Search
Now showing items 21-30 of 40
Online assignment and placement of cloud task requests with heterogeneous requirements
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Managing cloud resources in a way that reduces the consumed energy while also meeting clients demands is a challenging task. In this paper, we propose an energy-aware resource allocation framework that: i) places the ...
Toward energy-efficient cloud computing: Prediction, consolidation, and overcommitment
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy consumption has become a significant concern for cloud service providers due to financial as well as environmental factors. As a result, cloud service providers are seeking innovative ways that allow them to reduce ...
Haddle: A framework for investigating data leakage attacks in hadoop
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...
Auditing cloud service level agreement on VM CPU speed
(
IEEE Computer Society
, 2014 , Conference Paper)
In this paper, we present a novel scheme for auditing Service Level Agreement (SLA) in a semi-trusted or untrusted cloud. A SLA is a contract formed between a cloud service provider (CSP)and a user which specifies, in ...
Cloud-assisted mobile computing and pervasive services [Guest Editorial]
(2013 , Other)
[No abstract available]
A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services
(
Elsevier B.V.
, 2019 , Article)
In modern e-Healthcare systems, human activity recognition (HAR) is one of the most challenging tasks in remote monitoring of patients suffering from mental illness or disabilities for necessary assistance. One of the major ...
Garbled computation in cloud
(
Elsevier
, 2016 , Article)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living
(
Elsevier
, 2015 , Article)
This research aims to describe pattern recognition models for detecting behavioural and health-related changes in a patient who is monitored continuously in an assisted living environment. The early anticipation of anomalies ...
Web service cost optimization
(
Association for Computing Machinery, Inc
, 2015 , Conference Paper)
Cloud computing has become a major building block for Web applications where the service providers provide the costumers with Web services performing certain tasks so the system developers can use these services instead ...