Filters








3,320 Hits in 4.1 sec

A provably efficient algorithm for dynamic storage allocation

E.G. Coffman, F.T. Leighton
1989 Journal of computer and system sciences (Print)  
The design and analysis of algorithms for on-line dynamic storage allocation has been a fundamental problem area in computer science for many years.  ...  First-lit (FF) is the best known and the most studied algorithm for dynamic allocation.  ...  A. Reeds, M. I. Reiman, L. A. Shepp, P. Shor, and A. Weiss for many useful discussions.  ... 
doi:10.1016/0022-0000(89)90031-7 fatcat:525ltxyikjbofjpuua5y36vizu

Proxy Provable Data Possession in Public Clouds

Huaqun Wang
2013 IEEE Transactions on Services Computing  
From the two points, a novel distant information uprightness checking model is proposed, which is called as DPDP Distributed Provable Data Possession [8] . The replica and refuge sculpt are known.  ...  Based on the bilinear pairings, a tangible ID-DPDP protocol is intended [4] .  ...  ALGORITHM COMPARISION The comparision of two algorithm is important for find the efficient algorithm [12] .  ... 
doi:10.1109/tsc.2012.35 fatcat:d4zxobkzancrlhqmlqrskxab3i

A Provably Secure Distant Data Integrity Checking with Homomorphic Hash Function in Secure Cloud Storage

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
To tackle this drawback number of Distant Data Integrity Checking (DDIC) protocols is in the literature but these protocols have liabilities with respect to the data dynamics and the efficiency.  ...  The cloud storage with user facilities like great data storage quality, higher computing, scalable and flexible has been one of the major application of cloud computing.  ...  These models are used only for the files which has dynamics of only appending. Here the PDP model is extended to Dynamic PDP model with a better efficiency framework.  ... 
doi:10.35940/ijitee.k2115.119119 fatcat:vrtybel5qbe5pkbiea7vgqn3dm

Dynamic Data Compression and Security Based Algorithm for Big Sensing Data

G Muneeswari, M Mahalakshmi, S Lokeshwari, R Yashini
2018 International Journal of Engineering & Technology  
In this paper, we propose a data compression algorithm named data will be divided into chunks and similarity based compression for the efficient processing of sensing data on the cloud.  ...  In current technology, the big challenge lies in the efficient access to storage and evaluating sensing data as it is vital to consider the accuracy of the data.  ...  Virtual Machines had been incorporated with a market based allocation of resources and a new architecture has been proposed.  ... 
doi:10.14419/ijet.v7i2.24.12026 fatcat:skv2peq4ajh7zajb2a3d4qv2zm

2013 Annual Index

2014 IEEE Transactions on Services Computing  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Kokash, Natallia, +, TSC April-June 2013 186-200 Information storage Dynamic Audit Services for Outsourced Storages in Clouds.  ...  N F Benchmark testing Efficient Selection of Process Mining Algorithms.  ... 
doi:10.1109/tsc.2014.5 fatcat:hagb3a6lhbae5kazafxvqcwxl4

Cache and I/O efficent functional algorithms

Guy E. Blelloch, Robert Harber
2013 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '13  
In this paper we present a cost model for analyzing the memory efficiency of algorithms expressed in a simple functional language.  ...  I/O efficient algorithms.  ...  This work is partially supported by the National Science Foundation under grant number CCF-1018188, and by Intel Labs Academic Research Office for the Parallel Algorithms for Non-Numeric Computing Program  ... 
doi:10.1145/2429069.2429077 dblp:conf/popl/BlellochH13 fatcat:qdcixkg2cfdoxdz274esmiujya

Page 424 of Mathematical Reviews Vol. , Issue 91A [page]

1991 Mathematical Reviews  
T. (1-MIT) A provably efficient algorithm for dynamic storage allocation. 18th Annual ACM Symposium on Theory of Computing (Berkeley, CA, 1986). J. Comput. System Sci. 38 (1989), no. 1, 2-35.  ...  912:68117 NP-hard dynamic storage allocation problem. Previously Chrobak, the author, and Woodall applied the suboptimal greedy coloring (first fit) to the analysis of a certain allocation strategy.  ... 

