Showing 141 - 160 results of 249 for search 'Computer data storage', query time: 0.10s Refine Results
  1. 141

    Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques by Hanaa Attou, Azidine Guezzaz, Said Benkirane, Mourade Azrour, Yousef Farhaoui

    Published 2023-09-01
    “…Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. …”
    Get full text
    Article
  2. 142

    Spectral Expansion Method for Cloud Reliability Analysis by K. Kotteswari, A. Bharathi

    Published 2019-01-01
    “…Cloud computing is a computing hypothesis, where a huge group of systems is linked together in private, public, or hybrid network, to offer dynamically amendable infrastructure for data storage, file storage, and application. …”
    Get full text
    Article
  3. 143
  4. 144

    Multidomain Hierarchical Resource Allocation for Grid Applications by Mohamed Abouelela, Mohamed El-Darieby

    Published 2012-01-01
    “…Many applications require the collaboration between different domains, may be independently administrated domains, to exchange data and share computing and storage resources. This collaboration should be done in a way that maintains the privacy of each participant domain. …”
    Get full text
    Article
  5. 145
  6. 146

    From FPGA to Support Cloud to Cloud of FPGA: State of the Art by Rym Skhiri, Virginie Fresse, Jean Paul Jamont, Benoit Suffran, Jihene Malek

    Published 2019-01-01
    “…It provides “unlimited” storage capacities and a large number of data and applications that make collaboration easier between multiple (not domain specific) designers. …”
    Get full text
    Article
  7. 147

    Algorithm and Architecture Optimization for 2D Discrete Fourier Transforms with Simultaneous Edge Artifact Removal by Faisal Mahmood, Märt Toots, Lars-Göran Öfverstedt, Ulf Skoglund

    Published 2018-01-01
    “…We also used our high-performance 2D FFT implementation to accelerate filtered back-projection for reconstructing tomographic data.…”
    Get full text
    Article
  8. 148
  9. 149
  10. 150

    Cost-Effective Resource Provisioning for Real-Time Workflow in Cloud by Lei Wu, Ran Ding, Zhaohong Jia, Xuejun Li

    Published 2020-01-01
    “…Meanwhile, cloud environment provides sufficient computing and storage resources for big data management and analytics. …”
    Get full text
    Article
  11. 151

    Analyzing Interdisciplinary Research Using Co-Authorship Networks by Mati Ullah, Abdul Shahid, Irfan ud Din, Muhammad Roman, Muhammad Assam, Muhammad Fayaz, Yazeed Ghadi, Hanan Aljuaid

    Published 2022-01-01
    “…It was found that “Artificial Intelligence” and “Information Storage and Retrieval”, “Natural Language Processing and Information Storage and Retrieval”, and “Human-Computer Interface” and “Database Applications” were found the most overlapping areas by acquiring an IDR score of 0.879, 0.711, and 0.663, respectively.…”
    Get full text
    Article
  12. 152

    Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services by Selvakumar Shanmugam, Rajesh Natarajan, Gururaj H. L., Francesco Flammini, Badria Sulaiman Alfurhood, Anitha Premkumar

    Published 2024-01-01
    “…A cloud service provider is utilized to provide secure data storage services. Data integrity is a critical issue in cloud computing. …”
    Get full text
    Article
  13. 153
  14. 154

    Hadoop in Banking: Event-Driven Performance Evaluation by Monalisa Panda, Mamata Garnayak, Mitrabinda Ray, Smita Rath, Anuradha Mohanta, Sushree Bibhuprada B. Priyadarshini

    Published 2025-01-01
    “…This is supported by the Hadoop ecosystem, which provides distribution of the processing and storage, making it fit for handling large datasets with high fault tolerance and parallel computation levels. …”
    Get full text
    Article
  15. 155
  16. 156

    BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid by Wei Ren, Jun Song, Min Lei, Yi Ren

    Published 2011-01-01
    “…In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. …”
    Get full text
    Article
  17. 157
  18. 158

    Management of Active Records in Referral Hospitals: A Case Study of Kisoro Hospital. by Hashakimana, Obed

    Published 2024
    “…The data was collected, analyzed, and computed to determine the challenges records departments meet in their daily activities resulting from their storage types of equipment usage. …”
    Get full text
    Thesis
  19. 159

    Fast and accurate near-duplicate image elimination for visual sensor networks by Zhili Zhou, QM Jonathan Wu, Fang Huang, Xingming Sun

    Published 2017-02-01
    “…Among the visual data, there are a lot of near-duplicate images, which cause a serious waste of limited storage, computing, and transmission resources of visual sensor networks and a negative impact on users’ experience. …”
    Get full text
    Article
  20. 160