Results 41 to 50 of about 3,904 (99)

Topology-aware cloud scheduling for HPC

open access: yesТруды Института системного программирования РАН, 2018
For some compute intensive applications cloud computing can be a costeffective alternative or an addition to supercomputers. However, in the case of highperformance computing, overall application performance depends heavily on how processes are mapped to
I. A. Dudina   +2 more
doaj  

THE EVALUATION OF INVESTMENT PROJECTS FOR IMPLEMENTING CLOUD TECHNOLOGY

open access: yesСовременная наука и инновации, 2022
The article presents an overview of information on the features, opportunities and prospects of investing in cloud computing in construction. The general analysis of cloud computing level on the world market is carried out, the main problems of cloud ...
Alexander Sergeevich Volozhenin
doaj  

ALGORITHM FOR DYNAMIC SCALING RELATIONAL DATABASE IN CLOUDS

open access: yesСтатистика и экономика, 2016
This article analyzes the main methods of scalingdatabases (replication, sharding) and their supportat the popular relational databases and NoSQLsolutions with different data models: document-oriented, key-value, column-oriented and graph.The article ...
Alexander V. Boichenko   +2 more
doaj   +1 more source

TECHNOLOGIES OF MANAGEMENT ACTIVITY INTELLECTUALIZATION

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
The management intellectualization using intelligence agents, semantic Web-services, cloud computing is proposed. The integration solution in management process based on semantic Web technologies is given.
V. A. Vishniakov, J. V. Borodaenko
doaj  

AUTHENTIFICATION USER TOOLS IN CORPORATIVE INFORMATION SYSTEMS AND CLOUD COMPUTING AREAS

open access: yesДоклады Белорусского государственного университета информатики и радиоэлектроники, 2019
Analysis elements of users work in information corporative systems (ICS) are done. The mathematical model of social authentification in ICS allows on given quality of unsatisfactory marks to calculate the probability of successful authentification with ...
U. A. Vishniakou, M. M. Gongag Sas
doaj  

THE NEW SCHEME OF INFORMATION STORAGE IN CLOUD ENVIRONMENTS BASED ON A SYSTEM OF RESIDUAL CLASSES, SCHEMES SECRET SHARING

open access: yesСовременная наука и инновации, 2022
The article deals with the theoretical aspects of structural and group analysis. A mathematical model and software implementation of a multilevel disjunctive threshold scheme of the secret based on the Chinese remainder theorem is proposed.
Nikolay Ivanovich Chervyakov   +4 more
doaj  

Hybrid JAYA algorithm for workflow scheduling in cloud

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Workflow scheduling and resource provisioning are two of the most critical issues in cloud computing. Developing an optimal workflow scheduling strategy in the heterogeneous cloud environment is extremely difficult due to its NP-complete nature.
S. Bothra, S. Singhal, H. Goyal
doaj   +1 more source

«Облачные» вычисления и проблемы их безопасности [PDF]

open access: green, 2013
Гюнтер Екатерина Сергеевна   +2 more
openalex  

Smart grid technologies application for sustainable development and modernisation of water supply systems

open access: yesВесці Нацыянальнай акадэміі навук Беларусі: Серыя фізіка-тэхнічных навук, 2016
This article is devoted to application of modern intellectual technologies for modernization and development of water supply systems. A mathematical model of the analysis and management of such networks based on fuzzy mathematics and smart grid ...
V. F. Kravchenko   +4 more
doaj  

Home - About - Disclaimer - Privacy