Listing 1 - 10 of 85 | << page >> |
Sort by
|
Choose an application
IoT applications perceive and interact with the environment via smart devices and cloud services. When operating such applications one is faced with the challenge of configuring the smart devices and the cloud services in a manner, which achieves a high data quality at low operational costs. This work supports IoT operators with IoT collection strategies and cost optimization functions for data qualities, which are influenced by the interplay of smart device and cloud service configurations.
Choose an application
"EAI Endorsed Transactions on Industrial Networks and Intelligent Systems is an open access, peer-reviewed scholarly journal focused on ubiquitous computing, cloud computing, and cyber-physical system, all kinds of networks in large-scale factories, including a lot of traditional and new industries."
Choose an application
"The EAI Endorsed Transactions on Cloud System (ToCS) is an international venue for publishing innovative and cutting edge results on the convergence of next-generation technologies and methodologies reshaping our way of living. The emerging converged platform for growth and innovation is built on four technology pillars: mobile computing, cloud services, big data and analytics, and social networking."
Choose an application
Is software dead? Services like Google, Dropbox, Adobe Creative Cloud, or Social Media apps are all-pervasive in our digital media landscape. This marks the (re)emergence of the service paradigm that challenges traditional business and license models as well as modes of media creation and use. The short essays in this edited collection discuss how services shift the notion of software, the cultural technique of programming, conditions of labor as well as the ecology and politics of data and how they influence dispositifs of knowledge.
Choose an application
Cloud computing is an emerging discipline that is changing the way corporate computing is and will be done in the future. Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organisations. There is little, if any, argument about the clear advantages of the cloud and its adoption can and will create substantial business benefits through reduced capital expenditure and increased business agility. However, there is one overwhelming question that is still hindering the adaption of the cloud: Is cloud computing secure? The most simple answer could be 'Yes', if one approaches the cloud in the right way with the correct checks and balances to ensure all necessary security and risk management measures are covered as the consequences of getting your cloud security strategy wrong could be more serious and may severely damage the reputation of organisations.
Cloud computing. --- Computer networks --- Security measures.
Choose an application
This book focuses on recent developments in new industrial platforms, with Industry 4.0 on its way to becoming Industry 5.0. The book covers smart decision support systems for green and sustainable machining, microscale machining, cyber-physical production networks, and the optimization of assembly lines. The modern multiobjective algorithms and multicriteria decision-making methods are applied to various real-world industrial problems. The emerging problem of cybersecurity in advanced technologies is addressed as well.
Computer engineering. --- Technological innovations. --- Cloud computing.
Choose an application
This book presents a unique and diversified collection of research work ranging from controlling the activities in virtual world to optimization of productivity in games, from collaborative recommendations to populate an open computational environment with autonomous hypothetical reasoning, and from dynamic health portal to measuring information quality, correctness, and readability from the web.
Web services. --- Application software --- Cloud computing --- Computer architecture & logic design
Choose an application
Small and Medium size Companies (SME) are facing threats on a daily basis. Even if 94% of German SMEs are regularly backing up their data, only 50% use a different datacenter provider for protecting critical business processes with a disaster recovery system. The goal of this thesis is it to describe a new method for providing a disaster recovery system within the Cloud.
Choose an application
This book therefore proposes a new philosophy of Grid usage: provide virtual computing environments for Grid users. The new methodology could solve the problems currently encountered by Grid computing. It supports desired computing environments for users, which provide customized hardware/software configuration, QoS assurance and manageable functionality. This philosophy also liberates resource providers from the various onerous tasks of resource management.
virtual machine --- virtual environment --- Grid computing --- cloud computing --- distributed computing
Choose an application
This work addresses the inherent lack of control and trust in Multi-Party Systems at the examples of the Database-as-a-Service (DaaS) scenario and public Distributed Hash Tables (DHTs). In the DaaS field, it is shown how confidential information in a database can be protected while still allowing the external storage provider to process incoming queries. For public DHTs, it is shown how these highly dynamic systems can be managed by facilitating monitoring, simulation, and self-adaptation.
Simulation --- Cloud-Computing --- Peer-to-Peer --- Security --- Data-Outsourcing --- Sicherheit
Listing 1 - 10 of 85 | << page >> |
Sort by
|