Saturday, August 15, 2015

Research Directions in Cloud Computing

S Mustafa, B Nazir, A Hayat, SA Madani - Computers & Electrical Engineering, 2015
Abstract Cloud computing has emerged as a popular computing paradigm for hosting large
computing systems and services. Recently, significant research is carried out on Resource
Management (RM) techniques that focus on the efficient sharing of cloud resources ...

[PDF] Probabilistic Byzantine Tolerance for Cloud Computing

L Arantes, R Friedman, O Marin, P Sens - 34th International Symposium on Reliable …, 2015
Abstract—Preventing Byzantine failures in the context of cloud computing is costly.
Traditional BFT protocols induce a fixed degree of replication for computations and are
therefore wasteful. This paper explores probabilistic Byzantine tolerance, in which ...

A Study on Sub-material Suppliers' Adoption Behavior of Cloud Computing System

I Lee - 2015
Abstract With the rapid development of global communication and technology innovation,
the advantage of Taiwan manufacturers is disappearing gradually, and how to break
through the difficult position is an important and necessary subject now. In order to get the ...

Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Computing

R Vyas, A Singh, J Singh - Security in Computing and Communications: Third …, 2015

Innovations in Knowledge Management: The Impact of Social Media, Semantic Web and Cloud Computing

L Razmerita, G Phillips-Wren, LC Jain - 2015
This book discusses emerging trends in the field of managing knowledge work due to
technological innovations. The book is organized in 3 sections. The first section, entitled"
Managing Knowledge, Projects and Networks", discusses knowledge processes and their ...

Towards Targeted Intrusion Detection Deployments in Cloud Computing

N Ahmed, B Bhargava - INTERNATIONAL JOURNAL OF NEXT-GENERATION …, 2015
Abstract Preventing security violation incidents or collecting dependable system audit trails
for post incidents requires successfully detecting anomaly-based abnormal or intrusion
activities. However, properly positioning the necessary tools for maximum detection can ...

[PDF] Study of Security challenges in Cloud Computing

MS Singh - benefits, 2015
ABSTRACT Cloud computing has gained important traction for recent years. it's a sort of
distributed computing whereby resources and application platform square measure shared
over the net through on demand and pay on utilization basis. many corporations have ...

[HTML] Toward a Framework for Improving the Execution of the Big Data Applications

W Abbes, Z Kechaou, AM Alimi - Procedia Computer Science, 2015
... Keywords. cloud computing; transparent computing; big-data; learning techniques; resource
provisioning. References. [1]; Mark Weiser; ... [5]; BJS Chee, F. Curtis Jr. "Cloud computing:
technologies and strategies of the ubiquitous data center". CRC Press (2010). ...

[HTML] Towards an Offloading Framework based on Big Data Analytics in Mobile Cloud Computing Environments

H Kchaou, Z Kechaou, AM Alimi - Procedia Computer Science, 2015
Abstract Mobile Cloud Computing (MCC) is the combination between cloud computing and
mobile devices. The challenge for mobile devices is to provide solutions for their limited
resources, and it would be possible through cloud computing by running memory ...

Effects of cloud‐based m‐learning on student creative performance in engineering design

YS Chang, SY Chen, KC Yu, YH Chu, YH Chien - British Journal of Educational …, 2015
Skip to Main Content. Wiley Online Library. Log in / Register. Log In E-Mail
Address Password Forgotten Password? Remember Me. ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online