標(biāo)題: Titlebook: Economics of Grids, Clouds, Systems, and Services; 16th International C Karim Djemame,J?rn Altmann,Maurizio Naldi Conference proceedings 20 [打印本頁] 作者: 決絕 時間: 2025-3-21 16:19
書目名稱Economics of Grids, Clouds, Systems, and Services影響因子(影響力)
書目名稱Economics of Grids, Clouds, Systems, and Services影響因子(影響力)學(xué)科排名
書目名稱Economics of Grids, Clouds, Systems, and Services網(wǎng)絡(luò)公開度
書目名稱Economics of Grids, Clouds, Systems, and Services網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Economics of Grids, Clouds, Systems, and Services被引頻次
書目名稱Economics of Grids, Clouds, Systems, and Services被引頻次學(xué)科排名
書目名稱Economics of Grids, Clouds, Systems, and Services年度引用
書目名稱Economics of Grids, Clouds, Systems, and Services年度引用學(xué)科排名
書目名稱Economics of Grids, Clouds, Systems, and Services讀者反饋
書目名稱Economics of Grids, Clouds, Systems, and Services讀者反饋學(xué)科排名
作者: Paradox 時間: 2025-3-21 21:19
GENEVIZ: A Visual Tool for the Construction and Blockchain-Based Validation of SFC Packagesal Network Functions (VNF) on commercial off-the-shelf hardware. Network operators can create customized network services by chaining multiple VNFs, defining a so-called Service Function Chaining (SFC). Because NFV became technically mature recently, the building of such SFCs still needs in-depth kn作者: 欺騙世家 時間: 2025-3-22 03:30
A Smart Contract Based Recommender Systemhem. In order to alleviate such issue, Recommender Systems (RSs) have been proposed to collect opinions and preferences about a set of items, process such preferences and build a personalized information access..While the most part of current RSs exploit centralized architecture to provide the servi作者: Hirsutism 時間: 2025-3-22 08:14 作者: foreign 時間: 2025-3-22 09:47
Bill Estimation in Simplified Memory Progressive Second Price Auctionsn cloud hardware, namely the social welfare. To maximize the social welfare in vertical elasticity clouds, mechanisms which elicit resource valuation from clients are required. Full Vickrey-Clarke-Groves (VCG) auctions, which allocate resources to optimize the social welfare, are NP-hard and too com作者: 按等級 時間: 2025-3-22 16:26 作者: 按等級 時間: 2025-3-22 18:42 作者: 匯總 時間: 2025-3-22 22:02
Architecture and Business Logic Specification for Dynamic Cloud Federationsf the economies of scale in the cloud service sector. In order for a federation to exist in the commercial market, an efficient mechanism for resource and revenue sharing is of paramount importance. In this paper, we design the architecture and specify the business logic for the dynamic operation of作者: 劇毒 時間: 2025-3-23 01:24
Towards an Architecture Proposal for Federation of Distributed DES Simulatorsas critical: (1) Intensive use of models of the simulated system that can be exploited in all phases of its life cycle where simulation can be used, and methodologies for these purposes; (2) Adaptation of simulation techniques to HPC infrastructures, as a method to improve simulation efficiency and 作者: 大廳 時間: 2025-3-23 07:55 作者: obsession 時間: 2025-3-23 11:49
Sensing as a Service Revisited: A Property Rights Enforcement and Pricing Model for IIoT Data Marketce suggests that industries are suffering a significant loss of value creation from insufficient IIoT data sharing. We argue that the limited utilization of the Sensing as a Service business model is caused by the economic and technological characteristics of sensor data, and the corresponding absen作者: TAIN 時間: 2025-3-23 16:11 作者: 諂媚于人 時間: 2025-3-23 21:59
SEConomy: A Framework for the Economic Assessment of Cybersecurityspective, either directly or indirectly. In this context, it is imperative to understand the significant dependencies between complex and distributed systems (., supply-chain), as well as security and safety risks associated with each actor. This paper proposes SEConomy, a strictly step-based framew作者: 預(yù)兆好 時間: 2025-3-23 22:15 作者: 采納 時間: 2025-3-24 05:29
https://doi.org/10.1007/978-3-8348-9778-7ce of applicable digital rights management models. Therefore, we propose a property rights enforcement and pricing model by utilizing digital watermarking in combination with product versioning to address the IIoT data sharing incentive problem.作者: 外貌 時間: 2025-3-24 08:40
