Results 21 to 30 of about 63 (63)

Review of information technologies and their importance in the educational directory of education

open access: yesRUDN Journal of Informatization in Education, 2018
The article focuses on the fact that the need for education is continuous and ongoing process therefore anytime anywhere access to it is becoming a necessity. The need for information is constantly increasing phenomenon.
Andrey Viktorovich Ivanov
doaj   +1 more source

HPC cloud system design and implementation

open access: yesТруды Института системного программирования РАН, 2018
There is pronounced interest to cloud computing in the scientific community. However, current cloud computing offerings are rarely suitable for highperformance computing, in large part due to an overhead level of underlying virtualization components. The
A. O. Kudryavtsev   +8 more
doaj  

Model of problem-oriented cloud computing environment

open access: yesТруды Института системного программирования РАН, 2018
For efficient use of high-performance computing resources while implementing Computational Science methods for the study of physical, biological and social problems one can use problem-oriented distributed computing environments approach.
G. . Radchenko
doaj   +1 more source

Towards a Cloud Computing Paradigm for Big Data Analysis in Smart Cities

open access: yesТруды Института системного программирования РАН, 2018
In this paper, we present a Big Data analysis paradigm related to smart cities using cloud computing infrastructures. The proposed architecture follows the MapReduce parallel model implemented using the Hadoop framework.
Renzo Massobrio   +4 more
doaj   +1 more source

Effective Use of Resources Distributed Cloud Computing Platform for Providing Quality Multimedia Services

open access: yesТруды Института системного программирования РАН, 2018
Existing approaches to the use of cloud computing resources is not efficient. Modern multimedia services require significant computing power, which are not always available.
Irina Bolodurina, Denis Parfenov
doaj   +1 more source

Editorial: Special Issue on «Advanced Computing: from Theory to Practice»

open access: yesТруды Института системного программирования РАН, 2019
This special issue contains selected papers that had been submitted to Proceedings of the Institute for System Programming of the Russian Academy of Sciences.
Andrei Tchernykh, Allel Hadjali
doaj   +1 more source

О нестойкости двух симметричных гомоморфных криптосистем, основанных на системе остаточных классов

open access: yesИнформатика и автоматизация, 2019
Одной из наиболее актуальных задач, связанных с защитой облачных вычислений, является анализ криптостойкости гомоморфных шифров. Данная статья посвящена изучению вопроса о защищенности двух недавно предложенных гомоморфных криптосистем, которые, в связи ...
Ludmila Kliment'evna Babenko   +1 more
doaj   +1 more source

Deploying Apache Spark virtual clusters in cloud environments using orchestration technologies

open access: yesТруды Института системного программирования РАН, 2018
Apache Spark is a framework providing fast computations on Big Data using MapReduce model. With cloud environments Big Data processing becomes more flexible since they allow to create virtual clusters on-demand. One of the most powerful open-source cloud
O. . Borisenko   +2 more
doaj   +1 more source

МОДЕЛИ ФУНКЦИОНИРОВАНИЯ «ОБЛАЧНОЙ» КОМПЬЮТЕРНОЙ СИСТЕМЫ

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
Рассматриваются свойства и особенности «облачных» компьютерных систем с точки зрения моделей информационного и телекоммуникационного взаимодействия.

doaj  

A survey of network intrusion detection systems based on deep learning approaches

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Currently, most IT organizations are inclined towards a cloud computing environment because of its distributed and scalable nature. However, its flexible and open architecture is receiving lots of attention from potential intruders for cyber threats ...
D. Al-Safaar, W. Al-Yaseen
doaj   +1 more source

Home - About - Disclaimer - Privacy