASKA SOILS." Canadian Journal of Soil Science 69, no. 1 (February 1, 1989): 177–80. http://dx.doi.org/10.4141/cjss89-017.

Повний текст джерела
Анотація:
A close relationship between organic-carbon content and bulk density was utilized to develop equations for predicting the bulk densities of inorganic soils around the Gulf of Alaska; for example[Formula: see text]where Db is the bulk density (Mg m−3) of fine-earth and OC is the organic carbon content (g kg−1). Adding discrete variables for soil texture (three classes):[Formula: see text]where A is 2.24 for loamy sands, 1.86 for sandy loams, and 1.73 for silt loams. Most of the samples used in developing these equations were from B and C horizons, but they appear to be applicable to other horizons too. They are not valid for (1) horizons with very low organic carbon content (C < 1 g kg−1); (2) organic soils; or (3) disturbed or compacted soils. Coarse fragments (particles > 2 mm) were considered in computing the bulk densities of whole soil horizons, because rock fragments are generally much denser than the bulk fine-earth. Key words: Clod samples, Podzolic soils, Spodosols, organic matter
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sahare, Shubhangi, and Dr D. V. Rojatkar. "Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (October 31, 2017): 786–89. http://dx.doi.org/10.31142/ijtsrd4685.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Anjaneyulu, P., and Mr S. Srinivasa Reddy. "Cloud Computing Adoption Approach towards Securing Data in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 390–93. http://dx.doi.org/10.31142/ijtsrd12995.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kim, Dong-Ho, Jung-Hoon Lee, and Yang-Pyo Park. "A Study of Factors Affecting the Adoption of Cloud Computing." Journal of Society for e-Business Studies 17, no. 1 (February 28, 2012): 111–36. http://dx.doi.org/10.7838/jsebs.2012.17.1.111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

M, Arun Prasath, and Mrs T. Sathiyabama. "Virtualization in Cloud Computing." International Journal of Trend in Scientific Research and Development Volume-2, Issue-6 (October 31, 2018): 875–77. http://dx.doi.org/10.31142/ijtsrd18665.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Mathkunti, Nivedita M. "Cloud Computing: Security Issues." International Journal of Computer and Communication Engineering 3, no. 4 (2014): 259–63. http://dx.doi.org/10.7763/ijcce.2014.v3.332.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Zhang, Yan. "Web Data Mining Technology on Cloud Computing." Applied Mechanics and Materials 543-547 (March 2014): 3490–93. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3490.

Повний текст джерела
Анотація:
With the rapid development of cloud computing technology, the traditional centralized data mining technology becomes inappropriate for the growing huge amounts of data. Cloud computings Web data mining technology comes into use because it is a reliable and efficient method. This article introduces the meaning, characteristics, and the present situation of cloud computing, analyzes the advantage of Web data mining technology on the basis of the use of cloud computing technology, makes investigations and summaries of the present situation, challenges and problems of the current cloud computing Web data mining technology research, and puts forward the corresponding methods to solve these problems.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Clod computing"

1

Lebedeva, A. O. "Cloud computing." Thesis, Сумський державний університет, 2013. http://essuir.sumdu.edu.ua/handle/123456789/33692.

Повний текст джерела
Анотація:
Cloud Computing is a revolution that will define IT in the second decade of the 21st Century. It have become the basis for radical business innovation and new business models, and for significant improvements in the effectiveness of anyone using information technology. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/33692
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Begic, Dina. "Cloud Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2013. http://amslaurea.unibo.it/5697/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Matteazzi, Piergiorgio <1969&gt. "Cloud computing." Master's Degree Thesis, Università Ca' Foscari Venezia, 2015. http://hdl.handle.net/10579/6952.

