Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Distributed processing 1
- Electronic data processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
-
881
-
882
Virtual Networking Performance in OpenStack Platform for Network Function Virtualization
Published 2016-01-01“…To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. …”
Get full text
Article -
883
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks
Published 2014-02-01Get full text
Article -
884
Prediction Based Proactive Thermal Virtual Machine Scheduling in Green Clouds
Published 2014-01-01“…Cloud computing has rapidly emerged as a widely accepted computing paradigm, but the research on Cloud computing is still at an early stage. …”
Get full text
Article -
885
A cost- and performance-effective approach for task scheduling based on collaboration between cloud and fog computing
Published 2017-11-01“…The rapid development of Internet of Things applications, along with the limitations of cloud computing due mainly to the far distance between Internet of Thing devices and cloud-based platform, has promoted a newly distributed computing platform based on collaboration between cloud computing and fog computing. …”
Get full text
Article -
886
IMpc-PyrYOLO: Hybrid YOLO Based Feature Pyramidal Network for Pest Detection in Rice Leaves
Published 2025-06-01Get full text
Article -
887
A Comparative Evaluation of Machine Learning-Based Intrusion Detection Systems for Securing Cloud Environments
Published 2024-12-01“…Cloud computing has advanced significantly alongside the growth of communication technology and data exchange. …”
Get full text
Article -
888
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
Published 2022-12-01“… Today, the role of cloud computing in our day-to-day lives is very prominent. …”
Get full text
Article -
889
A Geospatial Information Grid Framework for Geological Survey.
Published 2015-01-01“…The purpose of this paper is to develop a geological cloud-computing platform for integrating and sharing geological information based on a cloud architecture. …”
Get full text
Article -
890
ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES
Published 2014-12-01“…As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.…”
Get full text
Article -
891
Security risk analysis and evaluation techniques in power information system cloud
Published 2018-02-01“…Combining the power industry with cloud computing technology,a systematic study on safety analysis and evaluation methods of the power cloud was carried out.A comprehensive combing on functional entities and business processes of the power information system under the cloud environment was conducted.Through the combination of static STRIDE threat modeling and dynamic attack chain algorithm,the main risks of cloud platform were classified and quantified.A security protection architecture of power cloud system was put forward to promote the popularization and application of cloud computing in the power industry,and to provide a strong support for the safety and control of power information system.…”
Get full text
Article -
892
PPPoE internet access for government-enterprise customer in LSN environment
Published 2017-09-01“…With the blowout development of cloud-computing market,start-up enterprises gradually increase the demand for cloud business.For the cost-sensitive customers,using the traditional government-enterprise PPPoE in the LSN environment could reduce the wastage of public IPv4 addresses.Meanwhile,ICT services based on cloud-computing was provided for customers.Several solutions which mixed the traditional government-enterprise gateway solution and the latest LSN scene were presented.Through the analysis of advantages and disadvantages of each scheme,reference for government-enterprise customers dialing-up to access internet in LSN environment was presented.…”
Get full text
Article -
893
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01“…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. However, cloud computing is no longer able to meet the current data processing requirements. …”
Get full text
Article -
894
Secrecy Analysis for Multi-Relaying RF-FSO Systems With a Multi-Aperture Destination
Published 2020-01-01Get full text
Article -
895
An Efficient Framework for Sharing a File in a Secure Manner Using Asymmetric Key Distribution Management in Cloud Environment
Published 2019-01-01“…Cloud computing is a platform to share the data and resources used among various organizations, but the survey shows that there is always a security threat. …”
Get full text
Article -
896
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01“…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
Get full text
Article -
897
Overview of research on trusted attestation technology of cloud virtualization platform
Published 2021-12-01“…With the rapid development of cloud computing, the security issues of cloud platforms have also attracted much attention.Trusted computing is an essential supporting technology in the cloud computing security system.Trusted attestation is an important feature in trusted computing.The use of trusted attestation technology verifies whether the cloud virtualization platform is trustworthy, thereby providing a foundation for ensuring the security of the cloud platform.Now based on the definition of trusted attestation, the research progress of key technologies such as the root of trust virtualization, platform identity authentication, platform status certification, and trusted attestation framework for virtual machines were systematically sorted out, typical schemes were analyzed and compared.Furthermore, the limitations of existing work were discussed.Finally, the future research trend of this area were pointed out.…”
Get full text
Article -
898
Processing Information in the Clouds
Published 2020-05-01“…Cloud computing makes the necessary resources available to the appropriate computation to improve scaling, resiliency, and the efficiency of computations. …”
Get full text
Article -
899
IOT AND THE CLOUD: THE FUTURE OF A DIGITAL SOCIETY
Published 2018-12-01“…The integration of Cloud Computing into Internet-of-Things (IoT) could solving heterogeneity problems with its devices, protocols and technologies. …”
Get full text
Article -
900
Research progress on cloud data assured deletion based on cryptography
Published 2016-08-01“…The major challenges faced by the data assured deletion in cloud computing was analyzed,it was observed the main reasons of performing cloud data assured deletion were the characteristics of cloud virtualization and multi-tenancy,as well as the business models of lease and on-demand delivery in cloud computing,and point out three levels of meaning of the cloud data assured deletion.Secondly,the state-of-the-art works on cloud data assured deletion was systematically surveyed from security-oriented view in terms of trusted execution environments,key managements and access control policies.It is also pointed out their highlights,limitations and general problems.Finally,some developing trends of this emerging research field were introduced.…”
Get full text
Article