iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Cloud
جزئیات خدمات ترجمه در ترجمه تخصصی
سیستم
data
سیستم
cloud
dynamic
your
social
task
task
[]
cloud
cloud
[]
I.J. Information Technology and Computer Science, 2012, 10, 74-79
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
Experiments in Fluids (2005) 39: 48–55
Experiments in Fluids (2005) 39: 48–55
Experiments in Fluids (2005) 39: 48–55
state of the art and open challenges Introduction In the
state of the art and open challenges Introduction In the
Software Architecture Definition for On-demand Cloud
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
Amazon Web Services - Architecting for The Cloud: Best Practices January 2010
How VMware sees OpenStack as a standard By Brandon Butler
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Security for Cloud Based Services
CompRef8 / Cloud Computing: A Practical Approach / Anthony Velte, Toby Velte & Robert Elsenpeter / 694-8
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
a service architecture model is needed to transform the existing
Prof. Swati Vitkar / IJAIR ISSN: 2278-7844
Cloud Computing: Network Security in E-
ISSN: 2277-3754
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
ISSN: 2277-3754
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
Secure Storage in Cloud Computing & Emergence
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
ABSTRACT This paper outlines the key characteristics that cloud computing
IIIT, Hyderabad
MapReduce in the Clouds for Science
Secured E-commerce Architeture
This technology uses both the internet and the central servers
Data Management in the Cloud: Limitations and Opportunities
The many advantages of cloud computing are increasingly attracting individualsand
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
The many advantages of cloud computing are increasingly attracting individuals
TSINGHUASCIENCEANDTECHNOLOGY
KEY CONCEPTS The main concepts dealing in this paper are
Cloud computing offers different types of services depending on business
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
CLOUD SERVICES DEPLOYMENT MODEL There are different types of deployment
There are different types of deployment model depending on the
SECURITY ISSUES OF CLOUD COMPUTING Security issues of cloud computing
a service architecture model is needed to transform the existing
the current cloud computing only has a process that responds
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
a service architecture model is needed to transform the existing
the current cloud computing only has a process that responds
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, July 2012
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2, January 2013
and Future Directions Abstract This paper discusses approaches and environments
2014 IEEE World Forum on Internet of Things (WF-IoT)
defined Storage Predictions for 2014 This past year was full
Archana Pawar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 928-933
REVIEW ARTICLE
REVIEW ARTICLE
Comparison of Virtual Machine Scheduling Algorithms in
Cloud computing is a new computing model which is based
Its biggest advantages are the reduced costs since a physical
Somaveh Jafari, et al International Journal of Computer and Electronics Research [Volume 3, Issue 3, June 2014]
Scheduling Service Workflows for Cost
SECURITY AND COMMUNICATION NETWORKS
Assessing Cloud Readiness at Continental AG
Journal of Network and Computer Applications 41 (2014) 424–440
task scheduling problem in cloud computing has become an active
2012 International Symposium on Pervasive Systems, Algorithms and Networks
With the rapid growth of emerging applications like social network
A Game Theoretic Resource Allocation for Overall Energy
3
5-Layered Architecture of Cloud Database Management System
Decision Support Systems 51 (2011) 176–189
many vendors and industry observers predict a bright future for
Scheduling problems for cloud computing
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Cloud-enabled wireless body area networks for pervasive healthcare
International Journal of Information Management 33 (2013) 160– 165
Computer Networks 70 (2014) 312–329
Available online at www.sciencedirect.com
FutureGenerationComputerSystems ( ) –
INFORMATION SECURITY
3
Accepted Manuscript
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
INFORMATION SECURITY
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Expert Systems with Applications 41 (2014) 7789–7796
Journal of Network and Computer Applications 35 (2012) 1367–1373
EXECUTION ANALYSIS OF LOAD BALANCING
PART1-15057
International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7– Mar 2014
International Journal of Computer Applications (0975 – 8887)
Communications of the Association for Information Systems
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
CHAPTER
2010Cloud Computing Research and Development Trend The factors that impel
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.