Повний текст джерела
Анотація:
L’obiettivo della tesi è valutare il Cloud Computing dal punto di vista dei vantaggi/svantaggi che le aziende possono trarne, e quali motivi rallentano la diffusione di tale tecnologia. Il cloud computing è da anni un argomento di discussione e analisi nel mondo accademico e dell’Information Technology. Sono state date definizioni che con l’evoluzione tecnologica degli strumenti a disposizione dei Provider si sono ampliate e consolidate. La sua natura di servizio non chiaramente localizzato ha generato diverse problematiche, non solo a livello tecnologico ma anche a livello legale (dei problemi legali non ci siamo occupati specificamente, ma li citiamo in quanto causa di frizioni nell’adozione di tale tecnologia). Per esempio all’interno della comunità economica, al fine di stimolare l’adozione del cloud computing, si sta promuovendo un processo per uniformare la normativa sulla proprietà dei dati. Alcune grosse aziende come CISCO, per ovviare alla inadeguatezza della normativa, inseriscono nel contratto di cloud clausule dove si assumono i rischi derivanti dalle diverse normative presenti ove i dati vengono collocati. Partendo dalla definizione, analizzando l’implementazione nonchè l’evoluzione degli strumenti a disposizione di chi programma in questo ambito, ci si rende conto quanto questo paradigma sia in evoluzione, e quanto ancora possa crescere. Si sta facendo un grande lavoro sia sulla virtualizzazione delle reti, sia sulle tecnologie di storage, che in futuro permetteranno con la diffusione della banda larga, di superare determinati limiti ad oggi presenti in determinati ambiti del Cloud, favorendone la diffusione e l’utilizzo. Dallo sviluppo e analisi svolta, si evidenzia come il paradigma cloud sia altamente modulabile rispetto alle esigenze aziendali proprio per le numerose opzioni e soluzioni tecnologiche, software e gestionali. Di seguito si riassumono gli elementi di vantaggio/svantaggio rilevabili nel paradigma cloud.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Gorelik, Eugene. "Cloud computing models." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/79811.

Повний текст джерела
Анотація:
Thesis (S.M. in Engineering and Management)--Massachusetts Institute of Technology, Engineering Systems Division, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 79-80).
Information Technology has always been considered a major pain point of enterprise organizations, from the perspectives of both cost and management. However, the information technology industry has experienced a dramatic shift in the past decade - factors such as hardware commoditization, open-source software, virtualization, workforce globalization, and agile IT processes have supported the development of new technology and business models. Cloud computing now offers organizations more choices regarding how to run infrastructures, save costs, and delegate liabilities to third-party providers. It has become an integral part of technology and business models, and has forced businesses to adapt to new technology strategies. Accordingly, the demand for cloud computing has forced the development of new market offerings, representing various cloud service and delivery models. These models significantly expand the range of available options, and task organizations with dilemmas over which cloud computing model to employ. This thesis poses analysis of available cloud computing models and potential future cloud computing trends. Comparative analysis includes cloud services delivery (SaaS, PaaS, IaaS) and deployment models (private, public, and hybrid). Cloud computing paradigms are discussed in the context of technical, business, and human factors, analyzing how business and technology strategy could be impacted by the following aspects of cloud computing: --Architecture --Security --Costs --Hardware/software trends (commodity vs. brands, open vs. closed-source) --Organizational/human Factors To provide a systematic approach to the research presented in this paper, cloud taxonomy is introduced to classify and compare the available cloud service offerings. In particular, this thesis focuses on the services of a few major cloud providers. Amazon Web Services (AWS) will be used as a base in many examples because this cloud provider represents approximately 70% of the current public cloud services market. Amazon's AWS has become a cloud services trend-setter, and a reference point for other cloud service providers. The analysis of cloud computing models has shown that public cloud deployment model is likely to stay dominant and keep expanding further. Private and Hybrid deployment models are going to stay for years ahead but their market share is going to continuously drop. In the long-term private and Hybrid cloud models most probably will be used only for specific business cases. IaaS service delivery model is likely to keep losing market share to PaaS and SaaS models because companies realize more value and resource-savings from software and platform services rather than infrastructure. In the near future we can expect significant number of market consolidations with few large players retaining market control at the end.
by Eugene Gorelik.
S.M.in Engineering and Management
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sousa, Francisco Cordeiro de. "Mainroad: cloud computing." Master's thesis, NSBE - UNL, 2010. http://hdl.handle.net/10362/10316.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Imine, Youcef. "Cloud computing security." Thesis, Compiègne, 2019. http://www.theses.fr/2019COMP2520.

