Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (26)
- Physical Sciences and Mathematics (26)
- Information Security (14)
- Engineering (6)
- Social and Behavioral Sciences (5)
-
- Databases and Information Systems (4)
- Medicine and Health Sciences (4)
- Business (3)
- Communication (3)
- Health Information Technology (3)
- Management Information Systems (3)
- OS and Networks (3)
- Computer Engineering (2)
- Electrical and Computer Engineering (2)
- Life Sciences (2)
- African Studies (1)
- Bioinformatics (1)
- Categorical Data Analysis (1)
- Communication Technology and New Media (1)
- Computer and Systems Architecture (1)
- Critical and Cultural Studies (1)
- Data Storage Systems (1)
- E-Commerce (1)
- Economics (1)
- Education (1)
- Educational Administration and Supervision (1)
- Electrical and Electronics (1)
- Growth and Development (1)
- Human Resources Management (1)
- Industrial Engineering (1)
- Institution
-
- Singapore Management University (14)
- New Jersey Institute of Technology (3)
- Brigham Young University (2)
- Walden University (2)
- California State University, San Bernardino (1)
-
- Chinese Academy of Sciences (1)
- City University of New York (CUNY) (1)
- Harrisburg University of Science and Technology (1)
- Kennesaw State University (1)
- Kettering University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Nova Southeastern University (1)
- Old Dominion University (1)
- Portland State University (1)
- Providence (1)
- St. Cloud State University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- University for Business and Technology in Kosovo (1)
- University of Massachusetts Amherst (1)
- University of Miami Law School (1)
- University of Nevada, Las Vegas (1)
- University of Richmond (1)
- University of Texas at Arlington (1)
- Utah State University (1)
- Western Michigan University (1)
- Zayed University (1)
- Publication
-
- Research Collection School Of Computing and Information Systems (14)
- Dissertations (3)
- International Congress on Environmental Modelling and Software (2)
- Walden Dissertations and Doctoral Studies (2)
- All Works (1)
-
- Articles (1)
- Articles, Abstracts, and Reports (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- CCE Theses and Dissertations (1)
- Computer Science Faculty Research (1)
- Computer Science Theses & Dissertations (1)
- Computer Science and Engineering Theses (1)
- Culminating Projects in Information Assurance (1)
- Dissertations and Theses (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations (1)
- Electronic Theses, Projects, and Dissertations (1)
- Engineering and Technology Management Faculty Publications and Presentations (1)
- Heroism Science (1)
- Industrial & Manufacturing Engineering Publications (1)
- International Finance and Accounting (1)
- International Journal of Business and Technology (1)
- Irish Communication Review (1)
- Masters Theses (1)
- Theses - ALL (1)
- University of Miami Inter-American Law Review (1)
- Young African Leaders Journal of Development (1)
- Publication Type
Articles 31 - 44 of 44
Full-Text Articles in Entire DC Network
Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem
Leveraging Resources On Anonymous Mobile Edge Nodes, Ahmed Salem
Computer Science Theses & Dissertations
Smart devices have become an essential component in the life of mankind. The quick rise of smartphones, IoTs, and wearable devices enabled applications that were not possible few years ago, e.g., health monitoring and online banking. Meanwhile, smart sensing laid the infrastructure for smart homes and smart cities. The intrusive nature of smart devices granted access to huge amounts of raw data. Researchers seized the moment with complex algorithms and data models to process the data over the cloud and extract as much information as possible. However, the pace and amount of data generation, in addition to, networking protocols transmitting …
Efficient Redundancy Techniques In Cloud And Desktop Grid Systems Using Map/G/C-Type Queues, Srinivas R. Chakravarthy, Alexander Rumyantsev
Efficient Redundancy Techniques In Cloud And Desktop Grid Systems Using Map/G/C-Type Queues, Srinivas R. Chakravarthy, Alexander Rumyantsev
Industrial & Manufacturing Engineering Publications
Cloud computing is continuing to prove its flexibility and versatility in helping industries and businesses as well as academia as a way of providing needed computing capacity. As an important alternative to cloud computing, desktop grids allow to utilize the idle computer resources of an enterprise/community by means of distributed computing system, providing a more secure and controllable environment with lower operational expenses. Further, both cloud computing and desktop grids are meant to optimize limited resources and at the same time to decrease the expected latency for users. The crucial parameter for optimization both in cloud computing and in desktop …
