بحث بسيط
السجلات المعروضة 11 -- 20 من 47
Learning predictive autoscaling policies for cloud-hosted microservices using trace-driven modeling
(
IEEE Computer Society
, 2019 , Conference Paper)
Autoscaling methods are important to ensure response time guarantees for cloud-hosted microservices. Most of the existing state-of-the-art autoscaling methods use rule-based reactive policies with static thresholds defined ...
A parallel patient treatment time prediction algorithm and its applications in hospital queuing-recommendation in a big data environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Article)
Effective patient queue management to minimize patient wait delays and patient overcrowding is one of the major challenges faced by hospitals. Unnecessary and annoying waits for long periods result in substantial human ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
Nutshell - Simulation Toolkit for Modeling Data Center Networks and Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Cloud computing provides flexibility, reliability, and scalability to its consumers. Applications that run on Cloud are now more resource hungry than ever, and the need is constantly growing. The number of Cloud applications ...
Optimizing cloud-service performance: Efficient resource provisioning via optimal workload allocation
(
IEEE Computer Society
, 2017 , Article)
Cloud computing is being widely accepted and utilized in the business world. From the perspective of businesses utilizing the cloud, it is critical to meet their customers' requirements by achieving service-level-objectives. ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Performance analysis of data intensive cloud systems based on data management and replication: a survey
(
Springer New York LLC
, 2016 , Article)
As we delve deeper into the ‘Digital Age’, we witness an explosive growth in the volume, velocity, and variety of the data available on the Internet. For example, in 2012 about 2.5 quintillion bytes of data was created on ...
QoE-Aware Resource Allocation for Crowdsourced Live Streaming: A Machine Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Driven by the tremendous technological advancement of personal devices and the prevalence of wireless mobile network accesses, the world has witnessed an explosion in crowdsourced live streaming. Ensuring a better viewers ...
Systematic identification of threats in the cloud: A Survey
(
Elsevier B.V.
, 2019 , Article)
When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ...
Unsupervised learning approach for web application auto-decomposition into microservices
(
Elsevier Inc.
, 2019 , Article)
Nowadays, large monolithic web applications are manually decomposed into microservices for many reasons including adopting a modern architecture to ease maintenance and increase reusability. However, the existing approaches ...