Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
This thesis reports on the research to develop of a data center network (DCN) architecture to solve the problem of network performance in cloud-oriented data centers. Computational clouds are increasingly becoming popular for the provisioning of computing resources and service on demand basis. A...
| Main Author: | Qi, Han |
|---|---|
| Format: | Thesis |
| Published: |
2016
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/6154/ http://studentsrepo.um.edu.my/6154/4/qi_han.pdf |
Similar Items
Network traffic monitoring system with approach (NTMs) / Lee Chin Han
by: Lee , Chin Han
Published: (2004)
by: Lee , Chin Han
Published: (2004)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Kidney simulation in 3 dimensional environment "digikid" / Dennis Foong Yew Han
by: Dennis Foong , Yew Han
Published: (2004)
by: Dennis Foong , Yew Han
Published: (2004)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
SoftPromt a prototype software project management tool / Han Ettaher Dagez.
by: Dagez, Han Ettaher
Published: (1999)
by: Dagez, Han Ettaher
Published: (1999)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Using smart card to purchase text information from digital library / Ng Han Teck
by: Ng , Han Teck
Published: (2002)
by: Ng , Han Teck
Published: (2002)
Data recovery and business continuity in cloud computing: a review of the research literature
by: Alshammari, Mohammad M., et al.
Published: (2016)
by: Alshammari, Mohammad M., et al.
Published: (2016)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
DNA Computing for Solving Distribution Center Location Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
An enhanced architecture for big data task scheduling in cloud environment
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A review of cloud computing implementation in ASEAN countries
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
Sales Force Automation (SFA) / Tai Ching Han
by: Tai, Ching Han
Published: (2002)
by: Tai, Ching Han
Published: (2002)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Computer Aided Instructions (CAI) Mathematics Using Learner Centered Approach
by: Teng, Sze Le
Published: (2017)
by: Teng, Sze Le
Published: (2017)
Energy efficient computing architecture for rural applications
by: Yew, Sin Giap
Published: (2014)
by: Yew, Sin Giap
Published: (2014)
Skyline query processing for incomplete data in cloud environment
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Similar Items
-
Network traffic monitoring system with approach (NTMs) / Lee Chin Han
by: Lee , Chin Han
Published: (2004) -
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016) -
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014) -
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016) -
Kidney simulation in 3 dimensional environment "digikid" / Dennis Foong Yew Han
by: Dennis Foong , Yew Han
Published: (2004)