標(biāo)題: Titlebook: ; [打印本頁(yè)] 作者: Clinton 時(shí)間: 2025-3-21 16:55
書(shū)目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)
書(shū)目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing被引頻次
書(shū)目名稱Green, Pervasive, and Cloud Computing被引頻次學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing年度引用
書(shū)目名稱Green, Pervasive, and Cloud Computing年度引用學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing讀者反饋
書(shū)目名稱Green, Pervasive, and Cloud Computing讀者反饋學(xué)科排名
作者: Vldl379 時(shí)間: 2025-3-21 23:32 作者: certitude 時(shí)間: 2025-3-22 01:40
https://doi.org/10.1007/978-3-642-00820-7rsede other vCPUs, in order to favor the reduction of I/O bound domain response times and the subsequent bottleneck in the CPU run queue. The results indicate substantial improvement of I/O handling and fair resource allocation between the host and guest domains.作者: 憤慨點(diǎn)吧 時(shí)間: 2025-3-22 06:18
Erik Seedhouse F.B.I.S., As.M.A. achieves 87?%, and the responsive time is less than 3?s. The proposed system can provide more insightful and powerful services for the glass wearers. It would be possibly expected to carry out more user-centric and context-aware wearable applications in the future.作者: 沖擊力 時(shí)間: 2025-3-22 08:44 作者: RUPT 時(shí)間: 2025-3-22 16:32
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storageimplifies the process of updates and the signature scheme is used to authenticate both the value and the position of data blocks, which greatly improves the efficiency in communication. The security and performance analysis show that our DPDP scheme is provably secure and efficient.作者: RUPT 時(shí)間: 2025-3-22 17:34
Optimizing I/O Intensive Domain Handling in Xen Hypervisor for Consolidated Server Environmentsrsede other vCPUs, in order to favor the reduction of I/O bound domain response times and the subsequent bottleneck in the CPU run queue. The results indicate substantial improvement of I/O handling and fair resource allocation between the host and guest domains.作者: vitrectomy 時(shí)間: 2025-3-22 22:59 作者: MIRTH 時(shí)間: 2025-3-23 03:03
An Improved Dynamic ID Based Remote User Authentication Scheme for Multi-server EnvironmentHowever, we found that Banerjee et al.’s scheme is still vulnerable to user impersonation attack and off-line password guessing attack. Finally, we proposed an enhanced scheme to eliminate the security vulnerability.作者: 串通 時(shí)間: 2025-3-23 08:57 作者: genesis 時(shí)間: 2025-3-23 11:29 作者: 啜泣 時(shí)間: 2025-3-23 15:36 作者: Indelible 時(shí)間: 2025-3-23 18:27
Dirk Olbers,Jürgen Willebrand,Carsten Edenlevel features of apps are extracted by app feature extractor. App similarity computer computes the similarity score of two apps based on these features. A prototype system is implemented. The evaluation results demonstrate that the proposed cloud-based framework is highly scalable and effective for large-scale Android app repackaging detection.作者: Popcorn 時(shí)間: 2025-3-24 00:35
Fluid Flow in Continental Margin Sedimentsestion links. We design a multi-level bloom filter to detect large flows and propose a flow scheduling algorithm based on VM migration (FSVMM) for data centers to optimize network performance. The FSVMM is evaluated with real trace data. Results show that the FSVMM can reduce the number of congestion links and improve user experience.作者: 雇傭兵 時(shí)間: 2025-3-24 03:33 作者: Simulate 時(shí)間: 2025-3-24 06:32
ZooKeeper+: The Optimization of Election Algorithm in Complex Network Circumstancehe evaluation, it takes not much overhead to realize the addition and deletion of servers and the recovery of crashed servers under various complex network circumstances, and it takes little more election time and initialization time of service to obtain the greater scalability.作者: Fabric 時(shí)間: 2025-3-24 13:17
A Scalable Cloud-Based Android App Repackaging Detection Frameworklevel features of apps are extracted by app feature extractor. App similarity computer computes the similarity score of two apps based on these features. A prototype system is implemented. The evaluation results demonstrate that the proposed cloud-based framework is highly scalable and effective for large-scale Android app repackaging detection.作者: FIN 時(shí)間: 2025-3-24 15:44
A Flow Scheduling Algorithm Based on VM Migration in Data Center Networksestion links. We design a multi-level bloom filter to detect large flows and propose a flow scheduling algorithm based on VM migration (FSVMM) for data centers to optimize network performance. The FSVMM is evaluated with real trace data. Results show that the FSVMM can reduce the number of congestion links and improve user experience.作者: ALERT 時(shí)間: 2025-3-24 20:59
A Polynomial Time Algorithm for a Generalized Longest Common Subsequence Problemf constraint string in . as a substring and the length of . is maximized. A very simple dynamic programming algorithm to this problem is presented in this paper. The correctness of the new algorithm is demonstrated. The time and space complexities of the new algorithm are both .(.).作者: 印第安人 時(shí)間: 2025-3-24 23:13 作者: 跟隨 時(shí)間: 2025-3-25 04:53 作者: 的闡明 時(shí)間: 2025-3-25 09:48
An Efficient Dynamic Programming Algorithm for STR-IC-STR-EC-LCS Probleming and the other constraining sequence of length . must be excluded as a substring of two main sequences and the length of the result must be maximal. For the two input sequences . and . of lengths . and ., and the given two constraining sequences of length . and ., we present an .(.) time dynamic 作者: lesion 時(shí)間: 2025-3-25 15:40
