Hybrid Job-Driven Scheduling for Virtual Map Reduce Clusters

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Resource Allocation in Cloud Computing Using the Uncertainty Principle of Game Theory

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
A Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Game Theoretic Resource Allocation in Media Cloud with Mobile Social Users

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Secure Distributed Deduplication Systems with Improved Reliability

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Dynamic Resource Allocation Using Virtual Machines For Cloud Computing Environment

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
IP-Geolocation Mapping for Moderately Connected Internet Regions

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design

emc2emmc2emc2emmc2emc2emmc2emc2emmc2

6/9/2017

Full-text available on request