iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ Computing
جزئیات خدمات ترجمه در ترجمه تخصصی
computing
cloud
locality
load
cloud
cloud
An Optimization of Security and Trust Management
I.J. Information Technology and Computer Science, 2012, 10, 74-79
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
consuming servers which host products and services from a remote
state of the art and open challenges Introduction In the
state of the art and open challenges Introduction In the
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
Computers and Electrical Engineering 39 (2013) 47–54
CompRef8 / Cloud Computing: A Practical Approach / Anthony Velte, Toby Velte & Robert Elsenpeter / 694-8
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
A Model for Utilizing Cloud Computing in the Smart Grid
Prof. Swati Vitkar / IJAIR ISSN: 2278-7844
Cloud Computing: Network Security in E-
ISSN: 2277-3754
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
Volume 3, Issue 3, March 2013 ISSN: 2277 128X
ISSN: 2277-3754
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
Secure Storage in Cloud Computing & Emergence
TOWARDS OF SECURED COST-EFFECTIVE MULTI-CLOUD
Abstract�Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the
could computing
ABSTRACT This paper outlines the key characteristics that cloud computing
IIIT, Hyderabad
Secured E-commerce Architeture
This technology uses both the internet and the central servers
Data Management in the Cloud: Limitations and Opportunities
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
A Model for Utilizing Cloud Computing in the Smart Grid
A Model for Utilizing Cloud Computing in the Smart Grid
the current cloud computing only has a process that responds
IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 2, January 2013
Green computing
Archana Pawar et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.4, April- 2014, pg. 928-933
REVIEW ARTICLE
REVIEW ARTICLE
Cloud computing is a new computing model which is based
Somaveh Jafari, et al International Journal of Computer and Electronics Research [Volume 3, Issue 3, June 2014]
Assessing Cloud Readiness at Continental AG
Journal of Network and Computer Applications 41 (2014) 424–440
task scheduling problem in cloud computing has become an active
With the rapid growth of emerging applications like social network
Decision Support Systems 51 (2011) 176–189
many vendors and industry observers predict a bright future for
2013 International Conference on Computer Sciences and Applications
2013 International Conference on Computer Sciences and Applications
International Journal of Information Management 33 (2013) 160– 165
Available online at www.sciencedirect.com
Data centers are becoming increasingly popular for the provisioning of
Early solutions implemented distributed algorithms formaking data center hardware energy
INFORMATION SECURITY
INFORMATION SECURITY
FutureGenerationComputerSystems29(2013)1645–1660
EXECUTION ANALYSIS OF LOAD BALANCING
International Journal of Computer Trends and Technology (IJCTT) – volume 9 number 7– Mar 2014
International Journal of Computer Applications (0975 – 8887)
Communications of the Association for Information Systems
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
International Journal of Soft Computing and Engineering (IJSCE)
CHAPTER
2010Cloud Computing Research and Development Trend The factors that impel
Cloud computing is rapidly growing as an alternative to conventional
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Cloud computing is rapidly growing as an alternative to conventional
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
Security in the Cloud Despite the tremendous business and technical
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
combines computers from multiple administrative domains to reach a common
Information Systems 47 (2015) 98–115
OC13030
OC13030
OC13030
Big Data Using Cloud Computing
CLOUD COMPUTING
CLOUD COMPUTING
CLOUD COMPUTING
CLOUD COMPUTING
International Journal of P2P Network Trends and Technology- Volume1Issue1- 2011
THE ERR STAA ND NT A H RD AS SHTAG
Comparison of Several Cloud Computing Platforms
International Journal Multimedia and Image Processing (IJMIP), Volume 1, Issue 1, March 2011
FutureGenerationComputerSystems29(2013)1278–1299
An Efficient Parallel Algorithm
Comparison of Several Cloud Computing Platforms
Computers in Industry 65 (2014) 657–674
Volume 4, Issue 4, April 2014 ISSN: 2277 128X
Marissa Mayer Data mining is going through a signifi cant
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.5, September 2012
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
With an explosive growth of the mobile applications and emerging
With an explosive growth of the mobileapplications and emerging
Mobile photo sharingservice enables mobile users to upload images
2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering
Accepted in Wireless Communications and Mobile Computing - Wiley
A B S T R A C T The Indian
Computers and Electrical Engineering 40 (2014) 134–141
Information Sciences xxx (2014) xxx–xxx
BARRIERS TO GOVERNMENT CLOUD ADOPTION ABSTRACT Besides the benefits are
Kuyoro S. O., Ibikunle F. & Awodele O.
