Skip to main content

and
Your search also matched 9 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

An Efficient Scheme for Fault-Tolerant Web Page Access in Wireless Mobile Environment Based on Mobile Agents

Include preview-only content
  1. Article

    Open Access

    Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds

    Cloud computing has emerged as a promising paradigm for meeting the growing resource demands of Internet of Things (IoT) devices. Meanwhile, with the popularity of mobile aerial base stations, Unmanned Aerial ...

    Yu Zhou, Hui Ge, Bowen Ma, Shuhang Zhang, Jiwei Huang in Journal of Cloud Computing (2022)

  2. Article

    Open Access

    Memory sharing for handling memory overload on physical machines in cloud data centers

    Over-committing computing resources is a widely adopted strategy for increased cluster utilization in Infrastructure as a Service (IaaS) cloud data centers. A potential consequence of over-committing computing...

    Yaozhong Ge, Yu-Chu Tian, Zu-Guo Yu, Weizhe Zhang in Journal of Cloud Computing (2023)

  3. Article

    Open Access

    FSPLO: a fast sensor placement location optimization method for cloud-aided inspection of smart buildings

    With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Min Yang, Chengmin Ge, **aoran Zhao, Huaizhen Kou in Journal of Cloud Computing (2023)

  4. Article

    Open Access

    Access control scheme based on blockchain and attribute-based searchable encryption in cloud environment

    With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, **gya Xu in Journal of Cloud Computing (2023)