A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud (Englisch)
Freier Zugriff
- Neue Suche nach: Quang-Hung, Nguyen
- Neue Suche nach: Nien, Pham Dac
- Neue Suche nach: Nam, Nguyen Hoai
- Neue Suche nach: Huynh Tuong, Nguyen
- Neue Suche nach: Thoai, Nam
- Neue Suche nach: Quang-Hung, Nguyen
- Neue Suche nach: Nien, Pham Dac
- Neue Suche nach: Nam, Nguyen Hoai
- Neue Suche nach: Huynh Tuong, Nguyen
- Neue Suche nach: Thoai, Nam
In:
Information and Communication Technology
1
;
183-191
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private Cloud
-
Beteiligte:Quang-Hung, Nguyen ( Autor:in ) / Nien, Pham Dac ( Autor:in ) / Nam, Nguyen Hoai ( Autor:in ) / Huynh Tuong, Nguyen ( Autor:in ) / Thoai, Nam ( Autor:in )
-
Erschienen in:Information and Communication Technology , 1 ; 183-191Lecture Notes in Computer Science ; 7804, 1 ; 183-191
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Translating the Idea of the eGovernment One-Stop-Shop in IndonesiaWahid, Fathul et al. | 2013
- 11
-
A Practical Solution against Corrupted Parties and Coercers in Electronic Voting Protocol over the NetworkNguyen, Thi Ai Thao / Dang, Tran Khanh et al. | 2013
- 21
-
Early-Detection System for Cross-Language (Translated) PlagiarismMustofa, Khabib / Sir, Yosua Albert et al. | 2013
- 31
-
TransWiki: Supporting Translation TeachingBiuk-Aghai, Robert P. / Venkatesan, Hari et al. | 2013
- 41
-
Physicians’ Adoption of Electronic Medical Records: Model Development Using Ability – Motivation - Opportunity FrameworkGovindaraju, Rajesri / Hadining, Aulia F. / Chandra, Dissa R. et al. | 2013
- 50
-
Software Development Methods in the Internet of ThingsSulistyo, Selo et al. | 2013
- 60
-
SAT–Based Bounded Strong Satisfiability Checking of Reactive System SpecificationsShimakawa, Masaya / Hagihara, Shigeki / Yonezaki, Naoki et al. | 2013
- 71
-
OSMF: A Framework for OSS Process MeasurementSunindyo, Wikan Danar / Ekaputra, Fajar Juang et al. | 2013
- 81
-
Analyzing Stability of Algorithmic Systems Using Algebraic ConstructsBagchi, Susmit et al. | 2013
- 91
-
Algorithms of the Combination of Compiler Optimization Options for Automatic Performance TuningSuprapto / Wardoyo, Retantyo et al. | 2013
- 101
-
On Efficient Processing of Complicated Cloaked Region for Location Privacy Aware Nearest-Neighbor QueriesNgo, Chan Nam / Dang, Tran Khanh et al. | 2013
- 111
-
Semantic-Aware Obfuscation for Location Privacy at Database LevelLe, Thu Thi Bao / Dang, Tran Khanh et al. | 2013
- 121
-
Practical Construction of Face-Based Authentication Systems with Template Protection Using Secure SketchDang, Tran Tri / Truong, Quynh Chi / Dang, Tran Khanh et al. | 2013
- 131
-
CAPTCHA Suitable for SmartphonesTsuruta, Yusuke / Takaya, Mayumi / Yamamura, Akihiro et al. | 2013
- 141
-
Code Based KPD Scheme with Full Connectivity: Deterministic MergingSarkar, Pinaki / Dhar, Aritra et al. | 2013
- 152
-
Indonesian Digital NativesRamdhani, Neila / Wiradhany, Wisnu et al. | 2013
- 162
-
End-to-End Delay Performance for VoIP on LTE System in Access NetworkShen, Ng Liang / Aziz, Noraniah Abdul / Herawan, Tutut et al. | 2013
- 173
-
Mobile Collaboration Technology in Engineering Asset Maintenance – What Technology, Organisation and People Approaches Are Required?Syafar, Faisal / Gao, Jing et al. | 2013
