Search
Now showing items 1-8 of 8
Release-time aware VM placement
(
IEEE
, 2014 , Conference Paper)
Consolidating virtual machines (VMs) on as few physical machines (PMs) as possible so as to turn into sleep as many PMs as possible can make significant energy savings in cloud centers. Although traditional online bin ...
Online risk assessment and prediction models for Autonomic Cloud Intrusion srevention systems
(
IEEE
, 2014 , Conference Paper)
The extensive use of virtualization in implementing cloud infrastructure brings unrivaled security concerns for cloud tenants or customers and introduces an additional layer that itself must be completely configured and ...
Efficient datacenter resource utilization through cloud resource overcommitment
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
We propose an efficient resource allocation framework for overcommitted clouds that makes great energy savings by 1) minimizing PM overloads via resource usage prediction, and 2) reducing the number of active PMs via ...
A probabilistic multi-tenant model for virtual machine mapping in cloud systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
A novel probabilistic multi-tenant model is developed to characterize the service performance of cloud systems. The model considers essential cloud-system characteristics including virtualization, multi-tenancy and ...
Regional failure survivability for cloud networking services using post fault restoration
(2013 , Conference Paper)
Cloud computing services are being adopted to expand applications across dispersed data-center sites. As these new paradigms require active data exchange, they impose further virtual network (VN) mappings over operator ...
A hierarchical, autonomous, and forecasting cloud IDS
(
IEEE
, 2013 , Conference Paper)
Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ...
HA-CIDS: A hierarchical and autonomous IDS for cloud systems
(
IEEE
, 2013 , Conference Paper)
Cloud computing is an attractive model that provides the delivery of on-demand computing resources over the Internet and on a pay-for-use basis. However, while intruders may exploit clouds for their advantage, most IDS ...
Cloud, Fog, and Edge Computing: A Software Engineering Perspective
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cloud, Fog, and Edge Computing paradigms have been introduced for data-driven organizations in order to facilitate data computation and processing in an easier manner. Considering that there has been a huge increase in the ...