Saturday, March 5, 2016

Research Readings in Cloud Computing

[PDF] Addressing the Challenges of E-government in Developing Countries through Public-Private Partnership Model Based on Cloud Computing

F Khan, K Surat, AW Tareen, M Saeed - Journal of Applied and Emerging Sciences, 2016
Abstract E-Government is recognized globally as an enabler toward transformation of public
sector from a bureaucratic agency centric organizational model to a SMART (simple, moral,
accountable, responsive, and transparent) citizen-centric government model. Successful ...

QoS-aware autonomic cloud computing for ICT

S Singh, I Chana - Proceedings of International Conference on ICT for …, 2016
Abstract Emergence of Information and Communication Technologies (ICT) plays an
important role in networking sector by providing services through cloud-based systems.
Based on application requirements of cloud users, discovery and allocation of best ...

PSSRC: A Web Service Registration Cloud Based on Structured P2P and Semantics

Q He, B Zhao, L Chang, J Su, I You - International Journal of Data Warehousing and …, 2016
... Top Abstract. The Universal Description, Discovery and Integration (UDDI) registry is widely
used for organizing Web services in the Internet, but it cannot meet the requirement of
organizing massive Web services in the cloud computing environment. ...

A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications

C Colman-Meixner, C Develder, M Tornatore… - 2015
Abstract—Today's businesses increasingly rely on cloud computing, which brings both great
opportunities and challenges. One of the critical challenges is resiliency: disruptions due to
failures (either accidental or because of disasters or attacks) may entail significant ...

[PDF] Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA Algorithms

TS Barhoom, MA Ghosh - International Journal of Research in Engineering and …, 2016
Abstract: Mobile cloud computing in light of the increasing popularity among users of mobile
smart technology which is the next indispensable that enables users to take advantage of
the storage cloud computing services. However, mobile cloud computing, the migration of ...

OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTINGENVIRONMENTS

PK Banerjee, A Billore, S Biswas, MA Muthiah - US Patent 20,160,041,857, 2016
Abstract: Embodiments of the present invention provide systems, methods, and computer
program products for optimizing a placement plan. In one embodiment, a method is
disclosed in which a request for registration with an external advisor is received. A time to ...

OPTIMIZING PLACEMENT PLANS FOR HOST FAILURE IN CLOUD COMPUTINGENVIRONMENTS

PK Banerjee, A Billore, S Biswas, MA Muthiah - US Patent 20,160,041,889, 2016
Abstract: Embodiments of the present invention provide systems, methods, and computer
program products for optimizing a placement plan. In one embodiment, a method is
disclosed in which a request for registration with an external advisor is received. A time to ...

Max-Min Ant System based Approach for Intelligent VM Migration and Consolidation for GreenCloud Computing

R Sarathe, A Mishra, SK Sahu - International Journal of Computer Applications, 2016
Abstract Cloud computing has bring a revolution in the field of computing. Many algorithms
are proposed to make it even more efficient. In cloud computing Virtualization plays an
important role and whole performance of cloud depends on VM allocation and Migration. ...

[PDF] A Pragmatic Approach to Optimize Energy Efficient Resource Allocation Technique inCloud Computing Data Center

N Pangotra, M Sharma - resource, 2016
Abstract: Rapid growth of the demand for computational power has led to the creation of
large-scale cloud computing data centers. The development of computing systems has
always been focused on performance improvements driven by the demand of applications ...

[PDF] ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for MobileCloud Computing

K Zhou, MH Afifi, J Ren - arXiv preprint arXiv:1602.08472, 2016
Abstract: Discrete exponential operation, such as modular exponentiation and scalar
multiplication on elliptic curves, is a basic operation of many public-key cryptosystems.
However, the exponential operations are considered prohibitively expensive for resource- ...

No comments:

Post a Comment

 

blogger templates 3 columns | Make Money Online