2010 Second International Conference on Future Networks
Computers 2014, 3, 1-35; doi:10.3390/computers3010001
[3B2-14] mmi2010020005.3d 23/3/010 15:43 Page 56
280 6 Mobile Commerce and Ubiquitous Computing
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
6.6 Location-Based Mobile Commerce and Mobile Social Networks 281
American Journal of Networks and Communications
American Journal of Networks and Communications
American Journal of Networks and Communications
American Journal of Networks and Communications
Mobile C ommer c e and Ubiquitous
Mobile C ommer c e and Ubiquitous
International Journal of Computer Science and Telecommunications [Volume 6, Issue 2, February 2015] 1
((IJCSIS) International Journal of Computer Science and Information Security,
International Journal of Computer Science and Telecommunications [Volume 6, Issue 2, February 2015] 1
Efficient Resource Management for Cloud
A Survey on Security Issues in Cloud Computing
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
ComputerStandards&Interfaces38(2015)72–77
ComputerStandards&Interfaces38(2015)72–77
An Optimized Solution for Mobile Environment
An Optimized Solution for Mobile Environment
ThinkPiece
IOSR Journal of Computer Engineering (IOSRJCE)
Review
REVIEW OF ACCESS CONTROL MODELS FOR
FutureGenerationComputerSystems28(2012)379–390
FutureGenerationComputerSystems28(2012)379–390
International Journal of Managing Information Technology (IJMIT) Vol.6, No.3, August 2014
International Journal of Managing Information Technology (IJMIT) Vol.6, No.3, August 2014
STEP MODEL OF MIGRATION INTO A CLOUD Typically migration initiatives
Virtualization and Resiliency for Data Center Computing INTRODUCTION Cloud computing
cloud computing offers IT to be treated as an ongoing
ISSN: 2277-3754
We have argued that it is very important to take
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
BioSystems 114 (2013) 219– 226
2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
Global Journal of Computer Science and Technology:
Database Systems Journal vol. III, no. 3/2012 داده کاوی با استفاده از رایانش ابری
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 16, NO. 1, FIRST QUARTER 2014 393
ISSN 0147 6882, Scientific and Technical In formation Processing, 2012, Vol. 39, No. 3, pp. 173–178. © Allerton Press, Inc., 2012.
6th International Conference on Internet Technology and Secured Transactions, 11-14 December 2011, Abu Dhabi, United
A Comparative Study of Performance Evaluation of Services in
Performance evaluation of cloud computing platforms using
Performance evaluation of remote display access for mobile cloud
Performance evaluation of cloud computing platforms using
International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
CHAPTER
UDC 621.398: 681.3
International Journal of Engineering Research & Technology (IJERT)
Information Sciences 305 (2015) 357–383
Available online at www.sciencedirect.com
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 7, NO. 3, JULY-SEPTEMBER 2014 333
INTERNATIONAL JOURNAL FOR RESEARCH IN EMERGING SCIENCE AND TECHNOLOGY E-ISSN: 2349-7610
Information and Knowledge Management www.iiste.org
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Information Sciences 305 (2015) 357–383
Mr. Dinesh S. Gawande, Asst. Prof. Rajesh C. Dharmik, Ms. Chanda Panse / International Journal of
2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering
A Seminar Report on
A Seminar Report on
Introduction
2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11
World Academy of Science, Engineering and Technology
Integration of Wireless Sensor Networks and
1 Introduction How will Internet computing change the world ofinformation
Integration of Wireless Sensor Networks and
CLOUD COMPUTING
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 5 9 2 2 1 0 4 9
Cloud Computing Risk Assessment: A
0
The Next Healthcare IT Trend:
IBM IBM offers cloud computing services to help businesses of
IBM IBM offers cloud computing services to help businesses of
Information Sciences 305 (2015) 357–383
ComputerStandards&Interfaces42(2015)137–142
CLOUD COMPUTING
ISSN: 2319-5967
J Internet Serv Appl (2010) 1: 7–18
A Study on Fault Tolerance methods in Cloud
ND
Grids vs. Clouds
Cloud computing risk and audit issues
Nature and Science, 5(2), 2007, Azhar Affandi and Kunio Watanabe, Daily groundwater level fluctuation
Energyefficiencyofmobileclientsincloudcomputing
International Journal on Cloud Computing: Services and Architecture (IJCCSA),Vol.2, No.5, October 2012
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
risk and compliance processes exist Most organizations have established security
Information Sciences 305 (2015) 357–383
Early adopters and new applications Cloud computing is still in
Early adopters and new applications Cloud computing is still in
Survey on Load Rebalancing For
