Search
Now showing items 1-10 of 39
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
(
Springer
, 2014 , Article)
In a cloud computing paradigm, energy efficient allocation of different virtualized ICT resources (servers, storage disks, and networks, and the like) is a complex problem due to the presence of heterogeneous application ...
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
Energy-efficient cloud resource management
(
IEEE
, 2014 , Conference Paper)
We propose a resource management framework that reduces energy consumption in cloud data centers. The proposed framework predicts the number of virtual machine requests along with their amounts of CPU and memory resources, ...
Application delivery in multi-cloud environments using software defined networking
(
Elsevier
, 2014 , Article)
Today, most large Application Service Providers (ASPs) such as Google, Microsoft, Yahoo, Amazon and Facebook operate multiple geographically distributed datacenters, serving a global user population that are often mobile. ...
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
A risk mitigation approach for autonomous cloud intrusion response system
(
Springer-Verlag Wien
, 2016 , Article)
Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ...
A Computation Offloading Incentive Mechanism with Delay and Cost Constraints under 5G Satellite-Ground IoV Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The 5G Internet of Vehicles has become a new paradigm alongside the growing popularity and variety of computation-intensive applications with high requirements for computational resources and analysis capabilities. Existing ...
AUDIT: approving and tracking updates with dependencies in collaborative databases
(
Springer New York LLC
, 2018 , Article)
Collaborative databases such as genome databases, often involve extensive curation activities where collaborators need to interact to be able to converge and agree on the content of data. In a typical scenario, a member ...
Toward Intelligent Network Optimization in Wireless Networking: An Auto-Learning Framework
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In wireless communication systems (WCSs), the network optimization problems (NOPs) play an important role in maximizing system performance by setting appropriate network configurations. When dealing with NOPs by using ...
QoE-aware distributed cloud-based live streaming of multisourced multiview videos
(
Academic Press
, 2018 , Article)
Video streaming is one of the most prevailing and bandwidth consuming Internet applications today. Advancements in technology and prevalence of video capturing devices result in massive multi-sourced (aka crowdsourced) ...