Повний текст джерела
Анотація:
Ces dernières années, nous assistons à une immense révolution numérique de l’internet où de nombreuses applications, innovantes telles que l’internet des objets, les voitures autonomes, etc., ont émergé. Par conséquent, l’adoption des technologies d’externalisations des données, telles que le cloud ou le fog computing, afin de gérer cette expansion technologique semble inévitable. Cependant, l’utilisation du cloud ou du fog computing en tant que plateforme d’externalisation pour le stockage ou le partage des données crée plusieurs défis scientifiques. En effet, externaliser ses données signifie que l’utilisateur perd le contrôle sur ces derniers. D’où la sécurité des données devienne une préoccupation majeure qui doit être proprement traitée. C’est dans ce contexte que s’inscrivent les travaux de cette thèse dans laquelle nous avons déterminé dans un premier temps les principaux problèmes de sécurité liés à l’adoption du cloud et du fog computing. Puis, nous avons adressé trois problématiques de sécurité majeure, qui sont : 1 - Le contrôle d’accès aux données dans une architecture de type Cloud storage, où nous avons proposé une nouvelle solution de contrôle d’accès basée sur le chiffrement à base d’attributs. Notre solution assure un contrôle d’accès souple et à grains fins. De plus, elle permet d’effectuer une révocation immédiate des utilisateurs et des attributs sans aucune mise à jour des clés de chiffrement fournies aux utilisateurs. 2 - Le problème de l’authentification mutuelle entre les utilisateurs et les serveurs Fog dans une architecture Fog computing, où nous avons proposé un nouveau schéma d’authentification efficace, qui assure l’authentification mutuelle et qui est robuste contre les comportements malicieux des serveurs Fog. 3 - Le problème de traçabilité et de la protection de la vie privée dans le cadre des applications de partage d’informations publiques, où nous avons proposé une nouvelle solution pour le partage d’informations publiques assurant le service de traçabilité tout en préservant les informations privées des utilisateurs. Avec notre solution, les serveurs d’externalisations authentifient les utilisateurs sans pouvoir obtenir des informations sur leur vie privée. En cas de comportements malicieux, notre solution permet de tracer les utilisateurs malveillants grâce à une autorité
These last years, we are witnessing a real digital revolution of Internet where many innovative applications such as Internet of Things, autonomous cars, etc., have emerged. Consequently, adopting externalization technologies such as cloud and fog computing to handle this technological expansion seems to be an inevitable outcome. However, using the cloud or fog computing as a data repository opens many challenges in prospect. This thesis addresses security issues in cloud and fog computing which is a major challenge that need to be appropriately overcomed. Indeed, adopting these technologies means that the users lose control over their own data, which exposes it to several security threats. Therefore, we first investigated the main security issues facing the adoption of cloud and fog computing technologies. As one of the main challenges pointed in our investigation, access control is indeed a cornerstone of data security. An efficient access control mechanism must provide enforced and flexible access policies that ensure data protection, even from the service provider. Hence, we proposed a novel secure and efficient attribute based access control scheme for cloud data-storage applications. Our solution ensures flexible and fine-grained access control and prevents security degradations. Moreover, it performs immediate users and attributes revocation without any key regeneration. Authentication service in fog computing architecture is another issue that we have addressed in this thesis. Some traditional authentication schemes endure latency issues while others do not satisfy fog computing requirements such as mutual authentication between end-devices and fog servers. Thus, we have proposed a new, secure and efficient authentication scheme that ensures mutual authentication at the edge of the network and remedies to fog servers' misbehaviors.Finally, we tackled accountability and privacy-preserving challenges in information-sharing applications for which several proposals in the literature have treated privacy issues, but few of them have considered accountability service. Therefore, we have proposed a novel accountable privacy preserving solution for public information sharing in data externalization platforms. Externalization servers in our scheme authenticate any user in the system without violating its privacy. In case of misbehavior, our solution allows to trace malicious users thanks to an authority
Стилі APA, Harvard, Vancouver, ISO та ін.
7

TAPANELLI, Pietro. "Cloud computing contracts." Doctoral thesis, Università degli Studi di Camerino, 2014. http://hdl.handle.net/11581/401831.

Повний текст джерела
Анотація:
Cloud computing services are ubiquitous: for small and large companies the phenomenon of cloud computing is nowadays a standard business practice. This work would compile an analysis about the contractual issues related to the different services provided by all IT services provider. There are faced not only legal topics strictly connected to the personal data protection because, as the thesis will show, there are several legal acts provided by European Union, Italy (and from all EU's member states) and data protection authorities (both nation and international) that discipline the entire data protection topic in the cloud computing era. The legislation over cloud computing contracts, on the contrary, is totally absent and only the contractual instrument can be used to point out and specify duties and obligations between the contractual cloud parties, but the problem to find the proper legal discipline is not easy to solve. This work analyze the state of the art and provide a possible solution in order to find the legal discipline of cloud computing contracts, especially using the theory of ''connected contracts''.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Aliperti, Francesco. "Il Cloud Computing." Doctoral thesis, Universita degli studi di Salerno, 2017. http://hdl.handle.net/10556/2595.

