Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
281
The intersection of digital health and artificial intelligence: Clearing the cloud of uncertainty
Published 2025-01-01Get full text
Article -
282
Mutual authentication scheme based on the TPM cloud computing platform
Published 2012-11-01Subjects: “…cloud computing…”
Get full text
Article -
283
CP-ABE based data access control for cloud storage
Published 2011-01-01Subjects: “…cloud storage…”
Get full text
Article -
284
Multi-objective task offloading algorithm for mobile cloud computing
Published 2019-09-01Subjects: “…mobile cloud computing…”
Get full text
Article -
285
Approach of service evaluation based on trust reasoning for cloud computing
Published 2011-01-01Get full text
Article -
286
A Correctness Checking Approach for Collaborative Business Processes in the Cloud
Published 2020-01-01“…With the increasing popularity of cloud computing, especially the emergence of Business Process as a Service (BPaaS), more and more enterprises construct their process collaborations based on BPaaS services. …”
Get full text
Article -
287
Application of the Logistics Management System Based on Cloud Computing Technology
Published 2022-01-01“…In order to solve the vehicle routing optimization problem of cold chain logistics distribution, this paper proposes a vehicle routing optimization method of cold chain logistics distribution based on cloud computing technology. This paper analyzes the advantages of processing the real-time routing of distribution vehicles under the cloud computing mode and establishes the application service architecture of vehicle routing optimization in cold chain logistics; under this architecture, multisource real-time traffic information is obtained, the vehicle distribution time and comprehensive cost are analyzed, the vehicle routing optimization model of cold chain logistics distribution is constructed, and the coarse-grained parallel genetic algorithm is used to solve the model in the cloud computing environment. …”
Get full text
Article -
288
Scheme of Smart Home Application Control Based on Cloud Service
Published 2015-11-01Subjects: Get full text
Article -
289
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: “…cloud computing…”
Get full text
Article -
290
Stability of compact stars in a uniform density background cloud
Published 2024-12-01“…Abstract We are discussing a scenario where a compact star (neutron star, NS) is embedded in a thin, uniform density background cloud (a remnant cloud after a supernova or a cloud generated from the late stages of a star e.g., a planetary nebula or asymptotic red giant phases) and its effect on the stability of the compact star. …”
Get full text
Article -
291
Cloud outsourcing secret sharing scheme against covert adversaries
Published 2017-05-01“…In order to make computationally weak cloud tenants can reconstruct a secret with efficiency and fairness,a cloud outsourcing secret sharing scheme was proposed,which combined cloud outsourcing computation with secret sharing scheme.In the process of outsourcing secret sharing,cloud tenants just need a small amount of decryption and validation operations,while outsource expensive cryptographic operations to cloud service provider (CSP).The scheme,without complex interactive augment or zero-knowledge proof,could detect malicious behaviors of cloud tenants or cloud service providers.And the scheme was secure against covert adversaries.Finally,every cloud tenant was able to obtain the secret fairly and correctly.Security analysis and performance comparison show that scheme is safe and effective.…”
Get full text
Article -
292
Adaptive Sensing Private Property Protection Protocol Based on Cloud
Published 2015-11-01“…Encrypted information of items, sensors, and readers is stored in the cloud. The reader reads sensors and uploads the collected data to the cloud for further processing in real time. …”
Get full text
Article -
293
ICFF: a cloud forensics framework under the IaaS model
Published 2013-05-01Subjects: “…cloud computing…”
Get full text
Article -
294
Distance aware route algorithm for cloud computing based on CAN
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
295
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
Published 2021-04-01Subjects: “…Big Data, Data Computing, Big Data Mining, Cloud Computing…”
Get full text
Article -
296
Security sharing and associated deleting scheme for multi-replica in cloud
Published 2015-11-01Subjects: “…cloud environment…”
Get full text
Article -
297
Distributed game theoretic approach for offloading in ad hoc cloud
Published 2017-11-01Subjects: “…ad hoc mobile cloud computing…”
Get full text
Article -
298
Subjective trust evaluation model based on membership cloud theory
Published 2008-01-01Subjects: Get full text
Article -
299
Research and Practice on Network Auto-Deployment of Cloud Resource Pool
Published 2015-07-01Subjects: “…cloud based resource pool…”
Get full text
Article -
300
Blockchain and cloud platforms in banking services: A paradox perspective
Published 2023-01-01Subjects: Get full text
Article