-
141
Conjunct model of cloud & client computing based on multi-agent
Published 2010-01-01Subjects: Get full text
Article -
142
Cryptographic service optimization scheduling algorithm for collaborative jobs in cloud environment
Published 2024-07-01Subjects: “…cloud computing…”
Get full text
Article -
143
Cloud computing node based on Loongson multi-core CPU
Published 2013-12-01Subjects: Get full text
Article -
144
Scheduling framework based on reinforcement learning in online-offline colocated cloud environment
Published 2023-06-01Subjects: Get full text
Article -
145
Provable data possession scheme with authentication
Published 2016-10-01Subjects: Get full text
Article -
146
DataLab as a Service: Distributed Computing Framework for Multi-Interactive Analysis Environments
Published 2025-01-01Subjects: Get full text
Article -
147
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01Subjects: “…cloud computing…”
Get full text
Article -
148
Comprehensive Survey of Big Data Mining Approaches in Cloud Systems
Published 2021-04-01Subjects: “…Big Data, Data Computing, Big Data Mining, Cloud Computing…”
Get full text
Article -
149
Distributed game theoretic approach for offloading in ad hoc cloud
Published 2017-11-01Subjects: “…ad hoc mobile cloud computing…”
Get full text
Article -
150
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01Subjects: Get full text
Article -
151
A General Network Architecture Design of Large-Scale Cloud Data Center Based on Service Switch
Published 2013-10-01Subjects: Get full text
Article -
152
Research on Security of Virtualization on Cloud Computing
Published 2015-06-01Subjects: “…cloud computing…”
Get full text
Article -
153
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Published 2017-09-01Subjects: Get full text
Article -
154
Wireless Catching and Transferring System of Next Generation Network
Published 2014-04-01Subjects: Get full text
Article -
155
Trusted cloud platform management model based onTPMalliance
Published 2016-02-01Subjects: Get full text
Article -
156
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: “…mobile cloud computing…”
Get full text
Article -
157
UCAP:a PCL secure user authentication protocol in cloud computing
Published 2018-08-01Subjects: “…cloud computing…”
Get full text
Article -
158
Cloud computing forensic model
Published 2017-09-01Subjects: “…cloud computing…”
Get full text
Article -
159
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01Subjects: Get full text
Article -
160
A Verifiable and Secure Industrial IoT Data Deduplication Scheme With Real-Time Data Integrity Checking in Fog-Assisted Cloud Environments
Published 2025-01-01Subjects: Get full text
Article