Filters








191,156 Hits in 3.5 sec

Storage utilization in a self-organizing data base

P. M. Stocker
1977 Proceedings of the June 13-16, 1977, national computer conference on - AFIPS '77  
The controlling mechanisms within a self-organizing base are concerned with maintaining the balance between search efficiency and update efficiency, and with resolving conflicting requirements for physical  ...  This paper shows how the concept of the value of store to a process may be used in the control mechanisms, and discusses the connection between values derived from theory and values measurable in operation  ...  INTRODUCTION A proposal for the general structure of a self-organizing data management system was made in Stocker and Dearnley; 1 an account of a pilot implementation was given in Dearnley;2 and some account  ... 
doi:10.1145/1499402.1499429 dblp:conf/afips/Stocker77 fatcat:bxuluzvu7bevbdqja4t42nbxae

DuDE-Cloud: A resilient high performance cloud

Peter Danielis, Jan Skodzik, Vlado Altmann, Frank Golatowski, Dirk Timmermann
2015 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA)  
The basis is the self-organizing hash table (DHT)-based P2P storage and computing back-end called DuDE, which utilizes the DHT protocol Kad.  ...  This paper investigates the combination of CDMI with a P2Pbased storage and computing back-end in order to realize a self-organizing cloud for distributed data storage and processing called DuDE-Cloud.  ...  The distributed hash table (DHT)-based P2P network Kad has beeen utilized to exemplarily connect the devices of an Internet service provider's access networkscalled access nodes (ANs)-in a self-organizing  ... 
doi:10.1109/etfa.2015.7301658 dblp:conf/etfa/DanielisSAGT15 fatcat:vltu4h7rdza2vjdmtwf3cyni6y

A Secured Cloud Data Storage with Access Privileges

Naresh Vurukonda, B. Thirumala Rao, B. Tirapathi Reddy
2016 International Journal of Electrical and Computer Engineering (IJECE)  
To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists.  ...  multi cloud environment and reducing the meta data management, there by the cloud storage become more attractive and many users will adopt the cloud space in order to diminish the data storage cost.  ...  Self-satisfied Mug a photograph dissemination Website facilitated terabytes of photographs on Amazon S3 in 2006 and spared a great many dollars on proceed with capacity gadgets utilizing distributed storage  ... 
doi:10.11591/ijece.v6i5.10820 fatcat:vqqay5t2z5frdo7qygocelkmba

CLOUD COMPUTING-TECHNOLOGIES

Mohammad Ilyas Malik
2018 International Journal of Advanced Research in Computer Science  
It offers an on-demand and scalable access to a shared pool of resources hosted in a data Centre at providers' site.  ...  It is a web-based technology where quality services are provided to users including data and software, on remote servers.  ...  Cloud computing offers organization an expanded storage than traditional storage systems.  ... 
doi:10.26483/ijarcs.v9i2.5760 fatcat:casx2ncf5nd6tblvfq77hdfl4e

Conceptualization of Cloud Computing and its Security Threats, Challenges, Technologies and Application

Gaurav Dhawan
2017 International Journal for Research in Applied Science and Engineering Technology  
Cloud computing is the utilization of computer resources i.e. hardware and software which are delivered as service over a network.  ...  It is platform that offer high performance computation capability and managed by individual organization. Cloud provides use of virtualization technologies combine with self-service.  ...  Utility Computing Utility computing is based on Pay per Use model. It offers computational resources on demand as a metered service.  ... 
doi:10.22214/ijraset.2017.4112 fatcat:6qfzzytj3bai7nko6wfswxwedu

Decision-Guided Self-Architecting Framework for integrated distribution and Energy Management

Jorge Arinez, Stephan Biller, Alexander Brodsky, Daniel Menasce, Guodong Shao, Joao P. Sousa
2011 ISGT 2011  
This paper proposes the development of a set of technologies in the form of Decision-Guided Self-Architecting (DGSA) Framework whose purpose is to provide integrated, real-time optimal decision support  ...  In addition, this paper also describes the supporting technologies upon which the framework is based and presents two key applications of the DGSA Framework: Energy Management Systems and an Energy Investment  ...  messages exchange between utilities and commercial/industrial customers for price-responsive and direct load control (OpenADR), an open standard for data exchange based on a publish/subscribe mechanism  ... 
doi:10.1109/isgt.2011.5759190 fatcat:mhmotjc3pne67h76uupa4xfjne

Autonomic Fog Computing: Towards Sustainable and Reliable Integration of Cloud & Internet of Things

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
We proposed a concept of self-awareness in Fog computing termed as Autonomic Fog Computing.  ...  With the growth of IoT based applications day by day huge volume of data is generated, which becomes a challenging issue for researchers.  ...  This system logs the data of shortcomings and when some flaw happens whose fix is spared in the log then application recoups itself utilizing the logged data consequently a self-mending property of self-administration  ... 
doi:10.35940/ijitee.i1157.0789s19 fatcat:rfrnvef3znb6tbpf2ehtpzdfnq

Encoding Information in DNA: From Basic Structure to Nanoelectronics

Mohammed Enamul Hoque, Nordiana Rajaee
2017 American Journal of Nanomaterials  
problems utilizing the advantages of parallelism and high-density storage characteristics of DNA.  ...  A concise discussion regarding the splendid advances in constructing nanoelectronics employing DNA computing paradigm and challenges of DNA computing is focused in this paper.  ...  DNA as Data Storage DNA is the information carrier of all living organism which can store huge amount of genetic information in a small size.  ... 
doi:10.12691/ajn-5-2-2 fatcat:4hth6cywjfbh7d3hnmwuwiysny

