|
|
|
Smrithy G S,Ramadoss Balakrishnan
Pág. 225 - 232
The main objective of online anomaly detection is to identify abnormal/unusual behavior such as network intrusions, malware infections, over utilized system resources due to design defects etc from real time data stream. Terrabytes of performance data ge...
ver más
|
|
|
|
|
|
|
Aaqif Afzaal Abbasi and Hai Jin
Cloud computing systems are popular in computing industry for their ease of use and wide range of applications. These systems offer services that can be used over the Internet. Due to their wide popularity and usage, cloud computing systems and their ser...
ver más
|
|
|
|
|
|
|
Aaqif Afzaal Abbasi and Hai Jin
Cloud computing systems are popular in computing industry for their ease of use and wide range of applications. These systems offer services that can be used over the Internet. Due to their wide popularity and usage, cloud computing systems and their ser...
ver más
|
|
|
|
|
|
|
Ahmad Nahar Quttoum
Pág. pp. 36 - 60
Today?s data center networks employ expensive networking equipments in associated structures that were not designed to meet the increasing requirements of the current large-scale data center services. Limitations that vary between reliability, resource u...
ver más
|
|
|
|
|
|
|
Ahmad Nahar Quttoum, Ayoub Alsarhan and Abidalrahman Moh?d
|
|
|
|
|
|
|
Ahmad Nahar Quttoum, Ayoub Alsarhan and Abidalrahman Moh?d
The expansion of telecommunication technologies touches almost all aspects life that we are living nowadays. Indeed, such technologies have emerged as a fourth essential utility alongside the traditional utilities of electricity, water, and gas. In this ...
ver más
|
|
|
|
|
|
|
Saurabh Singh, Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Nowadays, the high power consumption of data centers is the biggest challenge to making cloud computing greener. Many researchers are still seeking effective solutions to reduce or harvest the energy produced at data centers. To address this challenge, w...
ver más
|
|
|
|
|
|
|
Xiuli Song and Hongyao Deng
Proofs of Retrievability (PoR) is one of the basic functions of electronic evidence preservation center in cloud. This paper proposes two PoR schemes to execute the workflow of evidence preservation center, which are named Finer Grained Proofs of Retriev...
ver más
|
|
|
|
|
|
|
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re...
ver más
|
|
|
|
|
|
|
Yanfeng Gao, Cicao Ping, Ling Wang and Binrui Wang
According to the requirements of point cloud simplification for T-profile steel plate welding in shipbuilding, the disadvantages of the existing simplification algorithms are analyzed. In this paper, a point cloud simplification method is proposed based ...
ver más
|
|
|
|
|
|
|
Claudia Canali,Riccardo Lancellotti
Pág. 172 - 179
Infrastructure as a Service cloud providers are increasingly relying on scalable and efficient Virtual Machines (VMs) placement as the main solution for reducing unnecessarycosts and wastes of physical resources. However, thecontinuous growth of the size...
ver más
|
|
|
|
|
|
|
Martin Fraga, Matías Micheletto, Andrés Llinás, Rodrigo Santos and Paula Zabala
Flow scheduling in Data Center Networks (DCN) is a hot topic as cloud computing and virtualization are becoming the dominant paradigm in the increasing demand of digital services. Within the cost of the DCN, the energy demands associated with the network...
ver más
|
|
|
|
|
|
|
Long Suo, Lijun Qi and Li Wang
With the explosive growth of cloud computing applications, the east-west traffic among servers has come to occupy the dominant proportion of the traffic in data center networks (DCNs). Cloud computing tasks need to be executed in a distributed manner on ...
ver más
|
|
|
|
|
|
|
P. Sudhakaran,Subbiah Swaminathan,D. Yuvaraj,S.Shanmuga Priya
Pág. pp. 150 - 163
Focusing on the issue of host load estimating in mobile cloud computing, the Long Short Term Memory networks (LSTM)is introduced, which is appropriate for the intricate and long-term arrangement information of the cloud condition and a heap determining c...
ver más
|
|
|
|
|
|
|
Honghang Zhou, Yan Li, Yuyang Liu, Lei Yue, Chao Gao, Wei Li, Jifang Qiu, Hongxiang Guo, Xiaobin Hong, Yong Zuo and Jian Wu
In recent years, short-reach optical links have attracted much more attention and have come to constitute a key market segment due to the rapid development of data-center applications and cloud services. Four-level pulse amplitude modulation (PAM4) is a ...
ver más
|
|
|
|
|
|
|
César Augusto Gutiérrez Rodríguez, Ricardo Andrés Almeida, Wilson Eduardo Romero Palacios
Objetivo: diseñar un modelo Cloud Computing que permitirá a las empresas manejar la información, reducir costos, maximizar servicios y utilizar tecnología de punta. Metodología: construir un modelo que genere rompimiento en el paradigma mental...
ver más
|
|
|
|
|
|
|
Shafaq Khan, Mathew Nicho, Grahame Cooper
The rapid adoption of cloud computing by organizations, along with the need to comply with relevant IT governance (ITG) controls, has increased the complexity of governance in the cloud. This transition from a classical data center to a virtualized data ...
ver más
|
|
|
|
|
|
|
Meghana Thiyyakat, Subramaniam Kalambur and Dinkar Sitaram
The use of data centers is ubiquitous, as they support multiple technologies across domains for storing, processing, and disseminating data. IoT applications utilize both cloud data centers and edge data centers based on the nature of the workload. Due t...
ver más
|
|
|
|
|
|
|
Jian Li, Yipu Peng, Zhiyuan Tang and Zichao Li
To address the incomplete image data collection of close-to-ground structures, such as bridge piers and local features like the suspension cables in bridges, obtained from single unmanned aerial vehicle (UAV) oblique photography and the difficulty in acq...
ver más
|
|
|
|
|
|
|
Claudia Canali, Caterina Gazzotti, Riccardo Lancellotti and Felice Schena
In the last few years, fog computing has been recognized as a promising approach to support modern IoT applications based on microservices. The main characteristic of this application involve the presence of geographically distributed sensors or mobile e...
ver más
|
|
|
|