Resource allocation through optimized three-phase scheduled VMs by grey wolf optimization and introspection security analysis
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Cloud resource allocation schemes: review, taxonomy, and opportunities , 2017, Knowledge and Information Systems.
[2] M. Sridhar. Hybrid Genetic Swarm Scheduling for Cloud Computing , 2015 .
[3] Niraj K. Jha,et al. A Trusted Virtual Machine in an Untrusted Management Environment , 2012, IEEE Transactions on Services Computing.
[4] Rajkumar Buyya,et al. Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing , 2012, Future Gener. Comput. Syst..
[5] V. Kavitha,et al. A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..
[6] Ritu Aggarwal,et al. Resource Provisioning and Resource Allocation in Cloud Computing Environment , 2018 .
[7] Yongzhao Zhan,et al. Virtualization and Cloud Computing , 2019, CompTIA® A+® Complete Practice Tests.
[8] Shahaboddin Shamshirband,et al. BSS: block-based sharing scheme for secure data storage services in mobile cloud environment , 2014, The Journal of Supercomputing.
[9] D Arivudainambi,et al. Scheduling Optimized Secured Virtual Machine Using Cuckoo Search and Flow Analyzer , 2017 .
[10] Odej Kao,et al. Exploiting Dynamic Resource Allocation for Efficient Parallel Data Processing in the Cloud , 2011, IEEE Transactions on Parallel and Distributed Systems.
[11] P. Jayarekha,et al. Load Balancing with Optimal Cost Scheduling Algorithm , 2014, 2014 International Conference on Computation of Power, Energy, Information and Communication (ICCPEIC).
[12] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[13] Kai Hwang,et al. Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.
[14] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[15] Roberto Di Pietro,et al. Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..
[16] Kevin Lee,et al. Empirical prediction models for adaptive resource provisioning in the cloud , 2012, Future Gener. Comput. Syst..
[17] Nicola Cordeschi,et al. FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method , 2014, Cluster Computing.
[18] Rolf Stadler,et al. Resource Management in Clouds: Survey and Research Challenges , 2015, Journal of Network and Systems Management.
[19] Wei Tan,et al. Self-Adaptive Learning PSO-Based Deadline Constrained Task Scheduling for Hybrid IaaS Cloud , 2014, IEEE Transactions on Automation Science and Engineering.
[20] Sunilkumar S. Manvi,et al. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey , 2014, J. Netw. Comput. Appl..
[21] Dimitrios Katsaros,et al. Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach , 2011, Journal of Grid Computing.
[22] Shahaboddin Shamshirband,et al. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.
[23] Martin Gilje Jaatun,et al. Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..
[24] Nicola Blefari-Melazzi,et al. An Approach to Balance Maintenance Costs and Electricity Consumption in Cloud Data Centers , 2018, IEEE Transactions on Sustainable Computing.
[25] Meikang Qiu,et al. High reliable real-time bandwidth scheduling for virtual machines with hidden Markov predicting in telehealth platform , 2015, Future Gener. Comput. Syst..
[26] Jin-Soo Kim,et al. Energy Reduction in Consolidated Servers through Memory-Aware Virtual Machine Scheduling , 2011, IEEE Transactions on Computers.
[27] M. Sridhar,et al. Hybrid Particle Swarm Optimization scheduling for cloud computing , 2015, 2015 IEEE International Advance Computing Conference (IACC).
[28] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[29] Paul T. Jaeger,et al. Identifying the security risks associated with governmental use of cloud computing , 2010, Gov. Inf. Q..
[30] Abdelkader H. Ouda,et al. Resource allocation in a network-based cloud computing environment: design challenges , 2013, IEEE Communications Magazine.