Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Recent research on software revenue and pricing models has revealed important ways in which firms can benefit from software renting. However, it is still unclear how SaaS providers select a proper revenue and pricing model to make their... more
    • by 
    •   6  
      Revenue ManagementCloud ComputingPricingSoftware Business
The idea of Homomorphic encryption is to make sure data confidentiality in messages, storage or in utilize by processes with methods similar to conventional cryptography, but with additional abilities to compute over encrypted data,... more
    • by 
    •   4  
      Cloud ComputingCloud Computing SecuritySecurity in Cloud ComputingCloud Computing and Virtualization
    • by 
    •   8  
      Information SecurityEuropean LawPrivacyInformation Security and Privacy
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed... more
    • by 
    •   7  
      Cloud ComputingHybrid CloudCloud Computing SecurityCloud Security
A comprehensive political and design theory of planetary-scale computation proposing that The Stack—an accidental megastructure—is both a technological apparatus and a model for a new geopolitical architecture. What has planetary-scale... more
    • by 
    •   4  
      Political Geography and GeopoliticsComputer ScienceInterface DesignCloud Computing
With the increasing utilization of the Internet and its provided services, an increase in cyber-attacks to exploit the information occurs. A technology to store and maintain user's information that is mostly used for its simplicity and... more
    • by 
    •   10  
      Machine LearningComputational IntelligenceNetwork SecurityComputer Networks
    • by 
    •   8  
      ComplianceCloud ComputingEnterprise Resource Planning (ERP)Data Center
In recent years, media has become ubiquitous and important for networking and content sharing. Interest in the impact of media on the “real world” is as old as media itself. At the dawn of a new era, vast expansion in the advancement of... more
    • by 
    •   9  
      Operating SystemsComputer EngineeringDatabase SystemsComputer Networks
    • by 
    •   3  
      Cloud ComputingCloud Computing EconomyCloud Computing Security
    • by 
    •   16  
      Grid ComputingTrustSchedulingWeb Services
    • by 
    •   4  
      Network SecurityCloud ComputingCloud Computing SecurityEnsuring data storage security in cloud computing
In this paper, a resource management technique is proposed to handle the request of Virtual Machines (VM’s) as per the need of users, consisting of resources (mips, vm image size, network bandwidth, number of cpu’s) containing cloudlets... more
    • by 
    •   5  
      Computer ScienceCloud ComputingHybrid CloudResource Management
In this paper, a resource management technique is proposed to handle the request of Virtual Machines (VM's) as per the need of users, consisting of resources (mips, vm image size, network bandwidth, number of cpu's) containing cloudlets... more
    • by 
    •   3  
      Cloud ComputingHybrid CloudResource Management
    • by 
    •   6  
      Information TechnologyCloud ComputingData ProtectionData Privacy
    • by  and +1
    • Cloud Computing
Cloud computing offers an innovative business model to enterprise for IT services consumption and delivery. Software as a Service (SaaS) is one of the cloud offerings that attract organisations as a potential solution in reducing their IT... more
    • by 
    •   5  
      Distributed ComputingGrid ComputingInformation TechnologyCloud Computing
"" In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... more
    • by 
    •   19  
      Machine LearningData MiningCybercrimesAccess Control
In today’s world, various tools and technologies have been used in learning. The rapid and constant pace of change in technology increases opportunity for students. The opportunities include greater access to rich, multimedia content, the... more
    • by 
    •   5  
      Data MiningWeb MiningEducational Data MiningCloud Computing
    • by 
    •   6  
      Information SecurityComputer NetworksSecurityComputer Security
The 21st century has witnessed precipitous changes spanning from the way of life to the technologies that emerged. We have entered anascent paradigmshift(industry 4.0) where sciencefictions have becomescience facts, and technologyfusion... more
    • by 
    •   20  
      Artificial IntelligenceAutonomous RoboticsBiotechnologyModeling and Simulation
    • by 
    •   7  
      Computer ScienceEnterprise ArchitectureCloud ComputingStandardization
Cloud computing is changing the way organizations approach technology and its infrastructure. However, in spite of its attractiveness, cloud computing can be seen as a threat in terms of compliance. Given its intrinsic distributed nature,... more
    • by 
    •   3  
      EngineeringCloud ComputingApplied Sciences
The General Data Protection Regulation (GDPR) harmonizes personal data protection laws across the European Union, affecting all sectors including the healthcare industry. For processing operations that pose a high risk for data subjects,... more
    • by 
    •   8  
      Computer SciencePrivacySecurityFuture Internet
    • by 
    •   7  
      Computer ScienceCloud ComputingOPERATING SYSTEMReal Time
With the quick advancement of flexible cloud administrations, it turns out to be progressively helpless to utilize cloud administrations to share information in a companion hover in the distributed computing condition. Since it is not... more
    • by 
    •   7  
      Computer ScienceInformation SecurityComputer EngineeringComputer Security
    • by 
    •   4  
      BusinessCloud ComputingCloud Computing SecurityOrigin of Cloud Computing
    • by 
    •   19  
      Information SecurityInformation Security AuditingInformation Security and PrivacyCloud Computing
Abstract-In today’s network world, the most advanced and recent technology is the Cloud computing. Clouds can be thought as the new generation of Grid Computing. Clouds generally consist of data centres that are owned by the same... more
    • by 
    •   4  
      Grid ComputingCloud ComputingSAASIaaS
    • by 
    •   10  
      Information TechnologyServicesData ManagementCloud Computing
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple... more
    • by 
    •   4  
      Cloud ComputingCloud SecurityData Storage Management in CloudJob Scheduling on Grid Computing and Cloud Computing
The q-Calculus has served as a bridge between mathematics and physics, particularly in case of quantum physics. The q-generalizations of mathematical concepts like Laplace, Fourier and Sumudu transforms, Hypergeometric functions etc. can... more
    • by 
    •   8  
      EngineeringComputer ScienceSoftware EngineeringMachine Learning
    • by 
    •   22  
      Distributed ComputingGrid ComputingService QualityModeling
Ojlerove formule sluze za proveru topologije predmeta. Relaciona struktura teme->ivica->petlje->lice->opna je dovoljan skup za identifikaciju validnosti objekata u CAD/CAM solid modeliranju...
