-
141
CSP-based resource allocation model and algorithms for energy-efficient cloud computing
Published 2013-12-01Subjects: “…cloud computing…”
Get full text
Article -
142
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01Subjects: Get full text
Article -
143
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
Published 2024-07-01Subjects: “…cloud computing…”
Get full text
Article -
144
Cloud computing node based on Loongson multi-core CPU
Published 2013-12-01Subjects: Get full text
Article -
145
Scheduling framework based on reinforcement learning in online-offline colocated cloud environment
Published 2023-06-01Subjects: Get full text
Article -
146
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
147
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis Environments
Published 2025-01-01Subjects: Get full text
Article -
148
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: “…cloud computing…”
Get full text
Article -
149
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
Published 2021-04-01Subjects: “…Big Data, Data Computing, Big Data Mining, Cloud Computing…”
Get full text
Article -
150
Distributed game theoretic approach for offloading in ad hoc cloud
Published 2017-11-01Subjects: “…ad hoc mobile cloud computing…”
Get full text
Article -
151
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
152
A General Network Architecture Design of Large-Scale Cloud Data Center Based on Service Switch
Published 2013-10-01Subjects: Get full text
Article -
153
Research on Security of Virtualization on Cloud Computing
Published 2015-06-01Subjects: “…cloud computing…”
Get full text
Article -
154
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Published 2017-09-01Subjects: Get full text
Article -
155
Wireless Catching and Transferring System of Next Generation Network
Published 2014-04-01Subjects: Get full text
Article -
156
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01Subjects: Get full text
Article -
157
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
158
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: “…cloud computing…”
Get full text
Article -
159
Cloud computing forensic model
Published 2017-09-01Subjects: “…cloud computing…”
Get full text
Article -
160
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article