Cloud computing is rapidly growing as an alternative to conventional
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Cloud computing is rapidly growing as an alternative to conventional
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
2012 Ninth International Conference on Information Technology - New Generations 2012 Ninth International Conference on Information Technology- New Generations
combines computers from multiple administrative domains to reach a common
Information Systems 47 (2015) 98–115
OC13030
OC13030
OC13030
Big Data Using Cloud Computing
II. BIG DATA MANAGEMENT SYSTEM challenge. Moreover, simple distributed file systems men-
CLOUD COMPUTING
CLOUD COMPUTING
CLOUD COMPUTING
CLOUD COMPUTING
International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011
Innovative Schemes for Resource Allocation
Comparison of Several Cloud Computing Platforms
Network-aware Cloud Brokerage for
Network-aware Cloud Brokerage for
Network-aware Cloud Brokerage for
nodes in the back-end). We utilized a RTP-proxy integrated in
International Journal Multimedia and Image Processing (IJMIP), Volume 1, Issue 1, March 2011
FutureGenerationComputerSystems29(2013)1278–1299
Comparison of Several Cloud Computing Platforms
Innovative Schemes for Resource Allocation
2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET)
رایانش ابری
DRAFT CLOUD COMPUTING SYNOPSIS AND RECOMMENDATIONS
Computers in Industry 65 (2014) 657–674
Available online at www.sciencedirect.com
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
ISSN: 2321-7782 (Online)
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
With an explosive growth of the mobile applications and emerging
With an explosive growth of the mobileapplications and emerging
Mobile photo sharingservice enables mobile users to upload images
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
Accepted in Wireless Communications and Mobile Computing - Wiley
BARRIERS TO GOVERNMENT CLOUDADOPTION
HindawiPublishingCorporation
BARRIERS TO GOVERNMENT CLOUD ADOPTION ABSTRACT Besides the benefits are
Kuyoro S. O., Ibikunle F. & Awodele O.
2010 Second International Conference on Future Networks
Computers 2014, 3, 1-35; doi:10.3390/computers3010001
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
((IJCSIS) International Journal of Computer Science and Information Security,
resources of multiple cloud service providers can be utilized cooperatively
1 Introduction More and more services rely on IT systems
1 Introduction More and more services rely on IT systems
Effect of Cloud Computing based ERP System over Marketplace Dynamics
Efficient Resource Management for Cloud
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
A Survey on Security Issues in Cloud Computing
Applied Soft Computing 30 (2015) 72–82
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
ComputerStandards&Interfaces38(2015)72–77
ComputerStandards&Interfaces38(2015)72–77
An Optimized Solution for Mobile Environment
An Optimized Solution for Mobile Environment
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
Review
Internet of things
REVIEW OF ACCESS CONTROL MODELS FOR
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
created applications on a development platform that a cloud service
FutureGenerationComputerSystems28(2012)379–390
FutureGenerationComputerSystems28(2012)379–390
International Journal of Managing Information Technology (IJMIT) Vol.6, No.3, August 2014
International Journal of Managing Information Technology (IJMIT) Vol.6, No.3, August 2014
STEP MODEL OF MIGRATION INTO A CLOUD Typically migration initiatives
There are economic and business reasons why an enterprise application
There are economic and business reasons why an enterprise application
1099
1099
Virtualization and Resiliency for Data Center Computing INTRODUCTION Cloud computing
cloud computing offers IT to be treated as an ongoing
ISSN: 2277-3754
We have argued that it is very important to take
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
NISTIR 7956
The Power of Prediction:
The Power of Prediction:
At this stage the user who has commissioned or procured
Global Journal of Computer Science and Technology:
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
Database Systems Journal vol. III, no. 3/2012 داده کاوی با استفاده از رایانش ابری
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 393
ISSN 0147 6882, Scientific and Technical In formation Processing, 2012, Vol. 39, No. 3, pp. 173–178. © Allerton Press, Inc., 2012.