Повний текст джерела
Анотація:
2015 - 2016
According to the definition of National Institute of Standards and Technology (NIST) dell’U.S. Departement of Commerce, cloud computing consists of a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and service) that can be rapidely provisioned and released with minimal management effort or service provider interaction; a new form of storage and data processing on a virtual platform. The first chapter define the phenomenon, describing the models and typologies, highlighting the benefits and the risks, as well as the legal problems associated with it. In particular, as the data and their processing are the object of the services offered by the cloud system, it is of particular importance that those aspects of the protection of the personal data of cloud service users are clarified as necessary, preliminary, a policy of prevention, aimed at informing about the risks. These issues are highlighted by the Guarantor for the Protection of Personal Data, which, more than once, has intervened in order to encourage a conscious and correct use of the cloud system. In the second chapter, the right to privacy is investigated in the current context of technological evolution. Some fundamental judgments of European jurisprudence are reviewed (judgments: Lindqvist, Costeja, Scherms) on the protection of privacy in the internet, highlighting the points of contact and distance to the Italian one, with reference also to a recent judgment of the Spanish High Tribunal. It is noted, however, that in the diversity of solutions offered, conflict between the various interests at stake can only be solved by reason of their careful balancing. Looking back on its evolution, it is clear that the right in question (which has expanded its content by including the right to the protection of personal data), in the light of what the European Court of Justice has stated, is not absolute prerogative, but must be considered in the light of its social function. The following is a review of European Regulation 2016/679 (which will be directly applicable in all EU countries from 25 May 2018), as it represents the instrument for formalizing the new digital course for the protection of Personal data, at Community and non-EU level. In particular, they analyze the novelties it introduces and the archives on which it relies on the entire privacy system. It is also intended to specify the spatial scope of application, in the light of the criteria set out in Article 3 thereof. In the third chapter, focusing on the most significant aspect of the technology under discussion (the clear separation between data ownership and processing and possession and control of data), the research analyzes the topic of ‘processing’ personal data the light of the opinions of the Italian and European Regulatory Authority (Art. 29 Group) and, in particular, of the recent European Regulation 2016/679 and of the Code of Conduct, 26 September 2016 of the CISPE. The topic that inevitably interfere with cloud technology, especially today, in a context where the scope for sharing and personal data collection has increased significantly, allowing both private companies and public authorities to use personal data, such as in the pursuit of their activities. This also in view of the fact that cloud services allow to ‘process’ and ‘store’ data on server systems deployed in different parts of the planet, where it is necessary to verify the existence of an ‘adequate level of protection’ in order to ensure to the party concerned a ‘substantially equivalent’ protection to that guaranteed within the Union. To this end, the essential premise for which it is necessary to inform about the risks is to clarify, in the light of the provisions of the Privacy Policy 2016 and of the Code of Conduct, 26 September 2016 of CISPE, issues such as: roles and obligations between controller and processor; the informational omissions of the service provider and the user’s unknowingness; keeping data in cloud computing and transferring them to a ‘third country’ after the judgments of the Court of Justice; the question of the portability of their data on other Csp (problem of the c.d. ‘vendor lock-in’); the data breach notification and the data protection in the relationship between constumer and provider. [edited by Author]
XXIX n.s.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cordone, Luigi. "L’evoluzione del Cloud Computing: Il Serverless Computing." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2020.

Знайти повний текст джерела
Анотація:
Il Serverless computing è l’evoluzione delle piattaforme cloud nella direzione di un codice puramente cloud-native. Esso ha l’obiettivo di facilitare il più possibile il lavoro degli sviluppatori evitando loro il compito di gestione e manutenzione delle infrastrutture, fornendo architetture auto-funzionanti che svolgano parte del lavoro per loro e riducendo così i tempi e costi. L’uso di questa tecnologia ha avuto un rapido e deciso aumento negli ultimi due anni, con un tasso di crescita del 700%, e ha le carte in regola per essere uno dei principali approcci di sviluppo in ambito IT del futuro. Il Serverless è un modello di servizio emergente che punta a semplificare l’approccio alla programmazione liberando il programmatore da tutti quegli aspetti che esulano dalla scrittura del codice. In questa tesi si fornisce una panoramica sul Serverless computing e si approfondirà l’ambito di utilizzo di serverless, il suo funzionamento, le tecnologie di cui si serve, come può imporsi nel mercato e per quale motivo dovrebbe poter soppiantare le soluzioni già presenti e già stabilmente radicate in ambito aziendale.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Повний текст джерела
Анотація:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Clod computing"