Data Sharing And Access Using Aggregate Key Concept, Rahul Veeravelli
Data Sharing And Access Using Aggregate Key Concept, Rahul Veeravelli
Culminating Projects in Information Assurance
Cloud Storage is a capacity of information online in the cloud, which is available from different and associated assets. Distributed storage can provide high availability and consistent quality, reliable assurance, debacle free restoration, and reduced expense. Distributed storage has imperative usefulness, i.e., safely, proficiently, adaptably offering information to others. Data privacy is essential in the cloud to ensure that the user’s identity is not leaked to unauthorized persons. Using the cloud, anyone can share and store the data, as much as they want. To share the data in a secure way, cryptography is very useful. By using different encryption techniques, …
An Efficient And Privacy-Preserving Biometric Identification Scheme In Cloud Computing, Liehuang Zhu, Chuan Zhang, Chang Xu, Ximeng Liu, Cheng Huang
An Efficient And Privacy-Preserving Biometric Identification Scheme In Cloud Computing, Liehuang Zhu, Chuan Zhang, Chang Xu, Ximeng Liu, Cheng Huang
Research Collection School Of Computing and Information Systems
Biometric identification has become increasingly popular in recent years.With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which, however, brings potential threats to users’ privacy. In this paper, we propose an efficient and privacy-preserving biometric identification outsourcing scheme. Specifically, the biometric: To execute a biometric identification, the database owner encrypts the query data and submits it to the cloud. The cloud performs identification operations over the encrypted database and returns the result to the database …
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
A Metrics Suite Of Cloud Computing Adoption Readiness, Robert J. Kauffman, Dan Ma, Martin Yu
Research Collection School Of Computing and Information Systems
Recent research on cloud computing adoption suggests the lack of a deep understanding of its benefits by managers and organizations. We present a firm-level cloud computing readiness metrics suite and assess its applicability for various cloud computing service types. We propose four relevant categories for firm-level adoption readiness, including technology and performance, organization and strategy, economic and valuation, and regulatory and environmental dimensions. We further define sub-categories and measures for each. Our evidence of the appropriateness of the metrics suite is derived based on a series of empirical cases developed from our project work, which encompasses input from field interviews, …
A Cloud-Based Architecture For Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, Halima Elbiaze
A Cloud-Based Architecture For Multimedia Conferencing Service Provisioning, Abbas Soltanian, Fatna Belqasmi, Sami Yangui, Mohammad A. Salahuddin, Roch Glitho, Halima Elbiaze
All Works
Multimedia conferencing is the real-time exchange of multimedia content between multiple parties. It is the basis of several interactive multiuser applications, such as distance learning and multimedia multiplayer online games. The cloud-based provisioning of the conferencing services on which these applications rely on can have several benefits, including the easy provisioning of new applications, efficient use of resources, and elastic scalability. This paper proposes a holistic cloud-based architecture for conferencing service provisioning, which covers both the infrastructure and platform layers of the cloud. The proposed infrastructure layer offers conferencing substrates-as-a-service (e.g., dial-in signaling, video mixing, and audio mixing), instead of …
Energy Saving In Data Centers, Wolfgang W. Bein
Energy Saving In Data Centers, Wolfgang W. Bein
Computer Science Faculty Research
Globally CO2 emissions attributable to Information Technology are on par with those resulting from aviation. Recent growth in cloud service demand has elevated energy efficiency of data centers to a critical area within green computing. Cloud computing represents a backbone of IT services and recently there has been an increase in high-definition multimedia delivery, which has placed new burdens on energy resources. Hardware innovations together with energy-efficient techniques and algorithms are key to controlling power usage in an ever-expanding IT landscape. This special issue contains a number of contributions that show that data center energy efficiency should be addressed from …
Digital Transformation And Jobs: Building A Cloud For Everyone, Robert Ivanschitz, Daniel Korn
Digital Transformation And Jobs: Building A Cloud For Everyone, Robert Ivanschitz, Daniel Korn
University of Miami Inter-American Law Review
No abstract provided.
Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim
Factors That Contribute To The Resistance To Cloud Computing Adoption By Tech Companies Vs. Non-Tech Companies, Zadok Hakim
CCE Theses and Dissertations
Cloud computing (CC) may be the most significant development in recent history for businesses seeking to utilize technology. However, the adoption of CC hinges on many factors, and can have a greater positive impact on organizational performance. This study examined the different factors that contribute to the resistance to CC adoption. Anchored in The Theory of Technology-Organization-Environment (TOE), the study used a qualitative, grounded theory approach to develop a theoretical model for the acceptance of CC across firms. CC can have significant effects on efficiency and productivity for firms, but these effects will only be realized if IT usage becomes …
Improving Software Projects With Cloud Computing, Sunil Maddipatla
Improving Software Projects With Cloud Computing, Sunil Maddipatla
Dissertations and Theses
As organizations are experiencing regular unforgiving financial conditions, ideas, for example, outsourcing, deft and lean administration, change administration and cost diminishment are always increasing more consideration. This is on the grounds that these ideas are altogether gone for saving money on spending plans and confronting sudden changes. Most recent innovations like cloud computing guarantee to turn IT, that has dependably been seen as a cost focus, into a wellspring of sparing cash and driving adaptability and dexterity to the business. The motivation behind this paper is to first incorporate an arrangement of properties that administer the deftness benefits added to …
Applying Utaut To Determine Intent To Use Cloud Computing In K-12 Classrooms, Dorothy Cortez Kropf
Applying Utaut To Determine Intent To Use Cloud Computing In K-12 Classrooms, Dorothy Cortez Kropf
Walden Dissertations and Doctoral Studies
Although school districts provide collaborative cloud computing tools such as OneDrive and Google Drive for students and teachers, the use of these tools for grading and feedback purposes remains largely unexplored. Therefore, it is difficult for school districts to make informed decisions on the use of cloud applications for collaboration. This quantitative, nonexperimental study utilized Venkatesh et al.'s unified theory of acceptance and use of technology (UTAUT) to determine teachers' intent to use collaborative cloud computing tools. Online surveys with questions pertaining to UTAUT's predictor variables of performance expectancy (PE), effort expectancy (EE), social influence (SI), facilitating conditions (FC) and …
Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey
Strategies To Manage Cloud Computing Operational Costs, Frankie Nii A Sackey
Walden Dissertations and Doctoral Studies
Information technology (IT) managers worldwide have adopted cloud computing because of its potential to improve reliability, scalability, security, business agility, and cost savings; however, the rapid adoption of cloud computing has created challenges for IT managers, who have reported an estimated 30% wastage of cloud resources. The purpose of this single case study was to explore successful strategies and processes for managing infrastructure operations costs in cloud computing. The sociotechnical systems (STS) approach was the conceptual framework for the study. Semistructured interviews were conducted with 6 IT managers directly involved in cloud cost management. The data were analyzed using a …
Hybrid Privacy-Preserving Clinical Decision Support System In Fog-Cloud Computing, Ximeng Liu, Robert H. Deng, Yang Yang, Ngoc Hieu Tran, Shangping Zhong
Hybrid Privacy-Preserving Clinical Decision Support System In Fog-Cloud Computing, Ximeng Liu, Robert H. Deng, Yang Yang, Ngoc Hieu Tran, Shangping Zhong
Research Collection School Of Computing and Information Systems
In this paper, we propose a framework for hybrid privacy-preserving clinical decision support system in fog cloud computing, called HPCS. In HPCS, a fog server uses a lightweight data mining method to securely monitor patients' health condition in real-time. The newly detected abnormal symptoms can be further sent to the cloud server for high-accuracy prediction in a privacy-preserving way. Specifically, for the fog servers, we design a new secure outsourced inner-product protocol for achieving secure lightweight single-layer neural network. Also, a privacy-preserving piecewise polynomial calculation protocol allows cloud server to securely perform any activation functions in multiple-layer neural network. Moreover, …
A Lightweight Policy Preserving Ehr Sharing Scheme In The Cloud, Zuobin Ying, Lu Wei, Qi Li, Ximeng Liu, Jie Cui
A Lightweight Policy Preserving Ehr Sharing Scheme In The Cloud, Zuobin Ying, Lu Wei, Qi Li, Ximeng Liu, Jie Cui
Research Collection School Of Computing and Information Systems
Electronic Health Record (EHR) is a digital health documentary. It contains not only the health-related records but also the personal sensitive information. Therefore, how to reliably share EHR through the cloud is a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptography prototype, which can achieve fine-grained access control as well as one-to-many encryption. In CP-ABE, access policy is attached to the ciphertext, and however, the access policy is not protected, which will also cause some privacy leakage. In this paper, we propose a policy preserving EHR system on the basis of CP-ABE. Specifically, we designed an algorithm, which …