[PDF][PDF] HIGH-PERFORMANCE AND FAULT-TOLERANT TECHNIQUES FOR MASSIVE DATA DISTRIBUTION IN ONLINE COMMUNITIES daniel higuero alonso …

JC Pérez, F Isaila - 2013 - e-archivo.uc3m.es
The amount of digital information produced and consumed is increasing each day. This
rapid growth is motivated by the advances in computing power, hardware technologies, and …

모바일소셜클라우드컴퓨팅에서서비스공유를위한결함포용스케줄링

최숙경, 정광식, 유헌창 - 한국정보기술학회논문지, 2013 - dbpia.co.kr
스마트 폰과 노트북을 비롯한 모바일 장치의 성능이 증가함에 따라 모바일 장치는 다양한
컴퓨팅 환경에서 서비스를 요청하는 단순한 인터페이스가 아닌 서비스를 제공하는 컴퓨팅 혹은 …

S-SWAP: scale-space based workload analysis and prediction

GAC Santos - 2013 - repositorio.ufc.br
This work presents a scale-space based approach to assist dynamic resource provisioning.
The application of this theory makes it possible to eliminate the presence of irrelevant …

[PDF][PDF] Elastic Integration of a Dedicated Grid Site with an Opportunistic Cloud Infrastructure

H Castro, N Garcés, M Villamizar - Proceedings of the …, 2013 - researchgate.net
this work aims to extend and integrate a dedicated grid infrastructure based on the
middleware gLite with opportunistic IaaS resources provided by the UnaCloud project. The …

[图书][B] Managing cloud computing energy demand in the smart grid environment

X Li - 2012 - search.proquest.com
This dissertation focuses on cloud computing centers as the power/energy users in a smart
grid environment. Since cloud computing centers are huge energy consumers by definition …

[PDF][PDF] Integración elástica de una infraestructura Grid dedicada con una infraestructura Cloud oportunista

N Garcés Ferreira - 2012 - repositorio.uniandes.edu.co
La computación de alto rendimiento (HPC por sus siglas en inglés) tiene sus bases en la
computación distribuida y que entre sus finalidades está proporcionar los recursos que …

A Formal Approach to Specifying Architecture Aspects and Their Weaving Logic

C Yang, J Wan - Eighth ACIS International Conference on …, 2007 - ieeexplore.ieee.org
Current aspect specification methods do not provide enough support for explicitly specifying
aspects and their weaving logic, nor do they provide effective and suitable mechanisms for …

[引用][C] Secure Data distribution with Proxy ReEncryption in Cloud Computing

G Dhanasekhar, Y Hemalatha - 2018