1

Khosravi, Mohammad R., Qiang He, and Haipeng Dai, eds. Cloud Computing. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99191-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Avresky, Dimiter R., Michel Diaz, Arndt Bode, Bruno Ciciani, and Eliezer Dekel, eds. Cloud Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12636-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Reinheimer, Stefan, ed. Cloud Computing. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20967-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Leung, Victor C. M., and Min Chen, eds. Cloud Computing. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-05506-0.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Leung, Victor C. M., and Min Chen, eds. Cloud Computing. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14254-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Antonopoulos, Nick, and Lee Gillam, eds. Cloud Computing. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-54645-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Faynberg, Igor, Hui-Lan Lu, and Dor Skuler, eds. Cloud Computing. Chichester, UK: John Wiley & Sons, Ltd, 2015. http://dx.doi.org/10.1002/9781118736074.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Jaatun, Martin Gilje, Gansen Zhao, and Chunming Rong, eds. Cloud Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10665-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Baun, Christian, Marcel Kunze, Jens Nimis, and Stefan Tai. Cloud Computing. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20917-8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Yousif, Mazin, and Lutz Schubert, eds. Cloud Computing. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03874-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Clod computing"

1

Shin, Byeong-Seok, and Ei-Kyu Choi. "An Efficient CLOD Method for Large-Scale Terrain Visualization." In Entertainment Computing – ICEC 2004, 592–97. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-28643-1_78.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kohne, Andreas. "Cloud Computing." In Cloud-Föderationen, 19–28. Wiesbaden: Springer Fachmedien Wiesbaden, 2018. http://dx.doi.org/10.1007/978-3-658-20973-5_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Zhu, Xiaoming, Bingying Song, Yingzi Ni, Yifan Ren, and Rui Li. "Cloud Computing—From Offline Computing to Cloud Computing." In Business Trends in the Digital Era, 23–42. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1079-8_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zhao, Liang, Sherif Sakr, Anna Liu, and Athman Bouguettaya. "Cloud Computing." In Cloud Data Management, 9–20. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-04765-2_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Vogel, Robert, Tarkan Koçoğlu, and Thomas Berger. "Cloud Computing." In Desktopvirtualisierung, 119–37. Wiesbaden: Vieweg+Teubner, 2010. http://dx.doi.org/10.1007/978-3-8348-9768-8_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Oppitz, Marcus, and Peter Tomsu. "Cloud Computing." In Inventing the Cloud Century, 267–318. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61161-7_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Murugesan, San, and Irena Bojanova. "Cloud Computing." In Encyclopedia of Cloud Computing, 1–14. Chichester, UK: John Wiley & Sons, Ltd, 2016. http://dx.doi.org/10.1002/9781118821930.ch1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Barton, Thomas. "Cloud Computing." In E-Business mit Cloud Computing, 41–52. Wiesbaden: Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-8348-2426-4_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Möhring, Michael, Barbara Keller, and Rainer Schmidt. "Cloud-Computing." In CRM in der Public Cloud, 11–19. Wiesbaden: Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-19724-7_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Lele, Ajey. "Cloud Computing." In Disruptive Technologies for the Militaries and Security, 167–85. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-3384-2_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Clod computing"

1

Marin, Dramnescu, and Vladimir Enachescu. "THE ADVANTAGES OF USING CLOUD COMPUTING IN EDUCATIONAL ENVIRONMENT." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-057.

