• Nenhum resultado encontrado

[PDF] Top 20 A novel erasure based data transmission for cloud storage

Has 10000 "A novel erasure based data transmission for cloud storage" found on our website. Below are the top 20 most common "A novel erasure based data transmission for cloud storage".

A novel erasure based data transmission for cloud storage

A novel erasure based data transmission for cloud storage

... $EVWUDFW² :LWK WKH FRQWLQXRXV JURZWK LQ WKH FORXG EDVHG DSSOLFDWLRQV DQG VWRUDJH UHTXLUHPHQWV RQ FORXG PDQ\ FRPPHUFLDO FORXG EDVHG VWRUDJH VHUYLFH SURYLGHUV DUH PDNLQJ WKH PDUNHW PRUH FR[r] ... See full document

10

REVIEWING SOME PLATFORMS IN CLOUD COMPUTING

REVIEWING SOME PLATFORMS IN CLOUD COMPUTING

... business cloud models rapidly evolved to harness the technology by providing computing infrastructure, data-storage, software applications and programming platforms as ...inside cloud ... See full document

6

 Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)

... toward cloud-based enterprise ...the cloud model is being so widely ...of cloud services ultimately depends on the acceptance of the offering by the user ... See full document

5

Guaranteeing Data Storage Security in Cloud Computing

Guaranteeing Data Storage Security in Cloud Computing

... of Cloud Computing, which is an Internet-based advancement and utilization of PC ...system transmission capacity and solid yet adaptable system associations make it even conceivable that clients can ... See full document

4

Cloud Storage and its Secure Overlay Techniques

Cloud Storage and its Secure Overlay Techniques

... the data are stored encrypted and all key distribution is handled in a decentralized manner ...unauthorized data modifications, to differentiate between read and write access to files and to change user’s ... See full document

5

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

Privacy-Enhanced Dependable and Searchable Storage in a Cloud-of-Clouds

... existing cloud providers and a connector for a network file system. Cloud-RAID provides privacy, availability, integrity and avoids the vendor lock-in while also adjusting dynamically in which clouds should ... See full document

112

Review of Access Control Models for Cloud Computing

Review of Access Control Models for Cloud Computing

... of cloud computing environments), and rely solely on identity or capability-based access ...are based on the threshold (i.e. the trust level) established based on the requestor’s access ... See full document

9

Data Mining-driven Manufacturing Process Optimization

Data Mining-driven Manufacturing Process Optimization

... execution data available for the novel process, similarity inspections of existing process- es have to be conducted to derive corresponding ...process. Based on the current state of a running process ... See full document

7

J. Microw. Optoelectron. Electromagn. Appl.  vol.16 número2

J. Microw. Optoelectron. Electromagn. Appl. vol.16 número2

... Design and development of a compact CRLH TL based UWB BPF is presented in this paper. The CRLH TL is designed on coupling of two unit-cells of via-less CRLH TL. The filter is compact in size 11.9 x 6 mm 2 and ... See full document

15

Caracterização de tráfego de rede : Cloud Storage na Universidade do Minho

Caracterização de tráfego de rede : Cloud Storage na Universidade do Minho

... O terceiro serviço mais requisitado diz respeito à Google. A Google Inc, começou por dis- ponibilizar um motor de busca, mas depressa cresceu e hoje disponibiliza aos seus utilizadores desde software de produtividade ... See full document

121

Computer Based Asset Management System For Commercial Banks

Computer Based Asset Management System For Commercial Banks

... because of the need for permeable and flexible boundaries in an organization‘s decision-making and because communication between the various levels is paramount for the overall success of the management process. The ... See full document

7

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

... a novel outsourced image recovery service (TISR) architecture with privacy ...of data acquisition at data owner side, TISR is specifically designed under the compressed sensing ...from data ... See full document

5

A Novel K-Means Based Clustering Algorithm for High Dimensional Data Sets

A Novel K-Means Based Clustering Algorithm for High Dimensional Data Sets

... Abstract- Data clustering is an unsupervised method for extraction hidden pattern from huge data ...dimensional data sets with enormous number of samples is a challenging ...dimensional data ... See full document

5

MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

MQARR-AODV: A NOVEL MULTIPATH QOS AWARE RELIABLE REVERSE ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORKS

... a novel multipath QoS-aware reliable reverse on-demand distance vector routing protocol (MQARR-AODV) for MANET has been ...the data transmission along the two paths in ...the data ... See full document

5

Securing Data Transfer in Cloud Environment

Securing Data Transfer in Cloud Environment

... the cloud is the lack of trust on the cloud provider. The cloud provider, in turn, also needs to enforce strict security policies, which in turn requires additional trust in the ...and cloud ... See full document

5

Aeration strategy for controlling grain storage based on simulation and on real data acquisition

Aeration strategy for controlling grain storage based on simulation and on real data acquisition

... grain storage, electrical energy saving, data simulations and data ...real data, it can be used in different regions, during different seasons and with different aeration systems, ... See full document

7

Influences of in-cloud aerosol scavenging parameterizations on aerosol concentrations and wet deposition in ECHAM5-HAM

Influences of in-cloud aerosol scavenging parameterizations on aerosol concentrations and wet deposition in ECHAM5-HAM

... Predicted aerosol concentrations, burdens and deposition have been compared between simulations that implemented the new diagnostic scheme, the prescribed scavenging fractions of the standard ECHAM5-HAM, and the prog- ... See full document

33

A new meta-data driven data-sharing storage model for SaaS

A new meta-data driven data-sharing storage model for SaaS

... default data model to address tenant ’s unique ...actual data and reconstructing an n-column logical source table requires (n−1) aligning joins along the Row ...the data model arbitrarily extensible ... See full document

6

Data storage system for wireless sensor networks

Data storage system for wireless sensor networks

... and transmission of notifica- tions, from different clients and servers, to be carefully planned so that energy saving and bandwidth utilization is ...for data/notification storage is ... See full document

73

Mapping tropical forest biomass with radar and spaceborne LiDAR: overcoming problems of high biomass and persistent cloud

Mapping tropical forest biomass with radar and spaceborne LiDAR: overcoming problems of high biomass and persistent cloud

... persistent cloud-cover, we have produced a high resolu- tion (100 m) map of AGB over Lop ´e National Park in ...a novel fusion of radar and spaceborne LiDAR ... See full document

35

Show all 10000 documents...