ZHENG LAYOUT_Layout 1 6/21/13 12:00 PM Page 34
6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United
Journal of Asian Earth Sciences 41 (2011) 467–475
clouds
Strengths
A Comparative Study of Performance Evaluation of Services in
A modeling and simulation framework for mobile
Performance evaluation of cloud computing platforms using
Performance evaluation of remote display access for mobile cloud
Performance evaluation of cloud computing platforms using
Discovery ANALYSIS
14 G. Aceto et al./Computer Networks xxx (2013) xxx–xxx
Cloud computing Abstract Due to the increasing use of Cloud
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Introduction to Capacity Management
International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
International Journal of Engineering Research & Technology (IJERT)
Network Security Function Virtualization(NSFV) towards Cloud computing with NFV
Available online at www.sciencedirect.com
Information Sciences 305 (2015) 357–383
Ouedraogo et al. Journal of Cloud Computing: Advances, Systems
J Grid Computing (2013) 11:1–25
*Manuscript
3. WSA - greement and WSAG4J
*Manuscript
3. WSA - greement and WSAG4J
*Manuscript
3. WSA - greement and WSAG4J
Available online at www.sciencedirect.com
Abstract Efficient provisioning of resources is a challenging problem in
INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY E-ISSN: 2349-7610
Information and Knowledge Management www.iiste.org
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
368 M. Ali et al./Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
364 M. Ali et al./Information Sciences 305 (2015) 357–383
372 M. Ali et al./Information Sciences 305 (2015) 357–383
Journal of Applied Science and Engineering, Vol. 18, No. 1, pp. 67 78 (2015) DOI: 10.6180/jase.2015.18.1.09
This article was downloaded by: [188.209.171.221]
2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering
A Seminar Report on
A Seminar Report on
Introduction
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11
نرم افزار
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
Autonomic Resource Provisioning for
Integration of Wireless Sensor Networks and
Integration of Wireless Sensor Networks and
MULTI-TENANT ACCESS CONTROL FOR CLOUD SERVICES
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
IoT Framework Security Considerations
CLOUD COMPUTING
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 5 9 2 2 1 0 4 9
Cloud Computing Risk Assessment: A
0
Vilaplanaetal. BMCMedicalInformaticsandDecisionMaking2013,13:35
IBM IBM offers cloud computing services to help businesses of
IBM IBM offers cloud computing services to help businesses of
bulut bilisim
Information Sciences 305 (2015) 357–383
ComputerStandards&Interfaces42(2015)137–142
CLOUD COMPUTING
ISSN: 2319-5967
J Internet Serv Appl (2010) 1: 7–18
Feature: Cloud Computing
WAN_LAYOUT.qxp_Layout 7/30/14 2:01 PM Page 106
A Study on Fault Tolerance methods in Cloud
ND
Grids vs. Clouds
Cloud computing risk and audit issues
level plans that artificially separate out features to get you
date and use the same encryption technologies employed by banking
–
Swiss privacy Tresorit handles data under Swiss privacy laws that
Energyefficiencyofmobileclientsincloudcomputing
Towards an Architecture of BI in the Cloud
businessprocesses Companies understand the importance of auditing the compliance of
International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol.2, No.5, October 2012
AcceptedManuscript
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
Information Sciences 305 (2015) 357–383
Early adopters and new applications Cloud computing is still in
Early adopters and new applications Cloud computing is still in
Survey on Load Rebalancing For
upsurges the capabilities of the hardware resources by optimal and
her own VM image or can use an image from
her own VM image or can use an image from
Available online at www.sciencedirect.com
computers & security 50 (2015) 60e73
International Journal of Information Management 34 (2014) 28– 36
G Model
IBM Sales and Distribution Banking
We’re driving
Information Systems 47 (2015) 98–115
Journal of Network and Computer Applications 35 (2012) 1831–1838
J Grid Computing (2011) 9:3–26
Virtualization Cloud computing is one of the most useful technology
