Search
Search Results
-
Application of Risk Assessment Model of Accounting Resource Sharing Management in Education and Teaching
The management is a method that helps to determine the risk level of each business unit and evaluate the probability of loss. It can be used as an... -
Embedded Security-Critical Device Resource Isolation
At present, embedded devices have been widely used in people’s daily life, which makes more convenience for the public. However, embedded devices... -
Research on Data Fault-Tolerance Method Based on Disk Bad Track Isolation
Disk is not only an important carrier to save data, but also a key component of storage system. It is of great significance to improve the... -
Resource provisioning for containerized applications
Elasticity is an important feature of cloud computing, which allocates/de-allocates adequate computing resources automatically and provisions and...
-
Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach
Effective quality management plays a pivotal role in ensuring the smooth operation of smart city systems, which have significant implications for...
-
Resource Modeling of Power Communication Packet Optical Transport Network
With the explosive growth of information, data traffic has gradually become the main body occupying the communication network, and the grou** of... -
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers
Internet of Things (IoT) is becoming a crucial requirement for linking numerous physical devices or gadgets to the web. Due to large volume of data...
-
An Experimental Analysis of Function Performance with Resource Allocation on Serverless Platform
Serverless computing is currently receiving much attention from both academia and industry. It has a straightforward interface that abstracts the... -
AI-Based Assistance for Management of Oral Community Knowledge in Low-Resource and Colloquial Kannada Language
Knowledge in rural communities is largely created, preserved, and is transferred verbally, and it is limited. This information is valuable to these... -
Lightweight Authentication Encryption to Improve DTLS, Quark Combined with Overhearing to Prevent DoS and MITM on Low-Resource IoT Devices
This research has provided an overview of the Internet of Things (IoT) and performed an overall analysis of security protocols and available... -
Automated Validation of State-Based Client-Centric Isolation with TLA \(^+\)
Clear consistency guarantees on data are paramount for the design and implementation of distributed systems. When implementing distributed... -
Dynamic Resource Slicing for Service Provisioning
In this chapter, an E2E resource slicing framework for both 5G core and wireless networks is proposed. For the 5G core networks, we study how... -
Security Threats in Cloud Rooted from Machine Learning-Based Resource Provisioning Systems
Resources provisioning on the cloud is problematic due to heterogeneous resources and diverse applications. The complexity of such tasks can be... -
Secure Ownership Transfer for Resource Constrained IoT Infrastructures
Internet of Things or IoT deployments are becoming more and more common. The list of use-cases for IoT is getting longer and longer, but some... -
Online reconfiguration of regularity-based resource partitions in cyber-physical systems
We consider the problem of resource provisioning for real-time cyber-physical applications in an open system environment where there does not exist a...
-
Hestia: A Cost-Effective Multi-dimensional Resource Utilization for Microservices Execution in the Cloud
It is well-known that effective resource utilization is a critical factor in providing high quality microservicess in cloud computing. In a... -
GPU-aware resource management in heterogeneous cloud data centers
The power of rapid scalability and easy maintainability of cloud services is driving many high-performance computing applications from company server...
-
A Multi-objective Level-Based Learning Swarm Optimization Algorithm with Preference for Epidemic Resource Allocation
Epidemics like COVID-19 seriously threaten public health. How to control the spread of epidemics has long been an important topic that attracts a... -
Human Resource Social Insurance Data Dynamic Update System Based on Wireless Communication
The current human resource social insurance data updating system cannot realize real-time data transmission, which leads to its low efficiency.... -
Efficient resource utilization using multi-step-ahead workload prediction technique in cloud
The demand of cloud-based services is growing rapidly due to the high scalability and cost-effective nature of cloud infrastructure. As a result, the...