Evolution of the LHAASO Distributed Computing System based Cloud

Qiulan Huang, Haibo Li, Yaodong Cheng, Qingbao Hu, Wei Zheng
2019 Zenodo  
To accomplish these goals, LHAASO contains four detector arrays, which generates huge amounts of data and requires mass storage and high performance computing system.  ...  And the dedicated computing resource of LHAASO locates in Beijing, Daocheng and Chengdu as well as resources from collaborated organizations.  ...  ~6PB/year LHAASO Dataflow Large Offline data center at CC-IHEP ~4000 CPU cores and 4PB disk storage, 20PB tape storage for simulation, reconstruction, analysis, data storage and archive Small  ... 
doi:10.5281/zenodo.3599201 fatcat:732lvelik5amjemrr5vmi6risi

Benefits Management of Cloud Computing Investments

Richard Greenwell, Xiaodong Liu, Kevin Chalmers
2014 International Journal of Advanced Computer Science and Applications  
The motivation for writing this paper is to consider the business benefits generated from utilizing cloud computing in a range of organizations.  ...  It was found that smaller organizations can generate rapid growth using strategies based on cloud computing. Larger organizations have used utility approaches to reduce the costs of IT infrastructure.  ...  XIII CLOUD OWNERSHIP MODELS OF ORGANIZATIONS Ownership Description Case Study Public Clouds Utility based Organization A, Organization B Hybrid Clouds Some utility aspects Organization D, Organization  ... 
doi:10.14569/ijacsa.2014.050701 fatcat:dlqmrorvzngi3cdodi5xab2izi

User Storage Allocation In Virtual Machine Using Map-Reduced System

Ms.Jyoti Girhe, Mr. Amol Chavan
2016 Zenodo  
This paper will address a major issue in selecting virtual machines that will improve working for user allocation for storage of user data. https://www.ijiert.org/paper-details?paper_id=140692  ...  A driving force of the growth in the popularity of Map-Reduce is the need for a system t o handle and process data. Map-Reduce is a system,which can handle varied quantities of dat a.  ...  There are a couple of reasons why storage is the focus for this paper. First, it is the mechanism that most of the organizations for managing their user data efficiently.  ... 
doi:10.5281/zenodo.1466596 fatcat:vjk5gbpqvzdnrdcvnu2n4ohcne

An Advanced Strategy of Multi User Storage System for Cloud Computing

2019 International journal of recent technology and engineering  
The developers have recognized the required of a multi USER storage system that can help in utilizing the cloud power by enhancing its functionality and improve its performance.  ...  In cloud computing, client can use and retrieve the services anytime by using any smart devices to manage complex computing processes and to access very large data storage.  ...  The security provided to the system will be designed based on the storage. The both layers in the system will store the data in efficient way.  ... 
doi:10.35940/ijeat.b3208.129219 fatcat:wjkajezvxncbzmjjkt3w3tgb2e

Comparative study between Cluster, Grid, Utility, Cloud and Autonomic computing

Samah Mawia Ibrahim Omer, Amin Babiker A.Mustafa, Fatema Abdallah Elmahdi Alghali
2014 IOSR Journal of Electrical and Electronics Engineering  
Autonomic computing was an idea that came to existence because of the great need to its basic concepts, which it's to have available resources, applications that can manage themselves in accordance with  ...  The idea of Autonomic computing is not new, but it developed Cloud computing through the years to reach the current situation (Autonomic computing) In this paper there will be an overview for other types  ...  [1] The cloud is a dynamic computing infrastructure, IT service-centric approach; also it's a self-service based usage model and self-managed platform and its consumption based on billing, the computers  ... 
doi:10.9790/1676-09636167 fatcat:7mgzmsdmhbbszo5mjsuimrdqg4

A Secured Cloud Data Storage with Access Privilages

Naresh Vurukonda, B.Thirumala Rao
2016 Indonesian Journal of Electrical Engineering and Informatics (IJEEI)  
To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists.  ...  A configuration and instrument FADE, and a safe overlay distributed storage framework that achieve fine-grained, strategy based methodology control and document guaranteed erasure.  ...  Self-satisfied Mug a photograph dissemination Website facilitated terabytes of photographs on Amazon S3 in 2006 and spared a great many dollars on proceed with capacity gadgets utilizing distributed storage  ... 
doi:10.11591/ijeei.v4i3.231 fatcat:ajmrwpeaozharavxeskdkv3twe

Cloud Computing and its Techniques to Improve Data Security and Storage Utilization

Eng Jasim M A Albazzaz, Anwar J Alzaid
2016 IJARCCE  
Additionally deduplication technique is discussed to improve storage utilization in the cloud environment. Finally, we provide some cloud security recommendations.  ...  In this paper, we identify the major security issues and security threats. This paper provides techniques to improve data security by discussing the cryptography and authentication concepts.  ...  could improve storage utilization and system performance.  ... 
doi:10.17148/ijarcce.2016.51122 fatcat:2cbqk7su6rej7cvjkut3fyuaky
« Previous Showing results 1 — 15 out of 191,156 results