Cloud Computing Services and Virtualization Virtualization Services are changing the
The 11th International Conference on Parallel and Distributed Computing, Applications and Technologies
Cloud Computing Services and Virtualization Virtualization Services are changing the
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
G Model
P. Gupta et al. / International Journal of Information Management 33 (2013) 861– 874 867
G Model
P. Gupta et al. / International Journal of Information Management 33 (2013) 861– 874 867
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
COMPUSOFT, An international journal of advanced computer technology, 3 (9), September-2014 (Volume-III, Issue-IX)
ComputerStandards&Interfaces42(2015)137–142
Available online at www.sciencedirect.com
Cloud computing has been flourishing in past years because of
امنیت هادوپ
A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security
Cloud computing has been flourishing in past years because of
cloud interactions Atmospheric chemistry Earth Radiation Budget Sensitivity to Cloud
ComputerStandards&Interfaces42(2015)137–142
ComputerStandards&Interfaces42(2015)137–142
Interconnected Cloud Computing Environments: Challenges,
J Grid Computing (2014) 12:321–345
Cloud Computing:
PART II
TCP/IP Header Classification for Detecting Spoofed
Distributed Denial of Service attack on Cloud:
World Congress on Internet Security (WorldCIS-2013)
World Congress on Internet Security (WorldCIS-2013)
P P a a r r t t I I I I I I :: C C ll o o u u d d C C o o m m p p u u t t ii n n g g a a t t W W o o r r k k
Cloud-IO: Cloud Computing Platform
Cloud-IO: Cloud Computing Platform
000m2 of desert ground with a new breed of photovoltaic
000m2 of desert ground with a new breed of photovoltaic
Security in cloudcannot be simulated even though as different simulation
Security in cloudcannot be simulated even though as different simulation
Security in cloudcannot be simulated even though as different simulation
Blue Skie S
2012 International Symposium on Pervasive Systems, Algorithms and Networks
Multi-node Scheduling Algorithm
Software-Defined Cloud Computing: Architectural
245
CLOUD COMPUTING 2015 : The Sixth International Conference on Cloud Computing, GRIDs, and Virtualization
ISBN 978-93-84422-22-6
2014 2nd International Conference on Systems and Informatics (ICSAI 2014)
A SECURITY REFERENCE
Cost Reducing The profits that cloud computing providers get is
cloud computing
cloud computing
A Survey on Cloud Computing
International Journal of Information Management 33 (2013) 160– 165
Downloaded form http://iranpaper.ir
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
7. Conclusions and future research directions
7. Conclusions and future research directions
Available online at www.sciencedirect.com
It becomes the most attractive place for life and work
Self-Learning Cloud Controllers:
Cloud computing aim to power the data centers as a
It is an integration of wireless sensor network with mobile
Constructing a Cloud-centric Service Assurance Platform for Computing as a
A Survey of Commercial Frameworks for
Abstract — Today’s world is an era of cloud computing. Cloud computing aim to power the data centers as a network
Journal of Network and Computer Applications 48 (2015) 99–117
Journal of Network and Computer Applications 48 (2015) 99–117
IJCST V o l . 4, ISSue 1, J a n - M a r C h 2013 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)
A Study on Fault Tolerance methods in Cloud
2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
220 IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2012
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
2013 Second European Workshop on Software Defined Networks
Privacy and Confidentiality issues in Cloud Computing architectures 35
Journal of Network and Computer Applications 47 (2015) 99–106
Journal of Network and Computer Applications 47 (2015) 99–106
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
2013 Second European Workshop on Software Defined Networks
FutureGenerationComputerSystems ( ) –
FutureGenerationComputerSystems ( ) –
computer law & security review 28 (2012) 679e686
234 D.Serranoetal./FutureGenerationComputerSystems54(2016)233–246
234 D.Serranoetal./FutureGenerationComputerSystems54(2016)233–246
234 D.Serranoetal./FutureGenerationComputerSystems54(2016)233–246
