Showing 921 - 940 results of 1,622 for search '"cloud computing"', query time: 0.09s Refine Results
  1. 921

    Cybersecurity and Liability in a Big Data World by Maria Lillà Montagnani, Mirta Antonella Cavallo

    Published 2018-10-01
    “… The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. …”
    Get full text
    Article
  2. 922

    Permeability evaluation of Industry 4.0 technologies in cloud-based energy management systems environments - Energy Cloud by Jones Luís Schaefer, Patrícia Stefan de Carvalho, Augusto Ruhoff, Johanna Dreher Thomas, Julio Cezar Mairesse Siluk

    Published 2021-08-01
    “…Main findings The results show that there is a greater understanding and use of the Internet of Things and Sensors technologies to the detriment of Cloud Computing and Big Data. Implications for theory and practice The article shows that there is a need for managers to seek greater familiarization, especially with Cloud Computing and Big Data.…”
    Get full text
    Article
  3. 923

    Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA

    Published 2018-05-01
    “…The rapid development of cloud computing and big data technology brings prople to enter the era of big data,more and more enterprises and individuals outsource their data to the cloud service providers.The explosive growth of data and data replicas as well as the increasing management overhead bring a big challenge to the cloud storage space.Meanwhile,some serious issues such as the privacy disclosure,authorized access,secure deduplication,rekeying and permission revocation should also be taken into account.In order to address these problems,a role-based symmetric encryption algorithm was proposed,which established a mapping relation between roles and role keys.Moreover,a secure deduplication scheme was proposed via role-based symmetric encryption to achieve both the privacy protection and the authorized deduplication under the hierarchical architecture in the cloud computing environment.Furthermore,in the proposed scheme,the group key agreement protocol was utilized to achieve rekeying and permission revocation.Finally,the security analysis shows that the proposed role-based symmetric encryption algorithm is provably secure under the standard model,and the deduplication scheme can meet the security requirements.The performance analysis and experimental results indicate that the proposed scheme is effective and efficient.…”
    Get full text
    Article
  4. 924

    Latency-Aware Power Management in Software-Defined Radios by Nicolas Malm, Kalle Ruttik, Olav Tirkkonen

    Published 2020-01-01
    “…Cloud computing provides benefits in terms of equipment consolidation and power savings from higher utilization for virtualizable software. …”
    Get full text
    Article
  5. 925

    Towards carbon emission modeling and optimization for time-sensitive IIoT by LI Yingyu, DAI Yipeng, GE Xiaohu, SHI Guangming, XIAO Yong, LIU Yan, YU Liang, XU Han

    Published 2025-03-01
    “…The large-scale deployment of edge computing and cloud computing infrastructures has brought both opportunities and challenges to the realization of the green and low-carbon industrial Internet of things (IIoT). …”
    Get full text
    Article
  6. 926

    Implementing Fuzzy TOPSIS in Cloud Type and Service Provider Selection by Aveek Basu, Sanchita Ghosh

    Published 2018-01-01
    “…Cloud computing can be considered as one of the leading-edge technological advances in the current IT industry. …”
    Get full text
    Article
  7. 927
  8. 928

    Temporal fusion transformer-based strategy for efficient multi-cloud content replication by Naganandhini S., Shanthi D.

    Published 2025-03-01
    “…In cloud computing, ensuring the high availability and reliability of data is dominant for efficient content delivery. …”
    Get full text
    Article
  9. 929
  10. 930

    A Genetic-Algorithm-Based Approach for Task Migration in Pervasive Clouds by Weishan Zhang, Shouchao Tan, Qinghua Lu, Xin Liu, Wenjuan Gong

    Published 2015-08-01
    “…Pervasive computing is converging with cloud computing which becomes pervasive cloud computing as an emerging computing paradigm. …”
    Get full text
    Article
  11. 931

    Advancing Data Privacy in Cloud Storage: A Novel Multi-Layer Encoding Framework by Kamta Nath Mishra, Rajesh Kumar Lal, Paras Nath Barwal, Alok Mishra

    Published 2025-07-01
    “…In response to the identified gap in privacy-preserving techniques for cloud computing, this research paper presents a novel and adaptable framework. …”
    Get full text
    Article
  12. 932

    Exploring In-Network Computing with Information-Centric Networking: Review and Research Opportunities by Marica Amadeo, Giuseppe Ruggeri

    Published 2025-01-01
    “…Cloud computing centralizes resources in distant data centers, leading to high latency and increased network congestion, while edge computing, though closer to data sources, lacks the agility to dynamically adapt to fluctuating workloads, user mobility, and real-time requirements. …”
    Get full text
    Article
  13. 933

    Improvement of Business Analysis Method of E-Commerce System from the Perspective of Intelligent Recommendation System by Ruihua Shao

    Published 2022-01-01
    “…Aiming at the new requirements for the development of e-commerce intelligent recommendation technology in the big data environment, this paper uses the big data processing technology based on cloud computing and focuses on the realization technology of the e-commerce intelligent recommendation algorithm and the comprehensive evaluation method of the recommendation system in the big data environment. …”
    Get full text
    Article
  14. 934

    A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform by Jingjie Zhang, Qingtao Wu, Ruijuan Zheng, Junlong Zhu, Mingchuan Zhang, Ruoshui Liu

    Published 2018-01-01
    “…With the continuous development of cloud computing, cloud security has become one of the most important issues in cloud computing. …”
    Get full text
    Article
  15. 935

    Collaborative Big Data Management and Analytics in Complex Systems with Edge 2021 eaCamera: A Case Study on AI-Based Complex Attention Analysis with Edge System by Chaopeng Guo, Peimeng Zhu, Feng Li, Jie Song

    Published 2021-01-01
    “…As an extension of cloud computing, edge computing makes up for the deficiency of cloud computing to a certain extent. …”
    Get full text
    Article
  16. 936

    A comprehensive IoT cloud-based wind station ready for real-time measurements and artificial intelligence integration by Décio Alves, Fábio Mendonça, Sheikh Shanawaz Mostafa, Fernando Morgado-Dias

    Published 2024-12-01
    “…This paper presents an integrated approach for a cloud-computing Internet of Things-based Automated Weather Station, with edge devices, designed to provide real-time wind measurements in diverse environments. …”
    Get full text
    Article
  17. 937

    A Novel Artificial Bee Colony Approach of Live Virtual Machine Migration Policy Using Bayes Theorem by Gaochao Xu, Yan Ding, Jia Zhao, Liang Hu, Xiaodong Fu

    Published 2013-01-01
    “…Green cloud data center has become a research hotspot of virtualized cloud computing architecture. Since live virtual machine (VM) migration technology is widely used and studied in cloud computing, we have focused on the VM placement selection of live migration for power saving. …”
    Get full text
    Article
  18. 938

    RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control by Urvashi Rahul Saxena, Rajan Kadel

    Published 2025-06-01
    “…Cloud computing has witnessed rapid growth and notable technological progress in recent years. …”
    Get full text
    Article
  19. 939

    SpanTrain: a cross-domain distributed model training system for cloud-edge-end heterogeneous devices by WANG Jinquan, LIU Xuzhao, LIAO Xiaojian, XIAO Limin, HUO Zhisheng, SUO Jiashun, LI Yuntong, SHEN Runnan, XIE Xilong, TANG Xicheng

    Published 2025-05-01
    “…Currently, in addition to cloud computing centers, the edge and end environments represented by the internet of things, fixed or mobile computing edges are also filled with a large number of intelligent computing devices. …”
    Get full text
    Article
  20. 940