Results 221 to 230 of about 430,519 (277)
Evaluation and optimization of resource matching for perception services in power communication networks. [PDF]
Wei L, Shang L, Zhang M, Li H, Zhu X.
europepmc +1 more source
Applying Blockchain in Telemedicine: A Systematic Review. [PDF]
Ehteshami A, Sattari M.
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cloud Storage File Recoverability
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact. However, two important practical problems have not yet been considered.
Gorke, Christian A. +3 more
openaire +2 more sources
Proceedings of the 16th international conference on Human-computer interaction with mobile devices & services, 2014
In an increasingly connected world, users access personal or shared data, stored "in the cloud" (e.g., Dropbox, Skydrive, iCloud) with multiple devices. Despite the popularity of cloud storage services, little work has focused on investigating cloud storage users' Quality of Experience (QoE), in particular on mobile devices.
Karel Vandenbroucke +4 more
openaire +1 more source
In an increasingly connected world, users access personal or shared data, stored "in the cloud" (e.g., Dropbox, Skydrive, iCloud) with multiple devices. Despite the popularity of cloud storage services, little work has focused on investigating cloud storage users' Quality of Experience (QoE), in particular on mobile devices.
Karel Vandenbroucke +4 more
openaire +1 more source
2020
This chapter introduces the data integrity verification technique for cloud storage systems. First, the basic paradigms and principles of the data integrity verification technique are presented. Then, a comprehensive survey on the data integrity verification technique is provided, where existing data integrity verification schemes are introduced, and ...
Yuan Zhang +2 more
openaire +1 more source
This chapter introduces the data integrity verification technique for cloud storage systems. First, the basic paradigms and principles of the data integrity verification technique are presented. Then, a comprehensive survey on the data integrity verification technique is provided, where existing data integrity verification schemes are introduced, and ...
Yuan Zhang +2 more
openaire +1 more source
2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), 2012
Designing storage architectures for emerging data-intensive applications presents several challenges and opportunities. Tackling these problems requires a combination of architectural optimizations to the storage devices and layers of the memory/storage hierarchy as well as hardware/software techniques to manage the flow of data between the cores and ...
Gurudatt Kulkarni +5 more
openaire +1 more source
Designing storage architectures for emerging data-intensive applications presents several challenges and opportunities. Tackling these problems requires a combination of architectural optimizations to the storage devices and layers of the memory/storage hierarchy as well as hardware/software techniques to manage the flow of data between the cores and ...
Gurudatt Kulkarni +5 more
openaire +1 more source
IEEE Cloud Computing, 2014
As with most popular consumer technologies, criminals can exploit vulnerabilities in mobile devices and operating systems or mobile apps to target mobile device and app users. Because of their capability to store vast amounts of user data, cloud storage apps are a potential and attractive target for criminals.
openaire +2 more sources
As with most popular consumer technologies, criminals can exploit vulnerabilities in mobile devices and operating systems or mobile apps to target mobile device and app users. Because of their capability to store vast amounts of user data, cloud storage apps are a potential and attractive target for criminals.
openaire +2 more sources
Proceedings of the 15th International Conference on Computer Systems and Technologies, 2014
Storage and file synchronisation is a common and important service provided by contemporary cloud providers and a new standard for file sharing and information storage among companies and individuals. However, choosing the right storage provider depends on many factors.
Xhemal Zenuni +3 more
openaire +1 more source
Storage and file synchronisation is a common and important service provided by contemporary cloud providers and a new standard for file sharing and information storage among companies and individuals. However, choosing the right storage provider depends on many factors.
Xhemal Zenuni +3 more
openaire +1 more source
Storage Fundamentals and Cloud Storage
2019Data are one of the major and core assets of every organization. Obviously there is a need for the data of any organization to be stored. There are different types of storage devices catering for different characteristics such as capacity, scalability, reliability, performance, and cost.
Chellammal Surianarayanan +1 more
openaire +1 more source