upsurges the capabilities of the hardware resources by optimal and
her own VM image or can use an image from
her own VM image or can use an image from
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
JID:BDR AID:25 /FLA [m5G; v1.152; Prn:6/05/2015; 10:12] P.1 (1-8)
Quantum computing may be moving out of science fiction Progress
Available online at www.sciencedirect.com
International Journal of Information Management 34 (2014) 28– 36
G Model
IBM Sales and Distribution Banking
Information Systems 47 (2015) 98–115
Journal of Network and Computer Applications 35 (2012) 1831–1838
J Grid Computing (2011) 9:3–26
Virtualization Cloud computing is one of the most useful technology
Cloud Computing Services and Virtualization Virtualization Services are changing the
The 11th International Conference on Parallel and Distributed Computing, Applications and Technologies
Cloud Computing Services and Virtualization Virtualization Services are changing the
Virtualization Cloud computing is one of the most useful technology
Virtualization Cloud computing is one of the most useful technology
G Model
G Model
ComputerStandards&Interfaces42(2015)137–142
Available online at www.sciencedirect.com
ComputerStandards&Interfaces42(2015)137–142
ComputerStandards&Interfaces42(2015)137–142
Interconnected Cloud Computing Environments: Challenges,
J Supercomput (2012) 60:268–280
Cloud Computing:
Distributed Denial of Service attack on Cloud:
World Congress on Internet Security (WorldCIS-2013)
World Congress on Internet Security (WorldCIS-2013)
Cloud-IO: Cloud Computing Platform
Cloud-IO: Cloud Computing Platform
Multi-node Scheduling Algorithm
FutureGenerationComputerSystems28(2012)184–192
AdaptingscientificcomputingproblemstocloudsusingMapReduce
International Journal of Grid Computing & Applications (IJGCA) Vol.3, No.4, December 2012
International Journal of Grid Computing & Applications (IJGCA) Vol.3, No.4, December 2012
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
International Journal of Grid Computing & Applications (IJGCA) Vol.3, No.4, December 2012
2014 2nd International Conference on Systems and Informatics (ICSAI 2014)
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
AdaptingscientificcomputingproblemstocloudsusingMapReduce
Cost Reducing The profits that cloud computing providers get is
cloud computing
cloud computing
A Survey on Cloud Computing
International Journal of Information Management 33 (2013) 160– 165
Research scholar, TMU, Moradabad, INDIA JIT, Barabanki, INDIA
AdaptingscientificcomputingproblemstocloudsusingMapReduce
2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
7. Conclusions and future research directions
7. Conclusions and future research directions
Available online at www.sciencedirect.com
It becomes the most attractive place for life and work
Cloud computing aim to power the data centers as a
Abstract — Today’s world is an era of cloud computing. Cloud computing aim to power the data centers as a network
IJCST V o l . 4, ISSue 1, J a n - M a r C h 2013 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)
A Study on Fault Tolerance methods in Cloud
Privacy and Confidentiality issues in Cloud Computing architectures 35
Journal of Network and Computer Applications 47 (2015) 99–106
Journal of Network and Computer Applications 47 (2015) 99–106
computer law & security review 28 (2012) 679e686
Privacy and Confidentiality issues in Cloud Computing architectures 19
Volume 5, Issue 6, June 2015 ISSN: 2277 128X
Downloaded form http://iranpaper.ir
CLOUD SECURITY
computer law & security review 28 (2012) 679e686
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI Downloaded form http://iranpaper.ir
random masking, TPA becomes unable to access the data content while it is
1. INTRODUCTION
These services are subscribed by clients willing to reduce the
Privacy and Confidentiality issues in Cloud Computing architectures 35
Data Security Challenges and Its Solutions in Cloud Computing
Available online at www.sciencedirect.com
Available online at www.sciencedirect.com
Efficient Optimal Algorithm of Task Scheduling in Cloud Computing Environment
Optimal Task Scheduling in Cloud Computing Environment: Meta Heuristic Approaches
Optimization of Resource Scheduling Based On Genetic Algorithm in Cloud Computing Environment
Various Job Scheduling Algorithms in Cloud Computing: A Survey
Network and Complex Systems www.iiste.org
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops
55803
most of those who claim not to understand the subject
is one of the three fundamental service models of cloud
Journal of Network and Computer Applications 34 (2011) 1–11
Procedia Computer Science
big data
FutureGenerationComputerSystems29(2013)84–106
Cloud Database Management System is a new emerging concept recently