Efficient Audit Services for Data Outsourcing in Clouds

Anuraj C.K
2014 IOSR Journal of Computer Engineering  
This paper introduce a dynamic audit service for integrity verification of untrusted and outsourced storages.  ...  We also propose an efficient approach based on probabilistic query and periodic verification for improving the performance of audit services.  ...  Acknowledgements I would like to take this opportunity for expressing our profound gratitude and deep regards to Mr. P.  ... 
doi:10.9790/0661-16662428 fatcat:n6c6stwusnenvfvx3i5ix5k5eu

Free2Shard

Ranvir Rana, Sreeram Kannan, David Tse, Pramod Viswanath
2022 Abstract Proceedings of the 2022 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems  
The key technical contribution is a mathematical connection to the classical work of Blackwell approachability in dynamic game theory.  ...  In this paper we make three main contributions: (a) we categorize the different sharding proposals under a common architectural framework, allowing for the emergence of a new, uniformly improved, uni-consensus  ...  These pioneering methods offer provable security as well as near-linear scaling in 𝑁 of efficiency across various resources at an individual node, including computation, storage, and communication.  ... 
doi:10.1145/3489048.3522651 fatcat:4qe67ehk4nbmnid6bi7h4ygyni

Table of contents

2020 IEEE Journal on Selected Areas in Communications  
Liu 1191 IntegrityChain: Provable Data Possession for Decentralized Storage ... Y. Li, Y. Yu, R. Chen, X. Du, and M.  ...  Wu 1102 Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads ........... W. Zhang, Z. Zhang, S.  ... 
doi:10.1109/jsac.2020.2992841 fatcat:a5dvop4cxfh3rf23ehbif2jjw4

ECIES based Privacy Preservation for the Secure Data Storage with Auditing in Cloud

Minakshi Solanki, Amit Saxena, Manish Manoria
2015 International Journal of Computer Applications  
maintaining privacy during the access or storage of data at cloud [1] .  ...  Cloud Computing is a new way of transmitting or sharing data over internet such that the communication cost can be reduces.  ...  LITERATURE SURVEY In the paper [9] , the authors proposed a cooperative provable data possession for integrity verification in multi-cloud storage.  ... 
doi:10.5120/ijca2015907606 fatcat:ys35bwqyrrez5gcw6h3athsawy

Table of Contents

2020 IEEE Systems Journal  
Li 548 A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  He 621 A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience . . . R. Ding, Y. Xu, J. Cui, and H.  ...  Valero, A. Chen, and W. Z. Song 1277 Adaptive and Stable Delay Control for Combating Bufferbloat: Theory and Algorithms . . . . . . . . . . J. Ye and K.-C.  ... 
doi:10.1109/jsyst.2019.2960705 fatcat:edoalftokzf7xdhmt7lwzhwjeq

Secure and Multi Copy Dynamic Information Possession in Cloud System

2020 International journal of recent technology and engineering  
A Mapping Based Dynamic Data possession scheme is proposed, to provide the guarantee to the customer that CSP isn't conning by putting away just barely any duplicates of information.  ...  This plan underpins Dynamic activities on the re-appropriated data.  ...  Utilization of the allocated space is neither effective nor efficient. B. Proposed System In Proposed system, Mapping Based Provable Multicopy Dynamic Data Possession is used.  ... 
doi:10.35940/ijrte.e6698.018520 fatcat:uie7ttsfyjck3m3dcnyuktwffy

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
., +, TPDS Sept. 2014 2234-2244 On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.  ...  ., +, TPDS Sept. 2014 2386-2396 On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage.  ...  on Homogeneous Multiprocessors. 1510 -1521 In-Network Cache Management and Resource Allocation for Information-Centric Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

2021 Index IEEE Transactions on Services Computing Vol. 14

2022 IEEE Transactions on Services Computing  
The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Public Integrity Checking with Dynamic Groups for Cloud Storage.  ...  -Feb. 2021 1-15 Auditing SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage.  ... 
doi:10.1109/tsc.2021.3135765 fatcat:cvny2iyuazb5tncphn74iq2o4e
« Previous Showing results 1 — 15 out of 3,320 results