Results 301 to 310 of about 487,200 (366)
EcoTaskSched: a hybrid machine learning approach for energy-efficient task scheduling in IoT-based fog-cloud environments. [PDF]
Khan A+5 more
europepmc +1 more source
Tiny Machine Learning and On-Device Inference: A Survey of Applications, Challenges, and Future Directions. [PDF]
Heydari S, Mahmoud QH.
europepmc +1 more source
A novel dilated weighted recurrent neural network (RNN)-based smart contract for secure sharing of big data in Ethereum blockchain using hybrid encryption schemes. [PDF]
S S, P M JP.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SINDH UNIVERSITY RESEARCH JOURNAL -SCIENCE SERIES, 2017
Cloud computing is a computing framework and software model for empowering ubiquitous access to shared pools of configurable assets i.e. Server, networks, services and storage applications which can be quickly provisioned least managements activities often over the web. Cloud computing is a moderately new innovation that will only become widespread and
Samina Rajper, S. Shoro, B. Baloch
openaire +3 more sources
Cloud computing is a computing framework and software model for empowering ubiquitous access to shared pools of configurable assets i.e. Server, networks, services and storage applications which can be quickly provisioned least managements activities often over the web. Cloud computing is a moderately new innovation that will only become widespread and
Samina Rajper, S. Shoro, B. Baloch
openaire +3 more sources
Cloud Computing Security [PDF]
In this paper, the authors focus on Cloud Computing, which is a distributed architecture that centralizes server resources on quite a scalable platform so as to provide on demand’ computing resources and services The authors outline what cloud computing is, the various cloud deployment models and the main security risks and issues that are currently ...
Sean Carlin, Kevin Curran
openaire +1 more source
Security in Cloud Computing [PDF]
From the past few years Cloud Computing has become the IT industry's landscape for both the individuals and companies from the way to access which stores and also shares the information to how we communicate, collaborate and process the data. In companies, many clients worry about their resources whether it is outside the firewall.
Rishitha, T. R. Reshmi
openaire +1 more source
Secure virtualization for cloud computing
Journal of Network and Computer Applications, 2011Cloud computing adoption and diffusion are threatened by unresolved security issues that affect both the cloud provider and the cloud user. In this paper, we show how virtualization can increase the security of cloud computing, by protecting both the integrity of guest virtual machines and the cloud infrastructure components.
Lombardi, Flavio, DI PIETRO, ROBERTO
openaire +4 more sources
Security by Design for Big Data Frameworks Over Cloud Computing
IEEE transactions on engineering management, 2021Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend.
Feras M. Awaysheh+5 more
semanticscholar +1 more source