- 183
-
A Genetic Algorithm for Power-Aware Virtual Machine Allocation in Private CloudQuang-Hung, Nguyen / Nien, Pham Dac / Nam, Nguyen Hoai / Huynh Tuong, Nguyen / Thoai, Nam et al. | 2013
- 192
-
Cloud-Based E-Learning: A Proposed Model and Benefits by Using E-Learning Based on Cloud Computing for Educational InstitutionSelviandro, Nungki / Hasibuan, Zainal Arifin et al. | 2013
- 202
-
Information Systems Strategic Planning for a Naval HospitalMuljo, Hery Harjono / Pardamean, Bens et al. | 2013
- 214
-
Estimation of Precipitable Water Vapor Using an Adaptive Neuro-fuzzy Inference System TechniqueSuparta, Wayan / Alhasa, Kemal Maulana et al. | 2013
- 223
-
A Data-Driven Approach toward Building Dynamic OntologyFudholi, Dhomas Hatta / Rahayu, Wenny / Pardede, Eric / Hendrik et al. | 2013
- 233
-
Using Semantic Web to Enhance User Understandability for Online Shopping License AgreementAsfand-e-yar, Muhammad / Tjoa, A Min et al. | 2013
- 243
-
Secure and Verifiable Outsourcing of Sequence ComparisonsFeng, Yansheng / Ma, Hua / Chen, Xiaofeng / Zhu, Hui et al. | 2013
- 253
-
Syntactic Analysis for Monitoring Personal Information Leakage on Social Network Services: A Case Study on TwitterChoi, Dongjin / You, Ilsun / Kim, Pankoo et al. | 2013
- 261
-
On the Efficiency Modelling of Cryptographic Protocols by Means of the Quality of Protection Modelling Language (QoP-ML)Ksiezopolski, Bogdan / Rusinek, Damian / Wierzbicki, Adam et al. | 2013
- 271
-
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature GenerationLu, Huabiao / Zhao, Baokang / Wang, Xiaofeng / Su, Jinshu et al. | 2013
- 285
-
On Identifying Proper Security MechanismsBreier, Jakub / Hudec, Ladislav et al. | 2013
- 295
-
A Recovery Approach for SQLite History Recorders from YAFFS2Wu, Beibei / Xu, Ming / Zhang, Haiping / Xu, Jian / Ren, Yizhi / Zheng, Ning et al. | 2013
- 300
-
UVHM: Model Checking Based Formal Analysis Scheme for HypervisorsShe, Yuchao / Li, Hui / Zhu, Hui et al. | 2013
- 306
-
SA4WSs: A Security Architecture for Web ServicesLiu, Lingxia / Wang, Dongxia / Zhao, Jinjing / Huang, Minhuan et al. | 2013
- 312
-
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic InvestigationHou, Shuhui / Sasaki, Ryoichi / Uehara, Tetsutaro / Yiu, Siuming et al. | 2013
- 318
-
A Test Case Generation Technique for VMM FuzzingSun, Xiaoxia / Chen, Hua / Zhao, Jinjing / Huang, Minhuan et al. | 2013
- 324
-
A Variant of Non-Adaptive Group Testing and Its Application in Pay-Television via InternetBui, Thach V. / Nguyen, Oanh K. / Dang, Van H. / Nguyen, Nhung T. H. / Nguyen, Thuc D. et al. | 2013
- 331
-
A Proposal on Security Case Based on Common CriteriaYamamoto, Shuichiro / Kaneko, Tomoko / Tanaka, Hidehiko et al. | 2013
- 337
-
An Adaptive Low-Overhead Mechanism for Dependable General-Purpose Many-Core ProcessorsJia, Wentao / Li, Rui / Zhang, Chunyan et al. | 2013
- 343
-
Identity Management Lifecycle - Exemplifying the Need for Holistic Identity Assurance FrameworksJensen, Jostein et al. | 2013
- 353
-
Anonymous Lattice-Based Broadcast EncryptionGeorgescu, Adela et al. | 2013
- 363
-
Supporting Secure Provenance Update by Keeping “Provenance” of the ProvenanceSyalim, Amril / Nishide, Takashi / Sakurai, Kouichi et al. | 2013
- 373
-
