-
1
Open source development in the cloud services era
Published 2020-11-01Subjects: “…cloud service…”
Get full text
Article -
2
Research on Architecture and Application of Cloud Service Brokerage
Published 2013-10-01Subjects: “…cloud service brokerage…”
Get full text
Article -
3
Merging Agents and Cloud Services in Industrial Applications
Published 2014-01-01Get full text
Article -
4
Mimic cloud service architecture for cloud applications
Published 2021-02-01Subjects: “…mimic cloud service…”
Get full text
Article -
5
The Use of Cloud Services for Creation an Electronic Abstract of Student
Published 2016-06-01Get full text
Article -
6
Cloud Service Selection Using Multicriteria Decision Analysis
Published 2014-01-01“…CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. …”
Get full text
Article -
7
Heterogeneous executor scheduling algorithm for mimic cloud service
Published 2020-03-01Subjects: “…mimic cloud service…”
Get full text
Article -
8
CLOUD SERVICES FOR ORGANIZATION OF STUDENTS’ EDUCATION ACTIVITY CONTROL
Published 2016-12-01Subjects: Get full text
Article -
9
ASSESSING THE EFFICACY OF CLOUD SERVICES FOR DEVELOPING EDUCATIONAL PRESENTATIONS
Published 2023-12-01Subjects: Get full text
Article -
10
Research on the Progress of Certification Regarding on Public Cloud Service
Published 2014-06-01Subjects: Get full text
Article -
11
Overview of the data security and privacy-preserving of mobile cloud services
Published 2013-12-01“…Compared with the traditional cloud services,the mobi cloud services have the characteristics of the mobile interconnected,flexible end-user applications and convenient data access.However,the rich applications of mobile cloud services bring more security and privacy-leaking problems.The basic concepts,applications and security issues of mobile cloud services were shaded light on,and then describes the architecture of security and privacy-preserving was described,some key technologies were studied in this domain,mainly focusing on the research progress of the security protocols and authentication,access control,integrity verification,mobile trusted computing and the privacy-preserving based on encryption,anonymous and confusion,and the advantages and disadvantages were pointed out respectively.Finally,some future research direction were given at the end.…”
Get full text
Article -
12
Research on the cloud services provider-oriented services selection method
Published 2012-09-01“…In order to select services more accurately,firstly,a detailed process for services selection was proposed from the perspective of cloud services providers.Secondly,a services selection mathematical programming model was pro-posed for the selection of cloud services by considering two kinds of factors:QoS attributes and services scheduling re-lated parameters,and the model was solved by the GA-based algorithm.Finally,a case study is conducted to demonstrate the feasibility and effectiveness of the proposed approach.…”
Get full text
Article -
13
Research on dynamic traffic control strategy of IoT cloud service
Published 2018-12-01Subjects: Get full text
Article -
14
Research on metrics models for cloud services information security evaluation
Published 2016-07-01Subjects: “…trusted cloud services…”
Get full text
Article -
15
Scheme of Smart Home Application Control Based on Cloud Service
Published 2015-11-01Subjects: Get full text
Article -
16
Research of Green Supervision and Service Project System Based on the Cloud Service
Published 2013-05-01Subjects: Get full text
Article -
17
Investigation on Typical Cases of the Ground Information Port Based on Cloud Service
Published 2021-09-01Subjects: Get full text
Article -
18
Algorithm for the cloud service workflow scheduling with setup time and deadline constraints
Published 2015-06-01Subjects: “…cloud service…”
Get full text
Article -
19
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…Security is essential for protecting data and cloud resources from malicious activity. A cloud service provider is utilized to provide secure data storage services. …”
Get full text
Article -
20
Determining substitutability of cloud services supported by semantically extended type theory
Published 2016-02-01Subjects: “…cloud service…”
Get full text
Article