234 D.Serranoetal./FutureGenerationComputerSystems54(2016)233–246
Privacy and Confidentiality issues in Cloud Computing architectures 19
Volume 5, Issue 6, June 2015 ISSN: 2277 128X
Downloaded form http://iranpaper.ir
CLOUD SECURITY
CHAPTER
computer law & security review 28 (2012) 679e686
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded form http://iranpaper.ir
The main focus is on direct interoperability between public cloud
9
is an emerging paradigm to logically centralize the network control
The Device Cloud - Applying Cloud Computing
random masking, TPA becomes unable to access the data content while it is
1. INTRODUCTION
6 IEEETRANSACTIONSONCLOUDCOMPUTING, VOL.4, NO.1, JANUARY-MARCH2016
ARTICLE IN PRESS
These services are subscribed by clients willing to reduce the
Privacy and Confidentiality issues in Cloud Computing architectures 35
Software-Defined Cloud Computing: Architectural
Data Security Challenges and Its Solutions in Cloud Computing
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Computer Networks 81 (2015) 308–319
Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment
Optimization of Resource Scheduling Based On Genetic Algorithm in Cloud Computing Environment
Various Job Scheduling Algorithms in Cloud Computing: A Survey
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Network and Complex Systems www.iiste.org
Global Journal of Computer Science and Technology:
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
2015 12th International Conference on Information Technology - New Generations
55803
2015 18th International Conference on Intelligence in Next Generation Networks
Hierarchical Storage Technique for Maintaining
FutureGenerationComputerSystems29(2013)158–169
most of those who claim not to understand the subject
A hybrid cloud is an integrated cloud service utilising both
A private cloud is a particular model of cloud computing
is one of the three fundamental service models of cloud
describes any cloud service where consumers are able to access
describes any cloud service where consumers are able to access
Journal of Network and Computer Applications 34 (2011) 1–11
big data
FutureGenerationComputerSystems29(2013)84–106
Available online at www.sciencedirect.com
Cloud Database Management System is a new emerging concept recently
12 predictions of the profession
RESEARCH REPORT
2-Filename :MRLD_4529_JEIM-02-2014-0017-saas-ranking the determinants Title :The adoption of software-as-a-service (SaaS):ranking the determinants Desc :Journal of Enterprise Information Management
Available online at www.sciencedirect.com
abstract Isolation and resource control for cloud applications has traditionally been achieve through the use of virtual machines.
5 Key Facts about SaaS Market Size Posted by OmriErel
ND
FutureGenerationComputerSystems29(2013)1278–1299
computers & security 49 (2015) 45e69
FutureGenerationComputerSystems28(2012)833–851
Computers and Electrical Engineering xxx (2012) xxx–xxx
Accepted Manuscript
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Introduction to Microsoft Windows Server 2016 Whether you are a
Introduction to Microsoft Windows Server 2016 Whether you are a
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management
Introduction to Microsoft Windows Server 2016 Whether you are a
Khan et al. Journal of Cloud Computing: Advances, Systems and Applications 2012, 1:1
JOURNAL OF INFORMATION ARCHITECTURE | VOLUME 5 ISSUES 1 – 2
International Journal of Science and Research (IJSR)
Mobile Netw Appl
Computers & Operations Research 75 (2016) 12–27
Computers & Operations Research 75 (2016) 12–27
Computers & Operations Research 75 (2016) 12–27
International Journal of Control and Automation
ARTICLE IN PRESS
ARTICLE IN PRESS
International Journal of Control and Automation
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
FutureGenerationComputerSystems48(2015)39–45
Journal of Systems Architecture 60 (2014) 726–740
Nagrath etal. SpringerPlus (2015) 4:103
Neural Comput & Applic
IT service providers are confronted with challenges of growing the
ThesmartpowergridisanativeapplicationofIoTand Cloud technologiesastheintelligentmeters arehighly distributed andthey generate huge amount of
CHAPTER 24
ARTICLE IN PRESS