https://doi.org/10.1007/978-1-0716-2908-6ork to measure economic impact of cybersecurity activities in a distributed ecosystem with several actors. Through the mapping of actors, responsibilities, inter-dependencies, and risks, it is possible to develop specific economic models, which can provide in a combined manner an accurate picture of cybersecurity economic impacts.作者: JADED 時間: 2025-3-24 11:44 作者: ligature 時間: 2025-3-24 17:56 作者: debris 時間: 2025-3-24 20:11 作者: 反應(yīng) 時間: 2025-3-25 00:32
0302-9743 irtualization technologies; economic models for cyber-physical systems, industry 4.0 and?sustainable systems; resource management; and emerging ideas.?.978-3-030-36026-9978-3-030-36027-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 小鹿 時間: 2025-3-25 06:04
Books between Europe and the Americaslow for the minimal possible integration of blockchain technology in a traditional Access Control system. In particular, we consider the scenario where Attribute Managers only may be managed on chain through smart contracts. We provide a proof of concept implementation based on Ethereum, and show its performance through experimental results.作者: Hot-Flash 時間: 2025-3-25 08:18
https://doi.org/10.1007/978-3-662-21595-1etplaces of VNFs), in order to create new SFCs based on existing ones. Therefore, this work addresses as well data integrity and provides the functionality to store and validate SFCs through the use of blockchains. Three case studies are presented to provide evidence of the technical feasibility of the solution proposed.作者: Obliterate 時間: 2025-3-25 14:07
https://doi.org/10.1007/978-94-015-3514-4thority and it supports both decentralized ratings and ranking of different items. A preliminary evaluation on the Ethereum test network demonstrates the feasibility of the framework in terms of performance and cost.作者: hardheaded 時間: 2025-3-25 19:14
Symbolische Logik und Aussagenalgebra, be as much information that can be reasonably obtained. At the same time, it blends well with information that an operator can collect, statically or in realtime, for the user as well as from content and/or application providers.作者: acquisition 時間: 2025-3-25 23:16
Exploiting Blockchain Technology for Attribute Management in Access Control Systemslow for the minimal possible integration of blockchain technology in a traditional Access Control system. In particular, we consider the scenario where Attribute Managers only may be managed on chain through smart contracts. We provide a proof of concept implementation based on Ethereum, and show its performance through experimental results.作者: 貪心 時間: 2025-3-26 02:39 作者: 法律的瑕疵 時間: 2025-3-26 07:31 作者: 蜈蚣 時間: 2025-3-26 09:59
Voting for Superior Services: How to Exploit Cloud Hierarchies be as much information that can be reasonably obtained. At the same time, it blends well with information that an operator can collect, statically or in realtime, for the user as well as from content and/or application providers.作者: ALOFT 時間: 2025-3-26 15:43 作者: 描述 時間: 2025-3-26 17:29 作者: 清唱劇 時間: 2025-3-26 22:01
Introducing Licensing Throughout SLAs in NFV Environments paper, a license-based architecture is introduced which aims at linking the Network Services with license models throughout SLAs. Specifically, we have introduced an interconnection between license models and SLAs, in which we aim at an efficient and flexible service orchestration in a beyond MANO SP.作者: exceed 時間: 2025-3-27 04:18
Conference proceedings 2019cation; resource, service and communication federations; economic assessment, business and pricing?models; blockchain and network function virtualization technologies; economic models for cyber-physical systems, industry 4.0 and?sustainable systems; resource management; and emerging ideas.?.作者: 拘留 時間: 2025-3-27 09:17
https://doi.org/10.1007/978-1-4757-2078-5 monetary costs of executing parallel applications in cloud environments, leveraging volatile resources. Using this cost model, one is able to determine a configuration of a cloud-based parallel system that minimizes the total costs of executing an application.作者: PUT 時間: 2025-3-27 10:52 作者: 心神不寧 時間: 2025-3-27 15:35
