Cloud computing: comparison of various features
Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed, consume and allow users to utilize services globally. Due to the powerful computing and storage, high availability and security, easy accessibility an...
| Main Authors: | Khan, Nawsher, Noraziah, Ahmad, Mustafa, Mat Deris, Elrasheed, Ismail |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
Springer, Berlin, Heidelberg
2011
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26146/ http://umpir.ump.edu.my/id/eprint/26146/1/Cloud%20Computing-%20Comparison%20of%20various%20features.pdf |
Similar Items
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing review: Features and issues
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Managing educational resource-student information systems using BVAGQ fragmented database replication model
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Software Agent And Cloud Computing: A Brief Review
by: Firas, D. Ahmed, et al.
Published: (2016)
by: Firas, D. Ahmed, et al.
Published: (2016)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A review of cloud computing implementation in ASEAN countries
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
by: Asyran Zarizi, Abdullah, et al.
Published: (2020)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Fuzz test case generation for penetration testing in mobile cloud computing applications
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
by: Al-Ahmad, Ahmad Salah, et al.
Published: (2018)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Factors Influencing the Continuous Use of Cloud Computing Services in Organization Level
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Quantitative analysis and performance evaluation of target-oriented replication strategies in cloud computing
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Design and implementation cloud computing (TOC, Abstract, chapter 1 and Reference only)
by: Norliza Hashim,
Published: (2014)
by: Norliza Hashim,
Published: (2014)
Mining significant association rules from educational data using critical relative support approach
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
WLAR-Viz: Weighted least association rules visualization
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
by: Zailani, Abdullah, et al.
Published: (2012)
by: Zailani, Abdullah, et al.
Published: (2012)
Scalable technique to discover items support from trie data structure
by: Noraziah, Ahmad, et al.
Published: (2012)
by: Noraziah, Ahmad, et al.
Published: (2012)
On soft partition attribute selection
by: Rabiei, Mamat, et al.
Published: (2012)
by: Rabiei, Mamat, et al.
Published: (2012)
Multi-objectives model to process security risk assessment based on AHP-PSO
by: Awad, Gamal, et al.
Published: (2011)
by: Awad, Gamal, et al.
Published: (2011)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
by: Mohanaad, Shakir, et al.
Published: (2016)
by: Mohanaad, Shakir, et al.
Published: (2016)
Extracting highly positive association rules from students' enrollment data
by: Zailani, Abdullah, et al.
Published: (2011)
by: Zailani, Abdullah, et al.
Published: (2011)
Fault Tolerence on Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
by: Ahmad, Firdaus, et al.
Published: (2017)
by: Ahmad, Firdaus, et al.
Published: (2017)
Similar Items
-
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012) -
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012) -
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013) -
Cloud Computing: Architecture for Efficient Provision of Services
by: Khan, Nawsher, et al.
Published: (2012) -
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)