Cloud Computing: Architecture for Efficient Provision of Services
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provid...
| Main Authors: | Khan, Nawsher, Noraziah, Ahmad, Tutut, Herawan, Elrasheed, Ismail |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Conference Publishing Services (CPS)
2012
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6876/ http://umpir.ump.edu.my/id/eprint/6876/1/Cloud_Computing_Architecture.pdf |
Similar Items
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012)
by: Khan, Nawsher, et al.
Published: (2012)
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)
by: Khan, Nawsher, et al.
Published: (2011)
Optimized Load Balancing based Task Scheduling in Cloud Environment
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Binary Vote Assignment on Cloud Quorum Algorithm for Fragmented MyGRANTS Database Replication
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
by: Elrasheed Ismail, Sultan
Published: (2013)
by: Elrasheed Ismail, Sultan
Published: (2013)
Managing Fragmented Database Replication for Mygrants Using Binary Vote Assignment on Cloud Quorum
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique
by: Noraziah, Ahmad, et al.
Published: (2013)
by: Noraziah, Ahmad, et al.
Published: (2013)
Sierpinski triangle based data-center network architecture in cloud computing / Qi Han
by: Qi, Han
Published: (2016)
by: Qi, Han
Published: (2016)
An Autonomic Service Oriented Architecture in Computational Engineering Framework
by: M. A. C., Bhakti, et al.
Published: (2010)
by: M. A. C., Bhakti, et al.
Published: (2010)
Building customer trust in cloud computing model
by: Pathan, Al-Sakib Khan
Published: (2015)
by: Pathan, Al-Sakib Khan
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
Towards an Autonomic Service Oriented Architecture in Computational Engineering Framework
by: M.A.C., Bhakti, et al.
by: M.A.C., Bhakti, et al.
Factors Affecting the Continuous Use of Cloud Computing Services from Expert's Perspective
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
by: Al-Sharafi, Mohammed A., et al.
Published: (2017)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
An enhanced architecture for big data task scheduling in cloud environment
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
IDPS: an integrated intrusion handling model for cloud computing environment
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
by: Alsafi, Hassen Mohammed, et al.
Published: (2012)
Emerging sensor-cloud technology for pervasive services and applications
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
by: Hassan, Mohammad Mehedi, et al.
Published: (2014)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
The potential use of service-oriented infrastructure framework to enable transparent vertical scalability of cloud computing infrastructure
by: Muchtar, Farkhana, et al.
Published: (2018)
by: Muchtar, Farkhana, et al.
Published: (2018)
Fast Determination of Items Support Technique from Enhanced Tree Data Structure
by: Abdullah, Zailani, et al.
Published: (2014)
by: Abdullah, Zailani, et al.
Published: (2014)
A Model for Visualizing Critical Least Association Rules
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Mining Least Association Rules of Degree Level Programs Selected by Students
by: Zailani, Abdullah, et al.
Published: (2014)
by: Zailani, Abdullah, et al.
Published: (2014)
A Scalable Algorithm for Constructing Frequent Pattern Tree
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Building customer trust in cloud computing with an ICT-enabled global regulatory body
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Soft Set-Based Decision Making For Patients Suspected Influenza-Like Illness
by: Herawan, Tutut
Published: (2010)
by: Herawan, Tutut
Published: (2010)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Similar Items
-
Cloud Computing: Analysis of Various Platforms
by: Khan, Nawsher, et al.
Published: (2012) -
A cloud architecture with an efficient scheduling technique
by: Khan, Nawsher, et al.
Published: (2012) -
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud
by: Khan, Nawsher, et al.
Published: (2012) -
Cloud computing: Analysis of various services
by: Khan, Nawsher, et al.
Published: (2012) -
Cloud computing: comparison of various features
by: Khan, Nawsher, et al.
Published: (2011)