Algorithms for Big Data in Advanced Communication Systems and Cloud Computing
暂无分享,去创建一个
[1] Shingo Yamaguchi,et al. Analysis of Various Security Issues and Challenges in Cloud Computing Environment: A Survey , 2016 .
[2] R. H. Chile,et al. Modeling of Acoustic Wave Absorption in Ocean , 2010 .
[3] Dijiang Huang,et al. Mobile Cloud Computing Taxonomy , 2018 .
[4] Paul Rodrigues,et al. State-of-the-art cloud computing security taxonomies: a classification of security challenges in the present cloud computing environment , 2012, ICACCI '12.
[5] Yaser Jararweh,et al. Internet of surveillance: a cloud supported large-scale wireless surveillance system , 2016, The Journal of Supercomputing.
[6] Kostas E. Psannis,et al. Efficient and secure BIG data delivery in Cloud Computing , 2017, Multimedia Tools and Applications.
[7] George Mastorakis,et al. Efficient entertainment services provision over a novel network architecture , 2016, IEEE Wireless Communications.
[8] Joe Celko. Big Data and Cloud Computing , 2014 .
[9] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[10] Saman A. Zonouz,et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..
[11] Abdullah Gani,et al. A Study on Strategic Provisioning of Cloud Computing Services , 2014, TheScientificWorldJournal.
[12] M. Sasikumar,et al. Data Classification for Achieving Security in Cloud Computing , 2015 .
[13] Shashank Gupta,et al. Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .
[14] A A Izang,et al. Big Data and Cloud Computing Issues , 2016 .
[15] Yutaka Ishibashi,et al. IoT-based surveillance system for ubiquitous healthcare , 2016, IECON 2016 - 42nd Annual Conference of the IEEE Industrial Electronics Society.
[16] Brij B. Gupta,et al. Security challenges in cloud computing: state-of-art , 2017, Int. J. Big Data Intell..
[17] JakoB,et al. 6 Top Tools for Taming Big Data , 2012 .
[18] George Mastorakis,et al. An evaluation of cloud-based mobile services with limited capacity: a linear approach , 2016, Soft Computing.
[19] Franklin Rajkumar. v. Entropy based Robust Watermarking Scheme using Hadamard Transformation Technique , 2011 .
[20] Sachchidanand Singh,et al. Big Data analytics , 2012 .
[21] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[22] Narasimha Rao Vajjhala,et al. Big Data using Cloud Computing - Opportunities for Small and Medium-sized Enterprises , 2016 .
[23] Rajkumar Buyya,et al. A framework for ranking of cloud computing services , 2013, Future Gener. Comput. Syst..
[24] Hai Jin,et al. Differentially Private Online Learning for Cloud-Based Video Recommendation With Multimedia Big Data in Social Networks , 2015, IEEE Transactions on Multimedia.
[25] Sreekanth Rallapalli,et al. Impact of Processing and Analyzing Healthcare Big Data on Cloud Computing Environment by Implementing Hadoop Cluster , 2016 .
[26] Kostas E. Psannis,et al. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: a survey , 2017, Int. J. Netw. Manag..
[27] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[28] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[29] Martin Hilbert,et al. The World’s Technological Capacity to Store, Communicate, and Compute Information , 2011, Science.
[30] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[31] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[32] Stavros Valsamidis,et al. Proposed cloud infrastructure of wearable and ubiquitous medical services , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).
[33] Mohit Bhansali,et al. Enhancing Cloud Computing Security using AES Algorithm , 2013 .