Cloud Computing: A Business and Economical Perspective
暂无分享,去创建一个
[1] Rajkumar Buyya,et al. Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters , 2009, HPDC '09.
[2] Geoffrey C. Fox,et al. High Performance Parallel Computing with Clouds and Cloud Technologies , 2009, CloudComp.
[3] Ali Khajeh-Hosseini,et al. Research Agenda in Cloud Technologies , 2010, ArXiv.
[4] L. Youseff,et al. Toward a Unified Ontology of Cloud Computing , 2008, 2008 Grid Computing Environments Workshop.
[5] Markus Klems,et al. Do Clouds Compute? A Framework for Estimating the Value of Cloud Computing , 2008, WEB.
[6] Christof Weinhardt,et al. Business Models in the Service World , 2009, IT Professional.
[7] Verena Kantere,et al. An Economic Model for Self-Tuned Cloud Caching , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[8] William Jeremy Robison,et al. Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act , 2010 .
[9] Ian Sommerville,et al. Research Challenges for Enterprise Cloud Computing , 2010, ArXiv.
[10] Aameek Singh,et al. Server-storage virtualization: Integration and load balancing in data centers , 2008, 2008 SC - International Conference for High Performance Computing, Networking, Storage and Analysis.
[11] G. Fenu,et al. An approach to a Cloud Computing network , 2008, 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).
[12] Mark Ryan,et al. Cloud computing privacy concerns on our doorstep , 2011, Commun. ACM.
[13] Chun-Jung Chen,et al. Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.
[14] Hsien-Hsin S. Lee,et al. PROPHET: goal-oriented provisioning for highly tunable multicore processors in cloud computing , 2009, OPSR.
[15] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[16] Bernd Freisleben,et al. On-Demand Resource Provisioning for BPEL Workflows Using Amazon's Elastic Compute Cloud , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[17] Bernd Carsten Stahl,et al. The Ethics of Cloud Computing: A Conceptual Review , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[18] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[19] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[20] Shilpashree Srinivasamurthy,et al. Survey on Cloud Computing Security , 2010 .
[21] Jimmy J. Lin,et al. Where is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing , 2009, First Monday.
[22] Jie Qiu,et al. The Method and Tool of Cost Analysis for Cloud Computing , 2009, 2009 IEEE International Conference on Cloud Computing.
[23] Gang Hu,et al. White Cloud or Black Cloud: Opportunity and Challenge of Spectrum Sharing on Cloud Computing , 2012 .
[24] Alexandru Iosup,et al. A Performance Analysis of EC2 Cloud Computing Services for Scientific Computing , 2009, CloudComp.
[25] Edward Walker,et al. The Real Cost of a CPU Hour , 2009, Computer.
[26] Ali Sajedi Badashian,et al. A Survey of Cloud Platforms and Their Future , 2009, ICCSA.
[27] Cong Wang,et al. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[28] Mary Tate,et al. Where are we at with Cloud Computing?: A Descriptive Literature Review , 2009 .
[29] Keith O'Rourke,et al. Introduction: Rationale, Potentials, and Promise of Systematic Reviews , 2008 .
[30] G. Bruce Berriman,et al. On the Use of Cloud Computing for Scientific Workflows , 2008, 2008 IEEE Fourth International Conference on eScience.
[31] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[32] Scott Hazelhurst,et al. Scientific computing using virtual high-performance computing: a case study using the Amazon elastic computing cloud , 2008, SAICSIT '08.
[33] Eyal de Lara,et al. SnowFlock: rapid virtual machine cloning for cloud computing , 2009, EuroSys '09.
[34] Siani Pearson,et al. Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.
[35] Matt Bishop,et al. Storm Clouds Rising: Security Challenges for IaaS Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[36] Walid G. Aref,et al. A Distributed Access Control Architecture for Cloud Computing , 2012, IEEE Software.
[37] Eli Blevis,et al. The cloud , 2011, INTR.
[38] Ian Sommerville,et al. Decision Support Tools for Cloud Migration in the Enterprise , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[39] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[40] Albert G. Greenberg,et al. The cost of a cloud: research problems in data center networks , 2008, CCRV.
[41] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Autonomic Metered Pricing for a Utility Computing Service , 2022 .
[42] Alexandru Iosup,et al. C-Meter: A Framework for Performance Analysis of Computing Clouds , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[43] Edwin Baker,et al. Hey, you, get off of that cloud? , 2009, Comput. Law Secur. Rev..
[44] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[45] Takuya Suzuki,et al. Security Architectures for Cloud Computing , 2010 .
[46] Paolo Bientinesi,et al. Can cloud computing reach the top500? , 2009, UCHPC-MAW '09.