DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 477
1.
  • Comparison of virtualizatio... Comparison of virtualization performance of Proxmox, OpenVZ, OpenNebula, Vmware ESX and Xen Server
    Rycaj, Grzegorz Journal of Computer Sciences Institute, 09/2019, Volume: 12
    Journal Article
    Peer reviewed
    Open access

    The aim of the article is to compare the performance of five popular virtualization solutions used in the private cloud model. The analysis was conducted for five virtualizers: Proxmox, OpenVZ, ...
Full text
Available for: UL

PDF
2.
  • Cloud manufacturing: key ch... Cloud manufacturing: key characteristics and applications
    Ren, Lei; Zhang, Lin; Wang, Lihui ... International journal of computer integrated manufacturing, 06/2017, Volume: 30, Issue: 6
    Journal Article
    Peer reviewed

    Cloud manufacturing is emerging as a new manufacturing paradigm as well as an integrated technology, which is promising in transforming today's manufacturing industry towards service-oriented, highly ...
Full text
Available for: UL
3.
  • The effects of IT capabilit... The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations
    Garrison, Gary; Wakefield, Robin L.; Kim, Sanghyun International journal of information management, August 2015, 2015-08-00, 20150801, Volume: 35, Issue: 4
    Journal Article
    Peer reviewed

    •Organizations align IT-based capabilities with cloud delivery options to meet performance objectives.•Managerial, technical and relational IT capability positively affect cloud success.•Cloud ...
Full text
Available for: UL
4.
  • Trusted detection of ransom... Trusted detection of ransomware in a private cloud using machine learning methods leveraging meta-features from volatile memory
    Cohen, Aviad; Nissim, Nir Expert systems with applications, 07/2018, Volume: 102
    Journal Article
    Peer reviewed

    •A solution for trusted detection of unknown ransomware in VMs is proposed.•Valuable data is extracted from the VM's memory dump using the Volatility framework.•General descriptive features are ...
Full text
Available for: UL
5.
  • Research and Implementation... Research and Implementation of Network Security Deployment Based on Private Cloud Security Platform
    Min, Xiao; Mei, Guo; Weiping, Zhu Procedia computer science, 2022, 2022-00-00, Volume: 208
    Journal Article
    Peer reviewed
    Open access

    With the development of science and technology, the computer age has come. As a new type of computer network application technology, cloud computing technology is of great significance to promote ...
Full text
Available for: UL
6.
Full text
Available for: UL

PDF
7.
  • Compute functional analysis... Compute functional analysis leveraging the IAAS private cloud computing service model in packstack development
    Suriansyah, Mohamad Iqbal; Mulyana, Iyan; Sanger, Junaidy Budi ... Ilkom Jurnal Ilmiah, 04/2021, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Analyzing compute functions by utilizing the IAAS model for private cloud computing services in packstack development is one of the large-scale data storage solutions. Problems that often occur when ...
Full text
Available for: UL

PDF
8.
  • Towards a Big Data system d... Towards a Big Data system disaster recovery in a Private Cloud
    Chang, Victor Ad hoc networks, 12/2015, Volume: 35
    Journal Article
    Peer reviewed
    Open access

    Disaster recovery (DR) plays a vital role in restoring the organization's data in the case of emergency and hazardous accidents. While many papers in security focus on privacy and security ...
Full text
Available for: UL

PDF
9.
  • HA-D3QN: Embedding virtual ... HA-D3QN: Embedding virtual private cloud in cloud data centers with heuristic assisted deep reinforcement learning
    Chen, Meng; Hou, Jiaxin; Sheng, Yongpan ... Future generation computer systems, November 2023, 2023-11-00, Volume: 148
    Journal Article
    Peer reviewed

    The virtual network embedding problem is embedding virtual networks (VNs) in a substrate network so that revenue or accept ratio is maximized. Previous study usually assumes disclosed communication ...
Full text
Available for: UL
10.
Full text
1 2 3 4 5
hits: 477

Load filters