Resource management in cloud computing: Taxonomy, prospects, and challenges (English)
- New search for: Mustafa, Saad
- New search for: Nazir, Babar
- New search for: Hayat, Amir
- New search for: Khan, Atta ur Rehman
- New search for: Madani, Sajjad A.
- New search for: Mustafa, Saad
- New search for: Nazir, Babar
- New search for: Hayat, Amir
- New search for: Khan, Atta ur Rehman
- New search for: Madani, Sajjad A.
In:
Computers and Electrical Engineering
;
47
;
186-203
;
2015
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Resource management in cloud computing: Taxonomy, prospects, and challenges
-
Contributors:Mustafa, Saad ( author ) / Nazir, Babar ( author ) / Hayat, Amir ( author ) / Khan, Atta ur Rehman ( author ) / Madani, Sajjad A. ( author )
-
Published in:Computers and Electrical Engineering ; 47 ; 186-203
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2015-07-29
-
Size:18 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 47
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An opportunistic routing based on symmetrical traffic distribution in vehicular networksMirjazaee, Nassim / Moghim, Neda et al. | 2015
- 13
-
Selecting optimal countermeasures for attacks against critical systems using the attack volume model and the RORI indexGonzalez-Granadillo, G. / Garcia-Alfaro, J. / Alvarez, E. / El-Barbori, M. / Debar, H. et al. | 2015
- 35
-
Multiple camera in car audio–visual speech recognition using phonetic and visemic informationBiswas, Astik / Sahu, P.K. / Chandra, Mahesh et al. | 2015
- 51
-
Design and simulation of a parallel adaptive arbiter for maximum CPU utilization using multi-core processorsAkhtar, M. Nishat / Mohamad-Saleh, Junita / Sidek, Othman et al. | 2015
- 69
-
Workload modeling for resource usage analysis and simulation in cloud computingMagalhães, Deborah / Calheiros, Rodrigo N. / Buyya, Rajkumar / Gomes, Danielo G. et al. | 2015
- 82
-
Automated detection and segmentation of drusen in retinal fundus imagesMittal, Deepti / Kumari, Kajal et al. | 2015
- 96
-
On kernel acceleration of electromagnetic solvers via hardware emulationTarek Ibn Ziad, M. / Hossam, Mohamed / Masoud, Mohamad A. / Nagy, Mohamed / Adel, Hesham A. / Alkabani, Yousra / El-Kharashi, M. Watheq / Salah, Khaled / AbdelSalam, Mohamed et al. | 2015
- 114
-
A two-stage feature selection method with its applicationZhao, Xuehua / Li, Daoliang / Yang, Bo / Chen, Huiling / Yang, Xinbin / Yu, Chenglong / Liu, Shuangyin et al. | 2015
- 126
-
Automatic modulation format/bit-rate classification and signal-to-noise ratio estimation using asynchronous delay-tap samplingKhan, Faisal Nadeem / Teow, Chiew Hoon / Kiu, Shiu Guong / Tan, Ming Chieng / Zhou, Yudi / Al-Arashi, Waled Hussein / Lau, Alan Pak Tao / Lu, Chao et al. | 2015
- 135
-
Introduction to the Special Section on “Cloud computing: Current advances and new research trends”Gomes, Danielo G. / Bittencourt, Luiz Fernando / Tolosana-Calasanz, Rafael et al. | 2015
- 138
-
Q-aware: Quality of service based cloud resource provisioningSingh, Sukhpal / Chana, Inderveer et al. | 2015
- 161
-
Tradeoff between energy and user experience for multimedia cloud computingLiu, Yunchang / Li, Chunlin / Yang, Zhiyong et al. | 2015
- 173
-
Distributed consolidation of virtual machines for power efficiency in heterogeneous cloud data centersKhani, Hadi / Latifi, Amin / Yazdani, Nasser / Mohammadi, Siamak et al. | 2015
- 186
-
Resource management in cloud computing: Taxonomy, prospects, and challengesMustafa, Saad / Nazir, Babar / Hayat, Amir / Khan, Atta ur Rehman / Madani, Sajjad A. et al. | 2015
- 204
-
Cloud-based power estimation and power-aware scheduling for embedded systemsChen, Da-Ren / Chiang, Kai-Feng et al. | 2015
- 222
-
Novel energy and SLA efficient resource management heuristics for consolidation of virtual machines in cloud data centersArianyan, Ehsan / Taheri, Hassan / Sharifian, Saeed et al. | 2015
- 241
-
Use of proactive and reactive hotspot detection technique to reduce the number of virtual machine migration and energy consumption in cloud data centerShaw, Subhadra Bose / Singh, Anil Kumar et al. | 2015
- 255
-
Introduction to the special section on critical systems modelling and securityGarcia-Alfaro, Joaquin / Longo, Francesco / Perez, Gregorio Martinez et al. | 2015
- 258
-
Security analysis of socio-technical physical systemsLenzini, Gabriele / Mauw, Sjouke / Ouchani, Samir et al. | 2015
- 275
-
On synergies of cyber and physical security modelling in vulnerability assessment of railway systemsMarrone, Stefano / Rodríguez, Ricardo J. / Nardone, Roberto / Flammini, Francesco / Vittorini, Valeria et al. | 2015
- 286
-
Assessing and managing the information and communication risk of power generationBaiardi, F. / Tonelli, F. / Guidi, L. / Pestonesi, D. / Angeletti, V. et al. | 2015
- 299
-
Awareness and reaction strategies for critical infrastructure protectionCazorla, Lorena / Alcaraz, Cristina / Lopez, Javier et al. | 2015
- 318
-
Password systems: Design and implementationDini, Gianluca / Lopriore, Lanfranco et al. | 2015
- 327
-
Detecting stealthy attacks: Efficient monitoring of suspicious activities on computer networksKalutarage, Harsha K. / Shaikh, Siraj A. / Wickramasinghe, Indika P. / Zhou, Qin / James, Anne E. et al. | 2015
- IFC
-
Editorial Board| 2015