    • by 
    •   2  
      Cloud ComputingInternet of Things (IoT)
Cloud computing today has now been growing as new technologies and new business models. In distributed technology perspective, cloud computing most like client-server services like web-based or web-service but it used virtual resources to... more
    • by  and +1
    •   16  
      Measurement and EvaluationPerformanceWeb ServicesCloud Computing
    • by  and +1
    •   4  
      Web ServicesMobile ComputingCloud ComputingAndroid
    • by 
    •   4  
      Cloud ComputingSAASPAASIaaS
    • by 
    •   6  
      Cloud ComputingRisk AnalysisData SecurityData Processing
In this article we argue that smart items and cloud computing can be powerful enablers of servitization as business trend. This is exemplified by an application scenario in healthcare that was developed in the context of the OpSIT-Project... more
    • by 
    •   3  
      EngineeringCloud ComputingSensors and transducers
    • by 
    •   2  
      Computer ScienceCloud Computing
    • by 
    •   20  
      Computer ScienceSoftware EngineeringClimate ChangeMachine Learning
The effective use of cloud computing has been proved in various sectors including the education sector of our society. In education sector, learning environment plays a vital role in meeting the goals of a particular programme of study.... more
    • by 
    •   6  
      Software EngineeringLearning environmentsCloud ComputingInformation
In a cloud environment, third party controlled asset sharing cloud databases is the motivation for search of trust. Lack of trust appears to be a probable major cause for fear when outsourcing databases. Research literature reviews... more
    • by 
    •   5  
      Computer ScienceInformation SecurityComputer SecurityCloud Computing
Recently, several cloud modeling approaches have emerged. They address the diversity of cloud environments by introducing a considerable set of modeling concepts in terms of novel domain-specific languages. At the same time,... more
    • by 
    •   4  
      Computer ScienceCloud ComputingUMLLanguage Engineering
— Superconducting (SC) cavities are made up of superconducting material named niobium which is used in particle accelerators whose performance is limited at radio frequency. There are mainly two phenomena called Field Level Quench and... more
    • by 
    •   9  
      EngineeringElectrical EngineeringComputer ScienceSoftware Engineering
Repeated series mining is well known and well studied trouble in information mining. The productivity of the formula is used in several alternative regions like chemistry, bioinformatics, and market basket analysis. A completely unique... more
    • by 
    •   8  
      EngineeringComputer ScienceSoftware EngineeringMachine Learning
Mobile computing empowers its users to exploit portable computation and context-aware communication, however; a mobile device lacks energy and performance to execute computation and memory intensive tasks. On the contrary, cloud computing... more
    • by 
    •   5  
      Software ArchitectureSoftware ReuseCloud ComputingPatterns and Frameworks
In the light of the rapidly changing and benefits brought by cloud computing, the study is to find the critical factors that may hinder the benefits of cloud adoption, with respective measures proposed. It was found that control... more
    • by 
    •   4  
      Cloud ComputingCloud Computing SecurityCloud-related busines performanceControl Self-Assessment
Cloud computing is designed to provide on-demand resources or services over the Internet, usually at the scale and with the reliability level of a data center. MapReduce is a software framework that allows developers to write programs... more
    • by 
    • Cloud Computing
The rapid growth of power demand from business, and Web applications has led to the emergence of cloud-oriented data centers. Load prediction is a significant cost-optimal resource allocation and energy saving approach for a cloud... more
    • by 
    • Cloud Computing
    • by 
    • Cloud Computing