Showing 781–792 of 860 results

  • Swiper: Exploiting Virtual Machine Vulnerability in Third-Party

    Swiper: Exploiting Virtual Machine Vulnerability in Third-Party

    0 out of 5
    4,500

    Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Abstract?Swiper: Exploiting Virtual Machine Vulnerability in Third-Party. The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share the same physical resources (e.g., CPUs, caches, DRAM, and I/O devices), <...

  • System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments

    System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments

    0 out of 5
    4,500

    System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments Abstract? System of Systems for Quality-of-Service Observation and Response in Cloud Computing Environments. As military, academic, and commercial computing systems evolve from autonomous entities that deliver computing products into network centric enterprise systems that deliver computing as a service, opportunities emerge to consolidate…

  • System to Recommend the Best Place to Live Based on Wellness State of the User Employing the Heart Rate Variability

    System to Recommend the Best Place to Live Based on Wellness State of the User Employing the Heart Rate Variability

    0 out of 5
    4,500

    System to Recommend the Best Place to Live Based on Wellness State of the User Employing the Heart Rate Variability Abstract-The conditions of the environment a person lives in has a great impact on his wellness state. When buying a new house, it is important to select a place that aids in improving the wellness…

  • tamil ontology

    tamil ontology

    0 out of 5
    4,500

    tamil ontology   Abstract?Ontology plays a vital role in teaching and learning. In the last decade most of the learning sites were trying to adopt semantic web techniques to develop the learning materials.< Final Year Projects > It is easy to visualize the concepts that are developed in ontology in an effective manner. In this…

  • Task Scheduling in the Cloud Computing Based on the  Cuckoo Search Algorithm

    Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm

    0 out of 5
    4,500

    Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm Abstract? Task Scheduling in the Cloud Computing Based on the Cuckoo Search Algorithm. Cloud computing is the latest emerging trend in distributed computing, where shared resources are provided to end-users in an on demand fashion that brings many advantjuages, including data ubiquity, flexibility…

  • Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment

    Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment

    0 out of 5
    4,500

    Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment Abstract? Task Scheduling with Dynamic Voltage and Frequency Scaling for Energy Minimization in the Mobile Cloud Computing Environment. Mobile cloud computing (MCC) offers signi?cant opportunities in performance enhancement and energy saving for mobile, battery-powered devices. Applications running on…

  • TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

    TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

    0 out of 5
    4,500

    TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Abstract? TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud. Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of…

  • TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

    TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

    0 out of 5
    4,500

    TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud Abstract? TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud. Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of…

  • Tetris Game Application Development

    Tetris Game Application Development

    0 out of 5
    4,500

    Tetris Game Application Development Abstract-Tetris is one of the tile matching puzzle game which is widely used in video games. In Tetris games so many pieces are available which is called Tetromino. The shapes available in tetromino are L, J, I, O, S, T and Z. Tetriminos are game pieces shaped like tetrominoes, geometric shapes…

  • Text to Speech (Android App)

    Text to Speech (Android App)

    0 out of 5
    4,500

    Text to Speech (Android App) Abstract-The main aim of this project is to make an android app which convert text into speech. This app will takes user input using the GUI and converts the typed text into speech. Once the mobile media volume was set, the user typed text will be readout loudly. Any length…

  • The Role of Information in Distributed Resource Allocation

    The Role of Information in Distributed Resource Allocation

    0 out of 5
    5,500

    The Role of Information in Distributed Resource Allocation Abstract?Abstract load balancing with respect to the following aspects: Typical control models.Typical resource optimization methods.Typical methods for achieving reliability.Typical coordination mechanisms among heterogeneous nodes.Typical models considering network structures. For each aspect, we summarize the existing studies and discuss the future research directions.Through the survey, the related studies…

  • The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Network

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Network

    0 out of 5
    5,500

    The Value of Cooperation: Minimizing User Costs in Multi-broker Mobile Cloud Computing Networks Abstract? The problem of user cost minimization in mobile cloud computing (MCC) networks. We consider a MCC model where multiple brokers assign cloud resources to mobile users. The model is characterized by an heterogeneous cloud architecture (which includes a public cloud and…

End of content

End of content