نتایج جستجو برای: level cloud

تعداد نتایج: 1158728  

2012
Shi Jia

It is proved that cloud computing has many benefits, and cloud services with flexible licensing model and cost saving features bring opportunities to enterprise's IT operations. Conventional ERP system, an important component of enterprises, is impacted by on-demand cloud services also. Integrating conventional ERP system with cloud services becomes a trend because it brings new processing capa...

2014
Sharon Evangeline Aluri Sai Prasad M. Jensen N. Gruschka J. Schwenk L. L. L. Iacono A. Celesti F. Tusa M. Villari N. Santos K. P. Gummadi Atsuo Inomata

Security is an important concern to improve in emerging cloud computing to store, manage, analyze and share the sensitive data. Infrastructure as a Service (IaaS) is a provision cloud model attracting all business customers to use cloud by offering on-demand and pay-per-use hardware, storage, servers and other networking components. Present single cloud architectures are having numerous securit...

2010
LEI WANG YUQING WANG AXEL LAUER SHANG-PING XIE

The seasonal cycle of marine boundary layer (MBL) clouds over the eastern Pacific Ocean is studied with the International Pacific Research Center (IPRC) Regional Atmospheric Model (iRAM). The results show that the model is capable of simulating not only the overall seasonal cycle but also the spatial distribution, cloud regime transition, and vertical structure of MBL clouds over the eastern Pa...

Cloud computing gives a large quantity of processing possibilities and heterogeneous resources, meeting the prerequisites of numerous applications at diverse levels. Therefore, resource allocation is vital in cloud computing. Resource allocation is a technique that resources such as CPU, RAM, and disk in cloud data centers are divided among cloud users. The resource utilization, cloud service p...

2009
F. John Krautheim

Cloud computing places an organization’s sensitive data in the control of a third party, introducing a significant level of risk on the privacy and security of the data. We propose a new management and security model for cloud computing called the Private Virtual Infrastructure (PVI) that shares the responsibility of security in cloud computing between the service provider and client, decreasin...

Journal: :IET Communications 2012
Benjamin König Jose M. Alcaraz Calero Johannes Kirschnick

This paper presents a scalable and elastic distributed system for monitoring Cloud infrastructure based on a pure peer-to-peer architecture. Its distributed nature enables to deploy long-living queries across the network to monitor a diverse set of entities and metrics, spanning across all layers of a Cloud stack which can change rapidly. This allows for aggregating low-level metrics from opera...

2013
Mohamed Firdhous Suhaidi Hassan Osman Ghazali

Quality of service plays is an important factor in distributed computing. Cloud computing has been the paradigm in distributed computing. Under cloud computing, computing resources are hosted in the internet and delivered to customers as services. Prior to the commencement of services, the customers and cloud providers negotiate and enter into an agreement named service level agreement. The ser...

Journal: :J. UCS 2012
Yung Bok Kim

Various mobile-web services have expanded with the evolution of mobile Internet technologies and with the increasing variety of smart phones in the proliferating cloud computing environment. Web services for the integration of cloud applications/services can be evaluated at the utilization-level as well as the serviceability of the service on the server side in the management for cloud computin...

2013
Pramod Bide Rajashree Shedge

Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. Denial ofService (DoS) attack or Distributed Denial-of-Service (DDoS) are major security issues in cloud environment. The best solution to protect the cloud from these attacks is use of IDS. IDS have become popular cloud security technology to detect cyber attacks ...

Journal: :CoRR 2011
Pierre de Leusse Krzysztof Zielinski

In this article, the authors introduce the main ideas around the governance of cross-Cloud application deployment and their related concepts. It is argued that, due to the increasing complexity and nature of the Cloud market, an intermediary specialized in brokering the deployment of different components of a same application onto different Cloud products could both facilitate said deployment a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید