We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Application of Risk Assessment Model of Accounting Resource Sharing Management in Education and Teaching

    The management is a method that helps to determine the risk level of each business unit and evaluate the probability of loss. It can be used as an...
    Conference paper 2023
  2. Embedded Security-Critical Device Resource Isolation

    At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices...
    Xuguo Wang, Shengzhe Kan, Yeli Xu in Cyber Security
    Conference paper Open access 2020
  3. Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation

    Disk is not only an important carrier to save data, but also a key component of storage system. It is of great significance to improve the...
    Xu Zhang, Li Zheng, Sujuan Zhang in Smart Computing and Communication
    Conference paper 2022
  4. Resource provisioning for containerized applications

    Elasticity is an important feature of cloud computing, which allocates/de-allocates adequate computing resources automatically and provisions and...

    Mahendra Pratap Yadav, Nisha Pal, Dharmendra Kumar Yadav in Cluster Computing
    Article 13 May 2021
  5. Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach

    Effective quality management plays a pivotal role in ensuring the smooth operation of smart city systems, which have significant implications for...

    Francisco Airton Silva, Iure Fé, ... Tuan Anh Nguyen in Cluster Computing
    Article 20 February 2024
  6. Resource Modeling of Power Communication Packet Optical Transport Network

    With the explosive growth of information, data traffic has gradually become the main body occupying the communication network, and the grou** of...
    Zhi**n Lu, LianYu Fu, ... **Yang Yin in Smart Computing and Communication
    Conference paper 2022
  7. Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers

    Internet of Things (IoT) is becoming a crucial requirement for linking numerous physical devices or gadgets to the web. Due to large volume of data...

    P. S. Nandhini, S. Kuppuswami, ... R. DeviPriya in The Journal of Supercomputing
    Article 16 November 2022
  8. An Experimental Analysis of Function Performance with Resource Allocation on Serverless Platform

    Serverless computing is currently receiving much attention from both academia and industry. It has a straightforward interface that abstracts the...
    Yonghe Zhang, Kejiang Ye, Cheng-Zhong Xu in Cloud Computing – CLOUD 2021
    Conference paper 2022
  9. AI-Based Assistance for Management of Oral Community Knowledge in Low-Resource and Colloquial Kannada Language

    Knowledge in rural communities is largely created, preserved, and is transferred verbally, and it is limited. This information is valuable to these...
    M. Aparna, Sharath Srivatsa, ... Srinath Srinivasa in Big Data Analytics in Astronomy, Science, and Engineering
    Conference paper 2024
  10. Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices

    This research has provided an overview of the Internet of Things (IoT) and performed an overall analysis of security protocols and available...
    Satyam Mishra, Vu Minh Phuc, Nguyen Van Tanh in Internet of Things – ICIOT 2022
    Conference paper 2023
  11. Automated Validation of State-Based Client-Centric Isolation with TLA \(^+\)

    Clear consistency guarantees on data are paramount for the design and implementation of distributed systems. When implementing distributed...
    Tim Soethout, Tijs van der Storm, Jurgen J. Vinju in Software Engineering and Formal Methods. SEFM 2020 Collocated Workshops
    Conference paper 2021
  12. Dynamic Resource Slicing for Service Provisioning

    In this chapter, an E2E resource slicing framework for both 5G core and wireless networks is proposed. For the 5G core networks, we study how...
    Chapter 2021
  13. Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems

    Resources provisioning on the cloud is problematic due to heterogeneous resources and diverse applications. The complexity of such tasks can be...
    Hosein Mohammadi Makrani, Hossein Sayadi, ... Houman Homayoun in Silicon Valley Cybersecurity Conference
    Conference paper 2022
  14. Secure Ownership Transfer for Resource Constrained IoT Infrastructures

    Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some...
    Martin Gunnarsson, Christian Gehrmann in Information Systems Security and Privacy
    Conference paper 2022
  15. Online reconfiguration of regularity-based resource partitions in cyber-physical systems

    We consider the problem of resource provisioning for real-time cyber-physical applications in an open system environment where there does not exist a...

    Wei-Ju Chen, Peng Wu, ... Song Han in Real-Time Systems
    Article 01 March 2021
  16. Hestia: A Cost-Effective Multi-dimensional Resource Utilization for Microservices Execution in the Cloud

    It is well-known that effective resource utilization is a critical factor in providing high quality microservicess in cloud computing. In a...
    Jiahua Huang, Kenneth B. Kent, ... Yang Wang in Cloud Computing – CLOUD 2022
    Conference paper 2022
  17. GPU-aware resource management in heterogeneous cloud data centers

    The power of rapid scalability and easy maintainability of cloud services is driving many high-performance computing applications from company server...

    Ashwin Kumar Kulkarni, B. Annappa in The Journal of Supercomputing
    Article 08 April 2021
  18. A Multi-objective Level-Based Learning Swarm Optimization Algorithm with Preference for Epidemic Resource Allocation

    Epidemics like COVID-19 seriously threaten public health. How to control the spread of epidemics has long been an important topic that attracts a...
    Guo Yang, Xuan-Li Shi, ... Wei-Neng Chen in Computer Supported Cooperative Work and Social Computing
    Conference paper 2023
  19. Human Resource Social Insurance Data Dynamic Update System Based on Wireless Communication

    The current human resource social insurance data updating system cannot realize real-time data transmission, which leads to its low efficiency....
    Conference paper 2022
  20. Efficient resource utilization using multi-step-ahead workload prediction technique in cloud

    The demand of cloud-based services is growing rapidly due to the high scalability and cost-effective nature of cloud infrastructure. As a result, the...

    Sounak Banerjee, Sarbani Roy, Sunirmal Khatua in The Journal of Supercomputing
    Article 09 March 2021
Did you find what you were looking for? Share feedback.