Results 21 to 30 of about 5,064,874 (383)
ADRCN: A Framework to Detect and Mitigate Malicious Insider Attacks in Cloud-Based Environment on IaaS [PDF]
Security is a critical factor for any of the computing platforms. Cloud computing is a new computing environment but still, its basic technology is the Internet.
Priya Oberoi +2 more
doaj +1 more source
Determining Effective Factors in Cloud Computing Acceptance Using Rogers’ Diffusion of Innovation Model and Davis’ Technology Adoption Model (A Case of Financial Institution) [PDF]
Background and Objectives: Determining effective factors in cloud computing adoption on employees of Noor credit institution in South Khorasan province, Iran, is the purpose of the present study.
H. KardanMoghaddam, A. Rajaei, F. Jafari
doaj +1 more source
Finding an optimal/quasi-optimal path for Unmanned Aerial Vehicles (UAVs) utilizing full map information yields time performance degradation in large and complex three-dimensional (3D) urban environments populated by various obstacles. A major portion of
Abdul Majeed, Seong Oun Hwang
doaj +1 more source
Computing homotopic shortest paths efficiently [PDF]
12 pages, 11 ...
Efrat, Alon +2 more
openaire +2 more sources
Towards knowledge-enriched path computation [PDF]
Accepted as a short paper at ACM SIGSPATIAL GIS ...
Skoumas, Georgios +6 more
openaire +2 more sources
In modern transportation, traffic congestion has become an urgent problem in large and medium-sized cities. In smart transportation systems, it is an effective solution to design load balancing path planning algorithms that can dynamically adapt to ...
Ning Sun +4 more
doaj +1 more source
In view of problems such as unreasonable path planning, slow planning speed and poor real -time performance when mine mobile robots use traditional dynamic window algorithm to plan path in complex environment, a dynamic window algorithm of mine mobile ...
LAN Shihao +3 more
doaj +1 more source
Mobile Edge Computing via a UAV-Mounted Cloudlet: Optimization of Bit Allocation and Path Planning [PDF]
Unmanned aerial vehicles (UAVs) have been recently considered as means to provide enhanced coverage or relaying services to mobile users (MUs) in wireless systems with limited or no infrastructure. In this paper, a UAV-based mobile cloud computing system
Seongah Jeong, O. Simeone, Joonhyuk Kang
semanticscholar +1 more source
Method for reducing cloud workflow completion time under the task interruption
As more and more large-scale scientific workflows are delivered to clouds, the business model of workflow-as-a-service is emerging. But there are many kinds of threats in the cloud environment, which can interrupt the task execution and extend the ...
Yawen WANG, Yunfei GUO, Wenyan LIU, Shumin HUO
doaj +1 more source
A shapley value approach to pricing climate risks [PDF]
This paper prices the risk of climate change by calculating a lower bound for the price of a virtual insurance policy against climate risks associated with the business as usual (BAU) emissions path. In analogy with ordinary insurance pricing, this price
Cooke, Roger M
core +2 more sources