2015 Seventh International Conference on Measuring Technology and Mechatronics Automation
Neural Comput & Applic
Neural Comput & Applic
Neural Comput & Applic
THE ENERGY CLOUD
THE ENERGY CLOUD
Neural Comput & Applic
Neural Comput & Applic
ARTICLE IN PRESS
Available online at www.sciencedirect.com
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
NETWORK TRAFFIC ANOMALY DETECTION FOR IAAS
FutureGenerationComputerSystems56(2016)684–700
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCC.2016.2570752, IEEE
Available online at www.sciencedirect.com
Security, Privacy and Trust in Cloud Computing:
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI
2015 IEEE 8th International Conference on Cloud Computing
2015 IEEE 8th International Conference on Cloud Computing
2015 IEEE 8th International Conference on Cloud Computing
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
SPECIALSECTIONONBIGDATASERVICESANDCOMPUTATIONALINTELLIGENCE
Journal of Network and Computer Applications 77 (2017) 18–47
1 Introduction to Cloud Computing Reduced costs of processing and
Resource allocation Resource allocation is an inevitable technology for the
1 Modeling of the Resource Allocation in Cloud Computing Datacenters
Origin of the term The origin of the term cloud
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
tCloud computing and the Internet of Things are the two
2017 11th International Conference on Intelligent Systems and
Journal of Information & Computational Science 9: 13 (2012) 3821–3829
Improved PSO-based Task Scheduling Algorithm in
Journal of Network and Computer Applications 68 (2016) 173–200
Applied Computing and Informatics (2016) xxx, xxx–xxx
Applied Computing and Informatics (2016) xxx, xxx–xxx
Journal of Network and Computer Applications 79 (2017) 88–115
1
2016 IEEE 41st Conference on Local Computer Networks 2016 IEEE 41st Conference on Local Computer Networks 2016 IEEE 41st Conference on Local Computer Networks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 1, FEBRUARY 2017 75
ARTICLE IN PRESS
SDN and Fog Computing Rapid increase in number and diversity
2013 17th International Conference on Information Visualisation 2013 17th International
3.3.1 Smart objects/Smart devices
3.3.1 Smart objects/Smart devices
3.3.3 Cloud
Downloaded from http://iranpaper.ir
Special Publication 800-145
INT J COMPUT COMMUN, ISSN 1841-9836
AcceptedManuscript
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
ARTICLE IN PRESS
Downloaded from http://iranpaper.ir
relevant applications have grown more and more popular in recent
relevant applications have grown more and more popular in recent
relevant applications have grown more and more popular in recent
relevant applications have grown more and more popular in recent
Background and related work This research focuses on the cloud
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
2016 8th International Conference on Communication Systems and Networks (COMSNETS)
HindawiPublishingCorporation
The Basics of
The Basics of
CHAPTER 1
The Basics of
The Basics of
The Basics of
CHAPTER 1
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
The Basics of
The Basics of
The Basics of
The Basics of
CHAPTER 2
The Basics of
The Basics of
CHAPTER 1
The Basics of
CHAPTER 2
CHAPTER 3
CHAPTER 1
The Basics of
The Basics of
CHAPTER 2
The Basics of
Cloud Monitoring
40 4 I EE E TRA NSACTIONS O N AUT OM A TION S CI E N CE AN D EN G INEERING , VOL . 12 , NO. 2, A P RIL 201 5
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2016.2619369, IEEE Internet of
The data collected by each of these IoT solutions is
New Model for IT:
CHAPTER 2
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
CHEN2_LAYOUT.qxp_Layout 1 3/13/15 2:07 PM Page 32
An Oracle White Paper
J Grid Computing (2017) 15:1–22
(IJACSA) International Journal of Advanced Computer Science and Applications,
Computers in Human Behavior 58 (2016) 150e157
3System breakdown and analysis We split the proposed architecture for
CHAPTER 2
CHAPTER 2
CHAPTER 2
Chem Soc Rev
ComputerStandards&Interfaces36(2014)759–775
ComputerStandards&Interfaces36(2014)759–775
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
1 high query efficiency while maintaining high availability and 2
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
1 high query efficiency while maintaining high availability and 2
