Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
261
Survey of DDoS defense:challenges and directions
Published 2017-10-01Subjects: Get full text
Article -
262
Computing network:a new multi-access edge computing
Published 2019-09-01Subjects: Get full text
Article -
263
Design and analysis of telecom service platform reconstruction based on open source software
Published 2017-05-01Subjects: Get full text
Article -
264
Investigation of smart economic zone planning scheme
Published 2017-12-01Subjects: Get full text
Article -
265
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01Subjects: Get full text
Article -
266
Approach for distributed BPEL engine placement using K-means
Published 2014-05-01Subjects: Get full text
Article -
267
Task scheduling algorithm for distributed environment based on signal-driven
Published 2015-07-01Subjects: Get full text
Article -
268
An SLA-based resource scheduling method in hybrid cloud environment
Published 2016-02-01Subjects: “…cloud computing…”
Get full text
Article -
269
Maximum Mutual Information Feature Extraction Method Based on the Cloud Platform
Published 2013-10-01Subjects: “…cloud computing…”
Get full text
Article -
270
On Edge-Fog-Cloud Collaboration and Reaping Its Benefits: A Heterogeneous Multi-Tier Edge Computing Architecture
Published 2025-01-01Subjects: Get full text
Article -
271
Survey of data possession provability proving on cloud storage
Published 2012-11-01Subjects: “…cloud computing…”
Get full text
Article -
272
Research on DDoS detection in multi-tenant cloud based on entropy change
Published 2016-10-01Subjects: Get full text
Article -
273
Research on forensics of privacy violations in cloud environment
Published 2018-01-01Subjects: “…cloud computing…”
Get full text
Article -
274
Research on outsourcing of digital image forensics based on privacy preserving
Published 2016-08-01Subjects: Get full text
Article -
275
Method of ciphertext retrieval in mobile edge computing based on block segmentation
Published 2020-07-01Subjects: “…cloud computing…”
Get full text
Article -
276
Survey on public key encryption with equality test
Published 2018-11-01Subjects: Get full text
Article -
277
Research on satellite link emulation for space-ground integration information network
Published 2018-04-01Subjects: “…cloud computing…”
Get full text
Article -
278
Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud
Published 2017-06-01Subjects: “…cloud computing…”
Get full text
Article -
279
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01Subjects: Get full text
Article -
280
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
Published 2024-07-01Subjects: “…cloud computing…”
Get full text
Article