Sciweavers

6195 search results - page 19 / 1239
» Cloud Computing Security
Sort
View
KDD
2008
ACM
274views Data Mining» more  KDD 2008»
16 years 2 months ago
Data mining using high performance data clouds: experimental studies using sector and sphere
We describe the design and implementation of a high performance cloud that we have used to archive, analyze and mine large distributed data sets. By a cloud, we mean an infrastruc...
Robert L. Grossman, Yunhong Gu
127
Voted
PROCEDIA
2010
104views more  PROCEDIA 2010»
15 years 26 days ago
Composable cost estimation and monitoring for computational applications in cloud computing environments
With the offer from cloud computing providers, scientists have the opportunity to utilize pay-as-you-go resources together with their own and shared resources. However, scientist...
Hong Linh Truong, Schahram Dustdar
NOMS
2010
IEEE
157views Communications» more  NOMS 2010»
15 years 26 days ago
Using resource-level information into nonadditive negotiation models for cloud Market environments
—Markets arise as an efficient way of organising resources in Cloud Computing scenarios. In Cloud Computing Markets, Brokers that represent both Clients and Service Providers me...
Mario Macías, Jordi Guitart
125
Voted
ISCA
2010
IEEE
192views Hardware» more  ISCA 2010»
15 years 7 months ago
NoHype: virtualized cloud infrastructure without the virtualization
Cloud computing is a disruptive trend that is changing the way we use computers. The key underlying technology in cloud infrastructures is virtualization – so much so that many ...
Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby ...
SAC
2011
ACM
14 years 5 months ago
Cloud application logging for forensics
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta...
Raffael Marty