Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
481
Automatic Scaling Mechanism of Intermodal EDI System under Green Cloud Computing
Published 2022-01-01“…Based on the resource scheduling characteristics of container cloud and considering the distribution and heterogeneity of intermodal cloud computing platform from the perspective of resource allocation, the automatic scaling mechanism of XEDI is established, the scaling model is established, and the automatic scaling algorithm is proposed. …”
Get full text
Article -
482
Jacques Maurice et l'École Normale Supérieure de Saint-Cloud
Published 2015-03-01Subjects: “…École Normale Supérieure de Saint-Cloud…”
Get full text
Article -
483
Research on the Resources Scheduling Method of Virtual Machines Under the Cloud Computing Environments
Published 2013-04-01Subjects: “…cloud computing…”
Get full text
Article -
484
A Vehicular Cloud-Based Framework for the Intelligent Transport Management of Big Cities
Published 2016-05-01“…With these challenges in mind, we propose a vehicular cloud architecture to assist in the management of large cities. …”
Get full text
Article -
485
Integration of Heterogeneous Devices and Communication Models via the Cloud in the Constrained Internet of Things
Published 2015-10-01“…In order to alleviate service developers from these concerns, this paper presents a cloud-based platform for integrating heterogeneous constrained IoT devices and communication models into services. …”
Get full text
Article -
486
Multidimensional Heterogeneous Medical Data Push in Intelligent Cloud Collaborative Management System
Published 2020-01-01“…The medical data in the intelligent cloud collaborative management system have multidimensional heterogeneous interference, and there are problems such as low data information update rate and poor push results in the push process. …”
Get full text
Article -
487
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01Subjects: “…Fully Homomorphic Encryption, Cloud computing, Asymmetric Encryption, Large number, Banking security.…”
Get full text
Article -
488
Collapse risk assessment based on linear programming variable weight-cloud model.
Published 2024-01-01“…Finally, a comprehensive evaluation model of cloud model is constructed to determine the risk level of collapse. …”
Get full text
Article -
489
Convergence of telco cloud and bearer network based computing power network orchestration
Published 2020-07-01“…Facing the combination of computing and network connection in the future network,and the development trend of computing and network integration,a computing power network orchestration model based on centralized and distributed control schemes was proposed.From the perspective of solution analysis,the computing power network orchestration scheme based on the convergence of telco cloud and bearer network can meet the future business needs of mobile edge computing (MEC) site better.With scheduling capabilities coordinated for both computing and networking,the network’s perception of services can be optimized.The specific choice of centralized or distributed control scheme is closely related to the operator’s telco cloud capabilities and the evolution stage of the bearer network.…”
Get full text
Article -
490
A scalable framework for secure and reliable wireless-based fog cloud communication
Published 2025-02-01Subjects: “…Fog cloud computing security…”
Get full text
Article -
491
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
Published 2025-01-01Subjects: Get full text
Article -
492
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article -
493
Fundamental Theory and Key Technology of Software Defined Cloud Data Center Network
Published 2014-06-01Subjects: Get full text
Article -
494
System Design for Media Server Based on Cloud Computing Technology and the Application Analysis
Published 2013-06-01Subjects: “…cloud computing…”
Get full text
Article -
495
Cancellation of cloud shadow effects in the absorbing aerosol index retrieval algorithm of TROPOMI
Published 2025-01-01“…The cloud-shadow-induced signatures are, however, not always apparent and may depend on various cloud and scene parameters. …”
Get full text
Article -
496
Inter-Cloud Data Security Framework to Build Trust Based on Compliance with Controls
Published 2024-01-01“…The future of cloud is the “cloud of clouds,” where cloud service providers (CSPs) collaborate with each other to provide ever-scalable solutions to their customers. …”
Get full text
Article -
497
From Data to Decisions: A Smart IoT and Cloud Approach to Environmental Monitoring
Published 2025-01-01“…The sensor nodes transmit data using the MQTT (Message Queuing Telemetry Transport) protocol to a cloud-based MQTT Broker hosted on HiveMQ Cloud. Data processing and visualization are handled by Node-RED, which subscribes to MQTT topics, processes incoming data streams, and stores them in a time-series database, InfluxDB Cloud. …”
Get full text
Article -
498
Application protection in 5G cloud network using zero trust architecture
Published 2020-12-01“…Based on the analysis of security requirements in the era of 5G cloud-network convergence,the basic principles of zero trust were studied,including not rely on location,untrusted traffic,and dynamic access control.The basic architecture of zero-trust was studied,combining with 5G cloud network architecture,the feasible application protection solutions include the customer-built OTT model,the use of the existing VPDN model,and the public zero-trust architecture model was proposed and compared.The application scenarios of customers in 5G cloud network were analyzed,including remote access,secure cloud,mobile office,etc.In these scenarios,the value that zero-trust architecture can bring to customers was proposed,such as application hiding and dynamic control,ensure the application safety.…”
Get full text
Article -
499
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01Subjects: “…cloud computing…”
Get full text
Article -
500
Proxy re-encryption based multi-factor access control scheme in cloud
Published 2018-02-01Subjects: Get full text
Article