بحث بسيط
السجلات المعروضة 171 -- 180 من 323
Exploiting 4G mobile user cooperation for energy conservation: Challenges and opportunities
(2013 , Article)
Recent years have witnessed tremendous success and popularity of mobile applications and services, resulting in an explosive growth in the number of mobile devices, as well as in the range and types of things these devices ...
Asynchronous flow scheduling for green ambient assisted living communications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
AAL applications that support users (in particular, the elderly and patients) in staying at home are increasingly becoming popular in health care systems. Basically, these AAL applications provide personal information ...
Exploiting Task Elasticity and Price Heterogeneity for Maximizing Cloud Computing Profits
(
IEEE Computer Society
, 2018 , Article)
This paper exploits cloud task elasticity and price heterogeneity to propose an online resource management framework that maximizes cloud profits while minimizing energy expenses. This is done by reducing the duration ...
Energy-Efficient Resource Allocation and Provisioning Framework for Cloud Data Centers
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Energy efficiency has recently become a major issue in large data centers due to financial and environmental concerns. This paper proposes an integrated energy-Aware resource provisioning framework for cloud data centers. ...
Exploiting Client-Side Collected Measurements to Perform QoS Assessment of IaaS
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Delivering reliable service offerings to clients remain a challenging aspect in today's cloud infrastructure. A broad number of research studies have undertaken the service evaluation process from one side; that is, the ...
Exploring blind online scheduling for mobile cloud multimedia services
(2013 , Article)
Mobile cloud is a new emerging technology which can be used to enable users to enjoy abundant multimedia applications in a pervasive computing environment. Therefore, the scheduling of massive multimedia flows with ...
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks
(2013 , Article)
Wireless sensor networks (WSNs) are widely applicable in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust ...
Secure service provision in smart grid communications
(2012 , Article)
The smart grid provides a platform for thirdparty service providers to remotely monitor and manage energy usage for consumers. At the same time, the involvement of service providers brings a new set of security threats to ...
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
Processing geo-dispersed big data in an advanced mapreduce framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Big data has emerged as a new era of information generation and processing. Big data applications are expected to provide a lot of benefits and convenience to our lives. Cloud computing is a popular infrastructure that has ...