An Efficient Virtual Machine Scheduling Technique in Cloud Computing Environment
暂无分享,去创建一个
[1] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[2] Rajkumar Buyya,et al. CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[3] Jianhua Gu,et al. An Optimized Control Strategy for Load Balancing Based on Live Migration of Virtual Machine , 2011, 2011 Sixth Annual Chinagrid Conference.
[4] S Subramanian,et al. AN ADAPTIVE ALGORITHM FOR DYNAMIC PRIORITY BASED VIRTUAL MACHINE SCHEDULING IN CLOUD , 2012 .
[5] Zhuzhong Qian,et al. Balancing Resource Utilization for Continuous Virtual Machine Requests in Clouds , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[6] Will Gersch,et al. AR model prediction of time series with trends and seasonalities: A contrast with Box-Jenkins modeling , 1980, 1980 19th IEEE Conference on Decision and Control including the Symposium on Adaptive Processes.
[7] Tim Wright,et al. Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online , 2009 .
[8] Rajkumar Buyya,et al. Cloud Computing Principles and Paradigms , 2011 .
[9] Chen Jing,et al. A dynamic and integrated load-balancing scheduling algorithm for Cloud datacenters , 2011, 2011 IEEE International Conference on Cloud Computing and Intelligence Systems.
[10] Arun Venkataramani,et al. Black-box and Gray-box Strategies for Virtual Machine Migration , 2007, NSDI.
[11] Anirudha Sahoo,et al. On Theory of VM Placement: Anomalies in Existing Methodologies and Their Mitigation Using a Novel Vector Based Approach , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[12] Rajkumar Buyya,et al. Energy-Efficient Management of Data Center Resources for Cloud Computing: A Vision, Architectural Elements, and Open Challenges , 2010, PDPTA.
[13] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[14] Tim Mather,et al. Cloud Security and Privacy , 2023, International Journal for Research in Applied Science and Engineering Technology.
[15] Rajkumar Buyya,et al. CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..
[16] Rajkumar Buyya,et al. Adaptive threshold-based approach for energy-efficient consolidation of virtual machines in cloud data centers , 2010, MGC '10.