Повний текст джерела
Анотація:
Cloud services are understood and analyzed more technical perspective, and less in terms of benefits and changes that can bring them this new model for education. Current technology trends indicate that the future of the web will be oriented towards Cloud technologies. Cloud will be provided "as a service" and the Internet of the future will be a tight connection between humans, electronic devices and services. CWS concept (Cloud-based Web Services) describes a platform that connects multiple data storage centers and generate new ways to unify distributed web services. For this reason, the CWS is an essential part of the Cloud environment. In this context, Cloud computing is a modern computerized infrastructure that facilitates rapid provision of resources required. From this perspective, the Cloud platform has changed the way of development and execution of applications in the educational environment. Because the distribution of an application or information or a very fast course, the environment offered by cloud it is understood as a service provider platform (PaaS -Platform as a Service). Using services Clod can be created Centre of shared services at the university, which improves the quality of the educational process (digital content, e-learning, educational hands-on, on demand, training customized, flexible, knowledge management or management route of instruction). Cloud computing enables applications to run without having to infrastructure or constant updates, thus providing effective valid or innovative solutions. The educational environment creates their own applications using tools and libraries provided by the Cloud provider, setting up their development and application, while the service provider provides infrastructure and manages the infrastructure. Cloud computing enables applications to run without having to infrastructure or constant updates, thus providing effective valid or innovative solutions. The educational environment creates their own applications using tools and libraries provided by the Cloud provider, setting up their development and application, while the service provider provides infrastructure and manages the infrastructure.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Parne, Prudhvi. "Cloud Computing Strategy and Impact in Banking/Financial Services." In 5th International Conference on Computer Science and Information Technology (COMIT 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111704.

Повний текст джерела
Анотація:
With recent advances in technology, internet has drastically changed the computing world from the concept of parallel computing to distributed computing to grid computing and now to cloud computing. The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Unfortunately, many banks are still hesitant to adopt cloud technology. New technologies such as cloud and AI will have the biggest impacts on the banking industry. For banks and credit unions wanting to achieve greater business agility, cloud technology enables organizations to respond instantly to changing market conditions, leveraging data and applied analytics to achieve customer experience and operational productivity benefits. As a result, cloud computing comes in to provide a solution to such challenges making banking a reliable and trustworthy service. This paper aims at cloud computing strategy, impact in banking and financial institutions and discusses the significant reliance of cloud computing.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Nowocin, Walter. "Benefits of the Cloud for Calibration Management Software Systems." In NCSL International Workshop & Symposium. NCSL International, 2021. http://dx.doi.org/10.51843/wsproceedings.2021.05.

Повний текст джерела
Анотація:
The National Institute of Standards and Technology (NIST) was directed by the federal government to define cloud computing to assist federal agencies in implementing cloud architectures. In 2011, NIST published NIST SP 800-145 “The NIST Definition of Cloud Computing” and defined cloud computing as: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. [1]” Cloud computing is a relatively new IT concept and as such, there is much to learn about the benefits that this business model can bring to organizations. Cloud computing will transform how you do business. The objective of this paper is to explain the benefits of using a cloud architecture for calibration management software systems. The following benefits and topics will be discussed: Work From Anywhere, Always On, Reduced IT Costs, Scalability, Automatic Updates, Reduce Coordination Costs, Improved Quality Control, Disaster Recovery, Environmental Sustainability, Increased Competitiveness, Stronger Security, and Compliance Considerations [2].
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Murtala, M. M., and Olumide Babatope Longe. "Data Security in Decentralized Cloud Systems: A Case for the Deployment of Blockchain Technology." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p13.

Повний текст джерела
Анотація:
The technological advancement and growth of the cloud computing technologies is changing network service provisioning and operation. Cloud based services represented as XaaS where X refers to service offering such as Platform, Software and Infrastructure as a service, provides flexible on-demand provisioning along with its security concerns that goes with the adoption of the cloud computing. Despite all the advantages of adopting the cloud computing option, the security and privacy of the clients’ data cannot be overlooked. Understanding these security concerns is a fundamental requirement to choosing the cloud solution. This paper focuses on the use of Blockchain technology to mitigate the security challenges of the cloud computing. Literature reviews have discussed other security options for the cloud, but little discussions have centered on the adoption of the Block Chain technology to secure the cloud and open doors for future research of cloud computing using smart contract. Keywords: Blockchain, Distributed Database Systems, Data Integrity, cryptography, Cloud Infrastructure Security, Confidentiality, Distributed Ledger
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Moravcik, Marek, Pavel Segec, Jana Uramova, and Martin Kontsek. "Teaching cloud computing in cloud computing." In 2017 15th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2017. http://dx.doi.org/10.1109/iceta.2017.8102512.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Alkamil, Ethar H. K., Ammar A. Mutlag, Haider W. Alsaffar, and Mustafa H. Sabah. "The Role of Hybrid IoT with Cloud Computing and Fog Computing to Help the Oil and Gas Industry Recover from Covid-19 and Face Future Challenges." In SPE Annual Technical Conference and Exhibition. SPE, 2021. http://dx.doi.org/10.2118/206067-ms.

