Results 41 to 50 of about 3,690,548 (279)

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Cloud Computing and Its Role in the Information Technology

open access: yesIAIC Transactions on Sustainable Digital Innovation (ITSDI), 2020
The concept of Cloud Computing has been distinguished as one of the major computing models in recent years. Cloud computing has become a great innovation that has important consequences not just for services on the internet but also for theĀ entire ...
Tanweer Alam
semanticscholar   +1 more source

A Survey of Communication Protocols for Internet of Things and Related Challenges of Fog and Cloud Computing Integration [PDF]

open access: yesACM Computing Surveys, 2018
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable.
Jasenka Dizdarevic   +3 more
semanticscholar   +1 more source

Recent Developments in Thermal Management of 3D ICs: A Review

open access: yesIEEE Access
Three-dimensional integration circuits (3D ICs) have become an important direction of integrated circuits, which brings in a higher integration level, higher power density, and shorter wire length.
Fen Guo   +8 more
doaj   +1 more source

A parallel algorithm for network traffic anomaly detection based on Isolation Forest

open access: yesInternational Journal of Distributed Sensor Networks, 2018
With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic
Xiaoling Tao   +4 more
doaj   +1 more source

Cryptography in Cloud Computing

open access: yesIndian Journal of Cryptography and Network Security, 2021
Cryptography is a key element in establishing trust and enabling services in the digital world. It is represented in a ways that are not accessible to human users. Hence, humans are left out the trust and security in the digital world. Cryptography is necessary in modern communication protocols and to many digital services.
Harjinder Kaur, Amandeep Kaur
openaire   +2 more sources

An integrative decision-making framework to guide policies on regulating ChatGPT usage [PDF]

open access: yesPeerJ Computer Science
Generative artificial intelligence has created a moment in history where human beings have begin to closely interact with artificial intelligence (AI) tools, putting policymakers in a position to restrict or legislate such tools.
Umar Ali Bukar   +4 more
doaj   +2 more sources

Virtualization in Cloud Computing [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2018
Virtualization and virtual situations are major basics for files input in cloud adding. It is assistances for together the visitor user and the worker while it provides the first with the features needed to execute his demand, it gives the second the capacity to be cover different guests with no extra cost.
Arun Prasath. M, Mrs. T. Sathiyabama
openaire   +1 more source

Cost-Aware Multimedia Data Allocation for Heterogeneous Memory Using Genetic Algorithm in Cloud Computing

open access: yesIEEE Transactions on Cloud Computing, 2020
Recent expansions of Internet-of-Things (IoT) applying cloud computing have been growing at a phenomenal rate. As one of the developments, heterogeneous cloud computing has enabled a variety of cloud-based infrastructure solutions, such as multimedia big
Keke Gai   +3 more
semanticscholar   +1 more source

Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
With the booming of cloud-based digital twin systems, monitoring key performance indicators has become crucial for ensuring system security and reliability.
Zicong Miao, Weize Li, Xiaodong Pan
doaj   +1 more source

Home - About - Disclaimer - Privacy