2-Filename :MRLD_4529_JEIM-02-2014-0017-saas-ranking the determinants Title :The adoption of software-as-a-service (SaaS):ranking the determinants Desc :Journal of Enterprise Information Management
Available online at www.sciencedirect.com
Bartłomiej Kołakowski
FutureGenerationComputerSystems29(2013)1278–1299
FutureGenerationComputerSystems28(2012)833–851
Computers and Electrical Engineering xxx (2012) xxx–xxx
Accepted Manuscript
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management
JOURNAL OF INFORMATION ARCHITECTURE | VOLUME 5 ISSUES 1 – 2
International Journal of Science and Research (IJSR)
Mobile Netw Appl
New directions for pervasive computing in logistics This paper investigates
International Journal of Control and Automation
Page 1 of 8
ARTICLE IN PRESS
ARTICLE IN PRESS
International Journal of Control and Automation
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Journal of Systems Architecture 60 (2014) 726–740
IT service providers are confronted with challenges of growing the
2015 Seventh International Conference on Measuring Technology and Mechatronics Automation
Available online at www.sciencedirect.com
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING
Available online at www.sciencedirect.com
Security, Privacy and Trust in Cloud Computing:
INVITED
1 Introduction to Cloud Computing Reduced costs of processing and
Resource allocation Resource allocation is an inevitable technology for the
1 Modeling of the Resource Allocation in Cloud Computing Datacenters
Origin of the term The origin of the term cloud
c o m p u t e r m e t h o d s a n d p r o g r a m s i n b i o m e d i c i n e 1 3 0 ( 2 0 1 6 ) 154–161
tCloud computing and the Internet of Things are the two
Journal of Information & Computational Science 9: 13 (2012) 3821–3829
Improved PSO-based Task Scheduling Algorithm in
Journal of Network and Computer Applications 68 (2016) 173–200
Applied Computing and Informatics (2016) xxx, xxx–xxx
Applied Computing and Informatics (2016) xxx, xxx–xxx
Journal of Network and Computer Applications 79 (2017) 88–115
1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
ARTICLE IN PRESS
Distributed Systems
SDN and Fog Computing Rapid increase in number and diversity
SDN and Fog Computing Rapid increase in number and diversity
Special Publication 800-145
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
Smart System: loT for University
ARTICLE IN PRESS
Downloaded from http://iranpaper.ir
Design of Parallel Algorithms for Super Long Integer Operation Based on Multi-core CPUs
2015 11th International Conference on Computational Intelligence and Security 2015
Journal of Network and Computer Applications ∎ (∎∎∎∎) ∎∎∎–∎∎∎
system and basic network configuration. It provides the ability to install extra software on the
(IJACSA) International Journal of Advanced Computer Science and Applications,
Computers in Human Behavior 58 (2016) 150e157
ComputerStandards&Interfaces36(2014)759–775
ComputerStandards&Interfaces36(2014)759–775
BOINC: A System for Public-Resource Computing and Storage
Providing a new hybrid algorithm for
S. Shahdi-Pashaki et al. / IFAC-PapersOnLine 48-3 (2015) 1140–1145
S. Shahdi-Pashaki et al. / IFAC-PapersOnLine 48-3 (2015) 1140–1145
Nearest neighbor search is a key technique used in hierarchical
Nearest neighbor search is a key technique used in hierarchical
International Journal of Grid and Distributed Computing
Enabled Distributed Computing and Knowledge Discovery 2016 International Conference on
Available online at www.sciencedirect.com
Information technologies
International Journal of Computer Science and Information Security (IJCSIS),
Information Sciences 258 (2014) 371–386
Security and privacy for storage and computation in cloud
79276
Grouped tasks scheduling algorithm based on QoS in cloud computing
J Supercomput
34 F. Hussain and A. Al-Karkhi
34 F. Hussain and A. Al-Karkhi
2016 IEEE 8th International Conference on Cloud Computing Technology and Science
Applied Computer Science, vol. 12, no. 3, pp. 37 –46 Submitted: 2016-09-12
Review
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/314133324
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/308138599
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
Cloud-FogInteroperabilityinIoT-enabledHealthcareSolutions
A COMPARISON OF FOG COMPUTING ANDRELATED COMPUTING PARADIGMS This section
Mobile Computing The advancement in fog and cloud computing is
fog computing is a distributed computingarchitecture that involves network related
isolatescloser dependencies between specific hardware architectureand software systems to achieve
HPC versus HTC differences ANSWER: HTC = High Throughput Computing
Cloud Computing and Grid Computing 360-Degree Compared
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
546 CHAPTER 9 Ubiquitous Clouds and the Internet of Things
Accepted Manuscript
AcceptedManuscript