• No results found

[PDF] Top 20 A Virtualization-based Approach to Dependable Service Computing

Has 10000 "A Virtualization-based Approach to Dependable Service Computing" found on our website. Below are the top 20 most common "A Virtualization-based Approach to Dependable Service Computing".

A Virtualization-based Approach to Dependable Service Computing

A Virtualization-based Approach to Dependable Service Computing

... recovery virtualization has lately enjoyed a great surge of ...analysis, based on combinatorial modeling, show that unless certain conditions ...met, virtualization could in fact decrease the ... See full document

14

Research, Implementations and Issues on Cloud Computing

Research, Implementations and Issues on Cloud Computing

... process-aware service-based delivery,and an ability to audit processes, data and ...Component-based approach is characterized by [13, 28] reusability (elements can be re-usedin other ... See full document

7

RFID, Mobile

RFID, Mobile

... ubiquitous computing with RFID technologies currently, and have evolved from many studies and being advanced to the ...a service-oriented sensor ontology which enables services based on ... See full document

7

Another look at the middleware for dependable distributed computing

Another look at the middleware for dependable distributed computing

... distributed computing developed during the 1980s and 1990s ...standards based middleware such as CORBA and Java ...networked computing is being used for business and social uses is undergoing rapid ... See full document

11

Infrastructure as a Service with Profit Maximization Scheme for Providing Better Quality of Service Using Cloud Computing

Infrastructure as a Service with Profit Maximization Scheme for Providing Better Quality of Service Using Cloud Computing

... the computing resources and computing services are the factors leading to the rapid growth of cloud ...pools, virtualization, and higher availability of resources are provided by cloud ...Virtual ... See full document

8

A SECURITY FRAMEWORK FOR VIRTUALIZATION BASED COMPUTING ENVIRONMENT

A SECURITY FRAMEWORK FOR VIRTUALIZATION BASED COMPUTING ENVIRONMENT

... As we know that ftp works on port no.21 and likewise ssh in port no.22 and tcp on port no.80[13]. Filtering inbound traffic is known as ingress filtering. Outgoing traffic can also be filtered, a process referred to as ... See full document

7

Iterative MapReduce Enabling HPC Cloud Interoperability

Iterative MapReduce Enabling HPC Cloud Interoperability

... IT Service and Relationship Management Scalable Fault Resilience Techniques for Large Computing New and Innovative Pedagogical Approaches Data grid & Semantic web Peer to peer computing Autonomic ... See full document

81

FLEXIBLE DISTRIBUTED STORAGE INTEGRITY AUDITING MECHANISM TO ACHIEVE A SECURE AND DEPENDABLE CLOUD STORAGE SERVICE IN CLOUD COMPUTING

FLEXIBLE DISTRIBUTED STORAGE INTEGRITY AUDITING MECHANISM TO ACHIEVE A SECURE AND DEPENDABLE CLOUD STORAGE SERVICE IN CLOUD COMPUTING

... paradigm based on a large number of commodity Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and ... See full document

12

Virtualization Foundation of Cloud Computing

Virtualization Foundation of Cloud Computing

... through virtualization. Virtualization is key concept of cloud on which this whole technology is ...based. Virtualization is process of creating fictitious image of software and hardware, ... See full document

5

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

Group Based Load Balancing Algorithm in Cloud Computing Virtualization

... cloud computing. Load balancing algorithms are basic approach to optimized resource ...is based on a group based allocation ...group based on type of task and the configuration of the ... See full document

5

An automated wrapper based approach to the design of dependable software

An automated wrapper based approach to the design of dependable software

... be dependable [1]. It has been shown that a dependable software must contain two types of artefact; (i) error detection mechanisms (EDMs) and (ii) error recov- ery mechanisms (ERMs) [2], where EDMs are ... See full document

9

Data Leakage Detection and Dependable Storage Service In Cloud Computing

Data Leakage Detection and Dependable Storage Service In Cloud Computing

... Cloud Computing, which is an Internet-based development and use of computer ...a service (SaaS) computing architecture, are transforming data centers into pools of computing ... See full document

8

A secure virtualization model for cloud computing to defend against distributed denial-of service attacks

A secure virtualization model for cloud computing to defend against distributed denial-of service attacks

... web based attack tools such as Extensible Markup Language (XML) based Denial of Service or even Hypertext Transfer Protocol (HTTP) based Denial-of Service attack which have simple ... See full document

35

A Survey on Cloud Computing Virtualization

A Survey on Cloud Computing Virtualization

... (LWIVManager) based on the deep investigation on virtualization technique especially on Xen, the design and implement of a LWIVManager provides an easy use and integration way to allocate the ... See full document

6

Authorized Service for Content Based Publish or Subscribe Systems

Authorized Service for Content Based Publish or Subscribe Systems

... content-primarily based put up/subscribe gadget, authentication is tough to obtain on account that there exists no robust bonding between the give up ...and dependable occasion matching provider for ... See full document

7

Title: Survey on Dynamic Resource Allocation Techniques in Cloud Environment

Title: Survey on Dynamic Resource Allocation Techniques in Cloud Environment

... cloud computing infrastructures carries innovative ways to make and control computing system by means of the flexibility present with virtualization ...initial virtualization and cloud ... See full document

9

MOBILE CLOUD COMPUTING: A SURVEY OF EMERGING ISSUES AND FUTURE TRENDS

MOBILE CLOUD COMPUTING: A SURVEY OF EMERGING ISSUES AND FUTURE TRENDS

... cloud computing, there are two categories of cloud services: cloud contents and computing ...constructive approach for online cloud based storage and access management ... See full document

6

A STUDY OF CLOUD MODELS & COMPARISON BETWEEN DIFFERENT CLOUD PLATFORMS

A STUDY OF CLOUD MODELS & COMPARISON BETWEEN DIFFERENT CLOUD PLATFORMS

... Cloud Computing has emerged as a latest domain in terms of technology as well as research ...Cloud computing is also known as fifth utility (along with water, electricity, gas and telephone) which is ... See full document

9

ROLE OF VIRTUALIZATION IN CLOUD COMPUTING

ROLE OF VIRTUALIZATION IN CLOUD COMPUTING

... Based on the basic role of cloud as-pay-you-go, the vendors give you that ability to access these provided virtual machines and in some cases they will make these virtual machines like an actual computer and you ... See full document

8

A Survey on Virtualization and Hypervisor based Technology in Cloud Computing Environment

A Survey on Virtualization and Hypervisor based Technology in Cloud Computing Environment

... cloud computing. It is one of those fundamental components of cloud computing that allows creation of isolated, customizable and secure execution environment for running different applications without ... See full document

6

Show all 10000 documents...