https://doi.org/10.1007/978-3-030-36027-6service level agreement; cloud computing; economics of blockchain; scheduling; economics-based optimizat作者: Euphonious 時間: 2025-3-27 20:25
978-3-030-36026-9Springer Nature Switzerland AG 2019作者: Ganglion-Cyst 時間: 2025-3-27 23:26 作者: 組成 時間: 2025-3-28 05:55
https://doi.org/10.1007/978-3-662-21595-1al Network Functions (VNF) on commercial off-the-shelf hardware. Network operators can create customized network services by chaining multiple VNFs, defining a so-called Service Function Chaining (SFC). Because NFV became technically mature recently, the building of such SFCs still needs in-depth kn作者: HEPA-filter 時間: 2025-3-28 08:09 作者: Terrace 時間: 2025-3-28 12:14
https://doi.org/10.1007/978-1-4757-2078-5uds exhibit several fundamental features of economic value, like on-demand resource provisioning and a pay-per-use model. Additionally, several cloud providers offer their resources with significant discounts; however, possessing limited availability. Such volatile resources are an auspicious opport作者: 存心 時間: 2025-3-28 17:37
https://doi.org/10.1007/978-3-322-84371-5n cloud hardware, namely the social welfare. To maximize the social welfare in vertical elasticity clouds, mechanisms which elicit resource valuation from clients are required. Full Vickrey-Clarke-Groves (VCG) auctions, which allocate resources to optimize the social welfare, are NP-hard and too com作者: Corral 時間: 2025-3-28 18:45 作者: anaerobic 時間: 2025-3-29 01:20 作者: GLOSS 時間: 2025-3-29 04:49
The Emotional Side of Learning,f the economies of scale in the cloud service sector. In order for a federation to exist in the commercial market, an efficient mechanism for resource and revenue sharing is of paramount importance. In this paper, we design the architecture and specify the business logic for the dynamic operation of作者: 六個才偏離 時間: 2025-3-29 11:15
George D. Oreopoulos,Mark Wheatcroftas critical: (1) Intensive use of models of the simulated system that can be exploited in all phases of its life cycle where simulation can be used, and methodologies for these purposes; (2) Adaptation of simulation techniques to HPC infrastructures, as a method to improve simulation efficiency and 作者: 沒有貧窮 時間: 2025-3-29 13:14
https://doi.org/10.1007/978-3-030-73480-0ion or even repealing it as recently in the USA. The goal of this paper is to model and analyze the interactions of users, content providers, and Internet service providers (ISPs) located in countries with different rules..To do so, we build a simple two-regions game-theoretic model and focus on two作者: 名詞 時間: 2025-3-29 16:27
https://doi.org/10.1007/978-3-8348-9778-7ce suggests that industries are suffering a significant loss of value creation from insufficient IIoT data sharing. We argue that the limited utilization of the Sensing as a Service business model is caused by the economic and technological characteristics of sensor data, and the corresponding absen作者: Palliation 時間: 2025-3-29 22:27
Gherkin and Behavior Driven Development. In turn, the market share and number of small and medium-sized regional IaaS providers have been declining over the past years. This battle for market shares has, however, been astonishingly widely neglected in research. The goal of this paper is therefore to identify and analyze the dominant busi作者: 凝乳 時間: 2025-3-30 00:36
https://doi.org/10.1007/978-1-0716-2908-6spective, either directly or indirectly. In this context, it is imperative to understand the significant dependencies between complex and distributed systems (., supply-chain), as well as security and safety risks associated with each actor. This paper proposes SEConomy, a strictly step-based framew作者: A簡潔的 時間: 2025-3-30 06:13 作者: certitude 時間: 2025-3-30 08:58
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/301993.jpg作者: 仇恨 時間: 2025-3-30 15:33 作者: 外來 時間: 2025-3-30 18:01
Bill Estimation in Simplified Memory Progressive Second Price Auctionsother participants’ (changing) private bids..We present methods to estimate future bills in noisy, changing, VCG-like auction environments. The bound estimation method we present leads to an increase of 3% in the overall social welfare.