New Ciphertext-Policy Attribute-Based Access Control with Efficient RevocationXie, Xingxing / Ma, Hua / Li, Jin / Chen, Xiaofeng et al. | 2013
- 383
-
Provably Secure and Subliminal-Free Variant of Schnorr SignatureZhang, Yinghui / Li, Hui / Li, Xiaoqing / Zhu, Hui et al. | 2013
- 392
-
A Block Cipher Mode of Operation with Two KeysHuang, Yi-Li / Leu, Fang-Yie / Liu, Jung-Chun / Yang, Jing-Hao et al. | 2013
- 399
-
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret SharingOlimid, Ruxandra F. et al. | 2013
- 409
-
Modified Efficient and Secure Dynamic ID-Based User Authentication SchemeTruong, Toan-Thinh / Tran, Minh-Triet / Duong, Anh-Duc et al. | 2013
- 416
-
A Simplified Privacy Preserving Message Delivery Protocol in VDTNsPark, Youngho / Sur, Chul / Rhee, Kyung-Hyune et al. | 2013
- 426
-
Confidentiality-Preserving Query Execution of Fragmented Outsourced DataBkakria, Anis / Cuppens, Frédéric / Cuppens-Boulahia, Nora / Fernandez, José M. et al. | 2013
- 441
-
Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access ControlAldeen, Nisreen Alam / Quirchmayr, Gerald et al. | 2013
- 447
-
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering ProtocolAbbasi, Sedigheh / Cimato, Stelvio / Damiani, Ernesto et al. | 2013
- 453
-
A Real-Time Privacy Amplification Scheme in Quantum Key DistributionLiu, Bo / Zhao, Baokang / Zou, Dingjie / Wu, Chunqing / Yu, Wanrong / You, Ilsun et al. | 2013
- 459
-
CSP-Based General Detection Model of Network Covert Storage ChannelsZhu, Hui / Liu, Tingting / Wei, Guanghui / Liu, Beishui / Li, Hui et al. | 2013
- 469
-
Trustworthy Opportunistic Access to the Internet of ServicesArmando, Alessandro / Castiglione, Aniello / Costa, Gabriele / Fiore, Ugo / Merlo, Alessio / Verderame, Luca / You, Ilsun et al. | 2013
- 479
-
Architecture of Network Environment for High-Risk Security ExperimentationKuang, Xiaohui / Li, Xiang / Zhao, Jinjing et al. | 2013
- 485
-
Emulation on the Internet Prefix Hijacking Attack ImpactionZhao, Jinjing / Wen, Yan et al. | 2013
- 490
-
Improved Clustering for Intrusion Detection by Principal Component Analysis with Effective Noise ReductionZhao, Lu / Kang, Ho-Seok / Kim, Sung-Ryul et al. | 2013
- 496
-
Unconditionally Secure Fully Connected Key Establishment Using Deployment KnowledgeMitra, Sarbari / Mukhopadhyay, Sourav / Dutta, Ratna et al. | 2013
- 502
-
An Improved Greedy Forwarding Routing Protocol for Cooperative VANETsWen, Huaqing / Rhee, Kyung-Hyune et al. | 2013
- 507
-
A Review of Security Attacks on the GSM StandardCattaneo, Giuseppe / Maio, Giancarlo / Faruolo, Pompeo / Petrillo, Umberto Ferraro et al. | 2013
- 513
-
An Extended Multi-secret Images Sharing Scheme Based on Boolean OperationWang, Huan / He, Mingxing / Li, Xiao et al. | 2013
- 519
-
Image Watermarking Using Psychovisual Threshold over the EdgeAbu, Nur Azman / Ernawan, Ferda / Suryana, Nanna / Sahib, Shahrin et al. | 2013
- 528
-
A Data Structure for Efficient Biometric IdentificationBaba, Kensuke / Egawa, Serina et al. | 2013
- 534
-
The PCA-Based Long Distance Face Recognition Using Multiple Distance Training Images for Intelligent Surveillance SystemMoon, Hae-Min / Pan, Sung Bum et al. | 2013
- 540
-
Shifting Primes on OpenRISC Processors with Hardware MultiplierMarin, Leandro / Jara, Antonio J. / Skarmeta, Antonio et al. | 2013