[HTML][HTML] Advancing cloud security: Unveiling the protective potential of homomorphic secret sharing in secure cloud computing
Cloud computing security and data protection are becoming increasingly critical as its use
increases. The research we present demonstrates how undercover sharing techniques and …
increases. The research we present demonstrates how undercover sharing techniques and …
Challenges of Using Live Process Migration in Distributed Exascale Systems
Z Sohrabi, EM Khaneghah - Azerbaijan Journal of High Performance …, 2020 - 82.194.3.83
Virtual machine-based process migrator mechanisms have the potential to be used in
distributed exascale systems due to their ability to execute process execution and support …
distributed exascale systems due to their ability to execute process execution and support …
ExaLazy: A Model for Lazy-Copy Migration Mechanism to Support Distributed Exascale System
EM Khaneghah, T Khoshrooynemati… - Azerbaijan Journal of …, 2021 - 82.194.3.83
There is a possibility of dynamic and interactive nature occurring at any moment of the
scientific program implementation process in the computing system. While affecting the …
scientific program implementation process in the computing system. While affecting the …
Implementación de una arquitectura escalable basada en Google Cloud Platform para mejorar la disponibilidad y escalabilidad de información de la empresa …
RM Llontop Garcia - 2020 - tesis.usat.edu.pe
En este artículo se presenta la propuesta de una arquitectura escalable para la mejora de la
disponibilidad y escalabilidad de la información basada en google cloud platform para la …
disponibilidad y escalabilidad de la información basada en google cloud platform para la …
[PDF][PDF] Scaling Data Intensive Application Using Containerization Volunteering Cloud Computing
RA Sayany, A Aziz - Am J Compt Sci InformTechnol, 2021 - researchgate.net
The Application that is data intensive is costly to implement because it requires high
computational power and memory storage. Those applications which are not backed with …
computational power and memory storage. Those applications which are not backed with …