Повний текст джерела
Анотація:
Abstract Recently, the oil and gas industry faced several crucial challenges affecting the global energy market, including the Covid-19 outbreak, fluctuations in oil prices with considerable uncertainty, dramatically increased environmental regulations, and digital cybersecurity challenges. Therefore, the industrial internet of things (IIoT) may provide needed hybrid cloud and fog computing to analyze huge amounts of sensitive data from sensors and actuators to monitor oil rigs and wells closely, thereby better controlling global oil production. Improved quality of service (QoS) is possible with the fog computing, since it can alleviate challenges that a standard isolated cloud can't handle, an extended cloud located near underlying nodes is being developed. The paradigm of cloud computing is not sufficient to meet the needs of the already extensively utilized IIoT (i.e., edge) applications (e.g., low latency and jitter, context awareness, and mobility support) for a variety of reasons (e.g., health care and sensor networks). Couple of paradigms just like mobile edge computing, fog computing, and mobile cloud computing, have arisen in recently to meet these criteria. Fog computing helps to optimize services and create better user experiences, such as faster responses for critical, time-sensitive needs. At the same time, it also invites problems, such as overload, underload, and disparity in resource usage, including latency, time responses, throughput, etc. The comprehensive review presented in this work shows that fog devices have highly constrained environments and limited hardware capabilities. The existing cloud computing infrastructure is not capable of processing all data in a centralized manner because of the network bandwidth costs and response latency requirements. Therefore, fog computing demonstrated, instead of edge computing, and referred to as "the enabling technologies allowing computation to be performed at the edge of the network, on downstream data on behalf of cloud services and upstream data on behalf of IIoT services" (Shi et al., 2016) is more effective for data processing when data sources are close together. A review of fog and cloud computing literature suggests that fog is better than cloud computing because fog computing performs time-dependent computations better than cloud computing. The cloud is inefficient for latency-sensitive multimedia services and other time-sensitive applications since it is accessible over the internet, like the real-time monitoring, automation, and optimization of petroleum industry operations. As a result, a growing number of IIoT projects are dispersing fog computing capacity throughout the edge network as well as through data centers and the public cloud. A comprehensive review of fog computing features is presented here, with the potential of using it in the petroleum industry. Fog computing can provide a rapid response for applications through preprocess and filter data. Data that has been trimmed can then be transmitted to the cloud for additional analysis and better service delivery.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wu, Dazhong, Xi Liu, Steve Hebert, Wolfgang Gentzsch, and Janis Terpenny. "Performance Evaluation of Cloud-Based High Performance Computing for Finite Element Analysis." In ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/detc2015-46381.

Повний текст джерела
Анотація:
Cloud computing is an innovative computing paradigm that can potentially bridge the gap between increasing computing demands in computer aided engineering (CAE) applications and limited scalability, flexibility, and agility in traditional computing paradigms. In light of the benefits of cloud computing, high performance computing (HPC) in the cloud has the potential to enable users to not only accelerate computationally expensive CAE simulations (e.g., finite element analysis), but also to reduce costs by utilizing on-demand and scalable cloud computing resources. The objective of this research is to evaluate the performance of running a large finite element simulation in a public cloud. Specifically, an experiment is performed to identify individual and interactive effects of several factors (e.g., CPU core count, memory size, solver computational rate, and input/output rate) on run time using statistical methods. Our experimental results have shown that the performance of HPC in the cloud is sufficient for the application of a large finite element analysis, and that run time can be optimized by properly selecting a configuration of CPU, memory, and interconnect.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Moloja, Dina, and Ephias Ruhode. "Factors affecting Cloud Computing adoption in Higher Learning Institutions in South Africa: A case of Matjhabeng TVET Colleges." In Sixth International Conference on Higher Education Advances. Valencia: Universitat Politècnica de València, 2020. http://dx.doi.org/10.4995/head20.2020.11243.