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
1 high query efficiency while maintaining high availability and 2
Journal of Network and Computer Applications∎ (∎∎∎∎)∎∎∎-∎∎∎ 1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
1 high query efficiency while maintaining high availability and 2
1 cost by dynamically maintaining minimum replicas among the 2
1 2 3 4
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
Providing a new hybrid algorithm for
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
FutureGenerationComputerSystems70(2017)17–25
S. Shahdi-Pashaki et al. / IFAC-PapersOnLine 48-3 (2015) 1140–1145
S. Shahdi-Pashaki et al. / IFAC-PapersOnLine 48-3 (2015) 1140–1145
A Migration-enhanced Edge Computing Support for
SDN-based Game-Aware Network Management
An SDN Controller for Delay and Jitter Reduction in Cloud
An SDN Controller for Delay and Jitter Reduction in Cloud
Enabled Distributed Computing and Knowledge Discovery 2016 International Conference on
Available online at www.sciencedirect.com
Information technologies
International Journal of Computer Science and Information Security (IJCSIS),
ARTICLE IN PRESS
organizations cannot afford to choose between security and maintaining a
Creating regular WordPress backups is the best thing you can
Church et al. Journal of Cloud Computing: Advances, Systems and Applications
Information Sciences 258 (2014) 371–386
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
2016 International Conference on Networking and Network Applications 2016 International Conference on Networking and Network Applications
Security and privacy for storage and computation in cloud
Proceedings of the 23rd International Conference on
FutureGenerationComputerSystems56(2016)684–700
Proceedings of the 23rd International Conference on
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TBDATA.2016.2597149, IEEE
Cloud computing with unlimited resources seems to be the way
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TBDATA.2016.2597149, IEEE
Journal of Systems Architecture 76 (2017) 117–132
Grouped tasks scheduling algorithm based on QoS in cloud computing
J Supercomput
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/ACCESS.2017.2757844, IEEE Access
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
FutureGenerationComputerSystems41(2014)79–90
FutureGenerationComputerSystems41(2014)79–90
FutureGenerationComputerSystems ( ) –
Peer-to-Peer Netw. Appl.
2011 Workshops of International Conference on Advanced Information Networking and Applications
34 F. Hussain and A. Al-Karkhi
34 F. Hussain and A. Al-Karkhi
Shirazi and Iqbal Journal of Cloud Computing: Advances, Systems and Applications
2015 IEEE 8th International Conference on Cloud Computing
Journal of Information Security and Applications 38 (2018) 8–27
Journal of Information Security and Applications 38 (2018) 8–27
2016 IEEE 8th International Conference on Cloud Computing Technology and Science
This article has been accepted for publication in IEEE Computer magazine.
This article has been accepted for publication in IEEE Computer magazine.
References
International Journal of Production Research
Applied Computer Science, vol. 12, no. 3, pp. 37 –46 Submitted: 2016-09-12
Review
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314133324
Cross-Site Virtual
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/308138599
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Transport and Telecommunication Vol. 18, no. 3, 2017
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
J Supercomput
Available online at www.sciencedirect.com
The State of Ecommerce Platforms in 2019: Cloud Commerce, Open SaaS and The API Economy.
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
Mobile Computing The advancement in fog and cloud computing is
fog computing is a distributed computingarchitecture that involves network related
isolatescloser dependencies between specific hardware architectureand software systems to achieve
Received: 20 March 2016 Revised: 5 September 2016 Accepted: 15 October 2016
Received: 20 March 2016 Revised: 5 September 2016 Accepted: 15 October 2016
Cloud Computing and Grid Computing 360-Degree Compared
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Accepted Manuscript
AcceptedManuscript