Web Service Composition in multi-cloud environment: A bi-objective genetic optimization algorithm
暂无分享,去创建一个
[1] Maria Luisa Villani,et al. An approach for QoS-aware service composition based on genetic algorithms , 2005, GECCO '05.
[2] Fuyuki Ishikawa,et al. Towards network-aware service composition in the cloud , 2012, WWW.
[3] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[4] Yang Yang,et al. A genetic-based approach to web service composition in geo-distributed cloud environment , 2015, Comput. Electr. Eng..
[5] Yixin Chen,et al. AI Planning and Combinatorial Optimization for Web Service Composition in Cloud Computing , 2010 .
[6] Amin Jula,et al. Cloud computing service composition: A systematic literature review , 2014, Expert Syst. Appl..
[7] Ayaz Isazadeh,et al. QoS-aware service composition in cloud computing using data mining techniques and genetic algorithm , 2017, The Journal of Supercomputing.
[8] Ali Mili,et al. Quantifying security threats and their potential impacts: a case study , 2010, Innovations in Systems and Software Engineering.
[9] Mara Nikolaidou,et al. An Integrated Approach to Automated Semantic Web Service Composition through Planning , 2012, IEEE Transactions on Services Computing.
[10] Praveenkumar Kumar,et al. Selection of Multi-Cloud Storage Using Cost Based Approach , 2013 .
[11] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[12] Ali Mili,et al. A cybersecurity model in cloud computing environments , 2013, J. King Saud Univ. Comput. Inf. Sci..
[13] Xiaomeng Su,et al. A Survey of Automated Web Service Composition Methods , 2004, SWSWPC.
[14] Bin Li,et al. Ant colony optimization applied to web service compositions in cloud computing , 2015, Comput. Electr. Eng..
[15] Heba Kurdi,et al. A combinatorial optimization algorithm for multiple cloud service composition , 2015, Comput. Electr. Eng..
[16] Frank Leymann,et al. Service-Oriented Computing , 2008, Lecture Notes in Computer Science.
[17] Frank Gens,et al. Cloud Computing Benefits, risks and recommendations for information security , 2010 .