A Polynomial Time Algorithm for a Generalized Longest Common Subsequence Problem . and . of lengths . and ., and a set of . constraints . of total length ., the problem is to find a common subsequence . of . and . excluding each of constraint string in . as a substring and the length of . is maximized. A very simple dynamic programming algorithm to this problem is presented in 作者: CANE 時(shí)間: 2025-3-25 18:44 作者: aviator 時(shí)間: 2025-3-25 23:16
ZooKeeper+: The Optimization of Election Algorithm in Complex Network Circumstancest election algorithm based on ZooKeeper, we realize the dynamic addition and deletion of servers without service interruption. There is only one clustered mode for servers without switching between prior two modes, it also speeds up the leader election. The leader maintains an active server list wh作者: PAGAN 時(shí)間: 2025-3-26 02:14
An Efficient Dynamic Provable Data Possession Scheme in Cloud Storageroduces new security challenges. Since clients can no longer control the remote data, they need to be convinced that their data are correctly stored in the cloud. Moreover, supporting dynamic data updates is a practical requirement of cloud storage. It is imperative to provide an efficient and secur作者: Detoxification 時(shí)間: 2025-3-26 07:39 作者: 經(jīng)典 時(shí)間: 2025-3-26 11:03 作者: 薄膜 時(shí)間: 2025-3-26 15:32
A Scalable Cloud-Based Android App Repackaging Detection Framework a high demand on scalability of app repackaging detectors. In this paper, we propose a cloud-based app repackaging detection framework. It is designed to analyze and detect repacked Android apps in a large-scale way. The framework consists of three primary components: market monitor, app feature ex作者: PRO 時(shí)間: 2025-3-26 19:42 作者: browbeat 時(shí)間: 2025-3-26 21:04 作者: gain631 時(shí)間: 2025-3-27 03:19 作者: forager 時(shí)間: 2025-3-27 09:19 作者: exhibit 時(shí)間: 2025-3-27 13:19
User-Centric and Real-Time Activity Recognition Using Smart Glassesanalysis of sensor data to study user’s motions and activities, while utilizing wearable glasses bundled with various sensors. The software system collects, trains data, and builds the model for fast classification, which emphasizes on how specific features annotate and extract head-mounted behavior作者: 縮影 時(shí)間: 2025-3-27 13:44
Minimizing Confident Information Coverage Breach in Rechargeable Wireless Sensor Networks with Unevey and charging capability constraint, it may happen that a RWSN cannot provide required area coverage some time, yet it may recover later on after obtaining enough recharged energy. To minimize the coverage breach, we propose a family of sensor scheduling algorithms, each of which uses an utility fu作者: STALL 時(shí)間: 2025-3-27 18:18 作者: 與野獸博斗者 時(shí)間: 2025-3-28 00:18 作者: 玷污 時(shí)間: 2025-3-28 02:48
Matthew Bolton,Stephen Froese,Alex Jeffrey . and . of lengths . and ., and a set of . constraints . of total length ., the problem is to find a common subsequence . of . and . excluding each of constraint string in . as a substring and the length of . is maximized. A very simple dynamic programming algorithm to this problem is presented in 作者: 錯(cuò)誤 時(shí)間: 2025-3-28 06:23 作者: BOOST 時(shí)間: 2025-3-28 14:26
https://doi.org/10.1007/978-94-017-6071-3st election algorithm based on ZooKeeper, we realize the dynamic addition and deletion of servers without service interruption. There is only one clustered mode for servers without switching between prior two modes, it also speeds up the leader election. The leader maintains an active server list wh作者: dragon 時(shí)間: 2025-3-28 18:40 作者: alabaster 時(shí)間: 2025-3-28 22:43 作者: acrimony 時(shí)間: 2025-3-28 23:09
Robert W. Johnson,Craig W. Ohlhorst, low power and cost at the same time. Due to the huge Non-recurring engineering costs, computer architects and processor designers rely on the simulation tools and models to optimize the main processing unit. Design space exploration (DSE) methodology is responsible to filter all the possible choic作者: 一大塊 時(shí)間: 2025-3-29 04:47 作者: tolerance 時(shí)間: 2025-3-29 10:44
https://doi.org/10.1007/978-3-662-22648-3igration strategies have been adopted in order to mitigate the resources competition and maintain the VM performance. However, the hotspots are not all accurately flagged without delay in the recent cloud workload and the cascading overloads are probably triggered after VM migration at the same time作者: 獨(dú)裁政府 時(shí)間: 2025-3-29 15:01 作者: 伸展 時(shí)間: 2025-3-29 16:50 作者: 妨礙議事 時(shí)間: 2025-3-29 20:53
https://doi.org/10.1007/978-3-642-00820-7en is a widely preferred hypervisor, mainly, due to its dual virtualization modes, virtual machine migration support and scalability. This paper involves an analysis of the virtual CPU (vCPU) scheduling algorithms in Xen, on the basis of their performance while handling compute intensive or I/O inte作者: Palter 時(shí)間: 2025-3-30 03:06 作者: Flatus 時(shí)間: 2025-3-30 06:32 作者: Oversee 時(shí)間: 2025-3-30 10:28 作者: ALLAY 時(shí)間: 2025-3-30 12:35 作者: depreciate 時(shí)間: 2025-3-30 18:14
Robert W. Johnson,Craig W. Ohlhorster, we focus on the macro-DSE problem around choosing the right style for the processing core design. Firstly, we extended McPAT, the de facto DSE tools to support from 65?nm to 16?nm technology and up?to 256 Cores. Based on the physical design constraints: chip area, power and balance design reques