„cloud computing“
Suchergebnisse
6.579 Treffer
-
Design of intelligent acquisition system for moving object trajectory data under cloud computing
-
Performance Modeling of Load Balancing Techniques in Cloud: Some of the Recent Competitive Swarm Artificial Intelligence-based
-
Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment
-
Deadline Constrained Task Scheduling Method Using a Combination of Center-Based Genetic Algorithm and Group Search Optimization
-
Hybridization of Genetic and Group Search Optimization Algorithm for Deadline-Constrained Task Scheduling Approach
-
Resource allocation strategies and task scheduling algorithms for cloud computing: A systematic literature review
-
High-Performance SiL Testing für ADAS-Applikationssoftware
-
The improvement of the distributed computing efficiency in cloud–fog environments using data mining and metaheuristic algorithms
-
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments
-
Integrating semantic web into context-aware mobile application based on cloud computing
-
Identifying the impact of G-Quadruplexes on Affymetrix 3′ Arrays using Cloud Computing
-
Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
-
Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
-
Econometrics Pedagogy and Cloud Computing: Training the Next Generation of Economists and Data Scientists
-
Quality aware batch scheduling of containers in cloud computing environment
-
OntoIDF: a smart knowledge-based framework for intrusion detection in autonomous cloud computing environment
-
„Wachstum braucht Innovationen“
-
A fault-tolerant model for cloud computing environment using seagull-optimized artificial neural network (SOANN)
-
Special issue on data management - principles, technologies, and applications
-
Wissensbasiertes IT-Projektmanagement mit KI- und Cloud-Techniken – systematische Wiederverwendung von Erfahrungswissen über sicherheitskritische IT-Projekte auf der Basis von Ontologien, Case-based Reasoning und Word2Vec