Sciweavers

6195 search results - page 28 / 1239
» Cloud Computing Security
Sort
View
CORR
2008
Springer
145views Education» more  CORR 2008»
15 years 2 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
CHI
2009
ACM
15 years 10 days ago
Semantically structured tag clouds: an empirical evaluation of clustered presentation approaches
Tag clouds have become a frequently used interaction technique in the web. Recently several approaches to present tag clouds with the tags semantically clustered have been propose...
Johann Schrammel, Michael Leitner, Manfred Tscheli...
CORR
2011
Springer
212views Education» more  CORR 2011»
14 years 6 months ago
Decision Support Tools for Cloud Migration in the Enterprise
— This paper describes two tools that aim to support decision making during the migration of IT systems to the cloud. The first is a modeling tool that produces cost estimates of...
Ali Khajeh-Hosseini, Ian Sommerville, Jurgen Bogae...
CCS
2010
ACM
15 years 2 months ago
Efficient provable data possession for hybrid clouds
Provable data possession is a technique for ensuring the integrity of data in outsourcing storage service. In this paper, we propose a cooperative provable data possession scheme ...
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Ho...
MIDDLEWARE
2010
Springer
15 years 28 days ago
Adapting Distributed Real-Time and Embedded Pub/Sub Middleware for Cloud Computing Environments
Enterprise distributed real-time and embedded (DRE) publish/subscribe (pub/sub) systems manage resources and data that are vital to users. Cloud computing—where computing resourc...
Joe Hoffert, Douglas C. Schmidt, Aniruddha S. Gokh...