Повний текст джерела
Анотація:
Cloud Computing is one of the most important trends and newest area in the field of information technology in which resources (e.g. CPU and storage) can be leased and released by customers through the Internet in an on-demand basis. The adoption of Cloud Computing in Higher Learning Institution is a real opportunity. Although Cloud computing has gained popularity in the world especially in education and industry, but its impact in colleges is still unexplored. This exploratory qualitative research seeks to identify the factors affecting the adoption of Cloud Computing in South Africa, focusing on Matjhabeng TVET colleges. 35 IT stakeholders from two TVET colleges was interviewed. Thematic analysis was utilised to analase data. After data was analysed, the findings revealed that data security, lack of internet access and lack of infrastructure resources are key factors that affects Cloud computing adoption in Matjhabeng TVET colleges. This paper contributes to the literature on Cloud Computing adoption in Higher Learning Institutions in South Africa.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Wu, Dazhong, J. Lane Thames, David W. Rosen, and Dirk Schaefer. "Towards a Cloud-Based Design and Manufacturing Paradigm: Looking Backward, Looking Forward." In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-70780.

Повний текст джерела
Анотація:
The rise of cloud computing is radically changing the way enterprises manage their information technology (IT) assets. Considering the benefits of cloud computing to the information technology sector, we present a review of current research initiatives and applications of the cloud computing paradigm related to product design and manufacturing. In particular, we focus on exploring the potential of utilizing cloud computing for selected aspects of collaborative design, distributed manufacturing, collective innovation, data mining, semantic web technology, and virtualization. In addition, we propose to expand the paradigm of cloud computing to the field of computer-aided design and manufacturing and propose a new concept of cloud-based design and manufacturing (CBDM). Specifically, we (1) propose a comprehensive definition of CBDM; (2) discuss its key characteristics; (3) relate current research in design and manufacture to CBDM; and (4) identify key research issues and future trends.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rayapati, Siri Varshini, Sravya Muttavarapu, Navya Nagasuri, and Sunita Singhal. "Security in Cloud Technologies: A Brief Overview." In International Research Conference on IOT, Cloud and Data Science. Switzerland: Trans Tech Publications Ltd, 2023. http://dx.doi.org/10.4028/p-4pq758.

Повний текст джерела
Анотація:
Cloud computing, a next-generation computing technique, enables extremely flexible, scalable, and cost-effective computing that is available on demand. Organizations can expect increased agility, improved business interaction, and continuity as a result of cloud technologies. However, with increased demand, the need for data confidentiality, integrity, and availability has become one of the most crucial challenges in cloud computing. Various cryptographic approaches are employed in the cloud to guarantee that these needs are met, such as safeguarding against data breaches and malicious attacks. This paper outlines cloud infrastructure, cloud security requirements, and their challenges. We then present an overview of various cryptographic techniques such as AES, DES, RSA, etc. that have been used to ensure cloud security. We also reviewed hybrid algorithms proposed and implemented by various authors and mentioned their advantages and shortcomings.
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Clod computing"

1

Weber, Arnd, ed. Impacts of Cloud Computing (STOA Cloud Computing Del.3). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Weber, Arnd, ed. Foundations of Cloud Computing (STOA Cloud Computing Del.2). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Takai, Teresa M. Cloud Computing Strategy. Fort Belvoir, VA: Defense Technical Information Center, July 2012. http://dx.doi.org/10.21236/ada563989.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Fort Belvoir, VA: Defense Technical Information Center, August 2011. http://dx.doi.org/10.21236/ada549202.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Seybold, Patricia. Cloud Computing in 2015. Boston, MA: Patricia Seybold Group, December 2013. http://dx.doi.org/10.1571/ta12-13-13cc.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Kim, Anya, and Ira S. Moskowitz. Incentivized Cloud Computing: A Principal Agent Solution to the Cloud Computing Dilemma. Fort Belvoir, VA: Defense Technical Information Center, September 2010. http://dx.doi.org/10.21236/ada530441.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Weber, Arnd, ed. Cloud Computing - European Perspectives on impacts and potentials of Cloud Computing and Social Network Sites (STOA Cloud Computing Del.1). Vienna: self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hogan, Michael, Fang Liu, Annie Sokol, and Jin Tong. NIST cloud computing standards roadmap :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-291v1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Liu, Fang, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger, and Dawn Leaf. NIST cloud computing reference architecture. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.500-292.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

de Vaulx, Frederic, Eric Simmon, and Robert Bohn. Cloud computing service metrics description. Gaithersburg, MD: National Institute of Standards and Technology, April 2017. http://dx.doi.org/10.6028/nist.sp.500-307.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії