Gotowa bibliografia na temat „Cloud computing and storage”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Cloud computing and storage”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Cloud computing and storage"
Joshi, Pratik R. "Deduplication using Cloud Computing." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem30186.
Pełny tekst źródłaPrerana, M. Suryawanshi, A. Patil Sangram, and S. Shewale Ajinkya. "General Discussion about Cloud Computing." Recent Trends in Cloud Computing and Web Engineering 2, no. 2 (2020): 1–4. https://doi.org/10.5281/zenodo.3937977.
Pełny tekst źródłaAiyer, Viswanath, Rohit Bhutkar, Sagar Anvekar, and Dinesh Chavan. "Guaranteeing Data Storage Security in Cloud Computing." International Journal of Engineering Research 4, no. 5 (2015): 231–34. http://dx.doi.org/10.17950/ijer/v4s5/504.
Pełny tekst źródłaSong, Kai. "Research of Distributed Cache Technology Based on Cloud Computing." Applied Mechanics and Materials 443 (October 2013): 477–81. http://dx.doi.org/10.4028/www.scientific.net/amm.443.477.
Pełny tekst źródłaCholkar, Pushpjeet, and Margi Patel. "Introduction: Cloud Storage Security and Homomorphic Encryption in Cloud Computing." International Journal of Science and Research (IJSR) 12, no. 10 (2023): 1816–22. http://dx.doi.org/10.21275/sr231017115439.
Pełny tekst źródłaGautam, Pratiksha, Mohd Dilshad Ansari, and Surender Kumar Sharma. "Enhanced Security for Electronic Health Care Information Using Obfuscation and RSA Algorithm in Cloud Computing." International Journal of Information Security and Privacy 13, no. 1 (2019): 59–69. http://dx.doi.org/10.4018/ijisp.2019010105.
Pełny tekst źródłaShubhangi, Sahare, and Dr.D.V.Rojatkar. "Cloud Computing." International Journal of Trend in Scientific Research and Development 1, no. 6 (2017): 786–89. https://doi.org/10.31142/ijtsrd4685.
Pełny tekst źródłaAnish, Chandan, and Karthikeyan R. "Designing an Energy-Efficient Cloud Network." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 04 (2015): 1654–56. https://doi.org/10.5281/zenodo.14776340.
Pełny tekst źródłaSantiko, Irfan, and Rahman Rosidi. "PEMANFAATAN PRIVATE CLOUD STORAGE SEBAGAI MEDIA PENYIMPANAN DATA E-LEARNING PADA LEMBAGA PENDIDIKAN." JURNAL TEKNIK INFORMATIKA 10, no. 2 (2018): 137–46. http://dx.doi.org/10.15408/jti.v10i2.6992.
Pełny tekst źródłaOuf, Shimaa, and Mona Nasr. "Cloud Computing." International Journal of Cloud Applications and Computing 5, no. 2 (2015): 53–61. http://dx.doi.org/10.4018/ijcac.2015040104.
Pełny tekst źródłaRozprawy doktorskie na temat "Cloud computing and storage"
Arteaga, Clavijo Dulcardo Ariel. "Flash Caching for Cloud Computing Systems." FIU Digital Commons, 2016. http://digitalcommons.fiu.edu/etd/2496.
Pełny tekst źródłaAl, Beshri Aiiad Ahmad M. "Outsourcing data storage without outsourcing trust in cloud computing." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/61738/1/Aiiad_Ahmad_M._Al_Beshri_Thesis.pdf.
Pełny tekst źródłaGonçalves, André Miguel Augusto. "Estimating data divergence in cloud computing storage systems." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/10852.
Pełny tekst źródłaBlakstad, Kåre Marius, and Mats Andreassen. "Security in Cloud Computing : A Security Assessment of Cloud Computing Providers for an Online Receipt Storage." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-21041.
Pełny tekst źródłaGlushchenko, Volodymyr. "Cloud technology." Thesis, Дніпровський національний університет залізничного транспорту імені академіка В. Лазаряна, 2019. https://er.knutd.edu.ua/handle/123456789/14705.
Pełny tekst źródłaRusanova, Olga, Alexander Korochkin, and Oleg Shevelo. "Scheduling problems for mobile cloud computing." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50689.
Pełny tekst źródłaAlJabban, Tarek. "Distributed database storage management for a cloud computing infrastructure." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114556.
Pełny tekst źródłaSILVA, Thiago Jamir e. "Uma arquitetura de cloud storage para backup de arquivos." Universidade Federal de Pernambuco, 2014. https://repositorio.ufpe.br/handle/123456789/18013.
Pełny tekst źródłaBuop, George Onyango. "Data storage security for cloud computing using elliptic curve cryptography." Master's thesis, University of Cape Town, 2020. http://hdl.handle.net/11427/32489.
Pełny tekst źródłaNielsen, Simon, and Robin Karlsson. "Implementing a Synchronization Application for Cloud Computing." Thesis, Linköpings universitet, Programvara och system, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81366.
Pełny tekst źródłaKsiążki na temat "Cloud computing and storage"
Hua, Yu, and Xue Liu. Searchable Storage in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-2721-6.
Pełny tekst źródłaDeshpande, Prachi S., Subhash C. Sharma, and Sateesh K. Peddoju. Security and Data Storage Aspect in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-6089-3.
Pełny tekst źródłaCoyne, Larry. IBM SmartCloud storage access V1.1 configuration cookbook. IBM Corp., International Technical Support Organization], 2013.
Znajdź pełny tekst źródłaMichael, Slisinger, ed. Virtualization changes everything: Storage strategies for VMware vSphere and cloud computing. publisher not identified, 2012.
Znajdź pełny tekst źródłaCoyne, Larry. IBM SmartCloud Storage Access V1.2 implementation guide. 2nd ed. IBM Corp., International Technical Support Organization, 2014.
Znajdź pełny tekst źródłaHill, Richard. Guide to Cloud Computing: Principles and Practice. Springer London, 2013.
Znajdź pełny tekst źródłaInternational Business Machines Corporation. International Technical Support Organization, ed. Managing security and compliance in cloud or virtualized data centers. IBM Corp., International Technical Support Organization], 2013.
Znajdź pełny tekst źródłaGermany) Archivwissenschaftliches Kolloquium der Archivschule Marburg (21st 2016 Marburg. Born digital in the cloud: Challenges and solutions : contributions to the 21. Archival Science Colloquium/International Symposium of InterPARES Trust = Beiträge zum 21. Archivwissenschaftlichen Kolloqium der Archivschule Marburg. Archivschule Marburg, 2018.
Znajdź pełny tekst źródłaYe, Kejiang, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2021. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96326-2.
Pełny tekst źródłaLuo, Min, and Liang-Jie Zhang, eds. Cloud Computing – CLOUD 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94295-7.
Pełny tekst źródłaCzęści książek na temat "Cloud computing and storage"
Comer, Douglas E. "Virtual Storage." In The Cloud Computing Book. Chapman and Hall/CRC, 2021. http://dx.doi.org/10.1201/9781003147503-10.
Pełny tekst źródłaChen, Yu, Wei-Shinn Ku, Jun Feng, Pu Liu, and Zhou Su. "Secure Distributed Data Storage in Cloud Computing." In Cloud Computing. John Wiley & Sons, Inc., 2011. http://dx.doi.org/10.1002/9780470940105.ch8.
Pełny tekst źródłaMishra, Pravin. "AWS Storage Services." In Cloud Computing with AWS. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9172-6_4.
Pełny tekst źródłaWang, Zhan, Kun Sun, Sushil Jajodia, and Jiwu Jing. "Proof of Isolation for Cloud Storage." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_5.
Pełny tekst źródłaAntu, Antara Debnath, Anup Kumar, Robert Kelley, and Bin Xie. "Comparative Analysis of Cloud Storage Options for Diverse Application Requirements." In Cloud Computing – CLOUD 2021. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96326-2_6.
Pełny tekst źródłaSondur, Sanjeev, and Krishna Kant. "Towards Automated Configuration of Cloud Storage Gateways: A Data Driven Approach." In Cloud Computing – CLOUD 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23502-4_14.
Pełny tekst źródłaGutierrez, Felipe Oliveira, Vinicius Cardoso Garcia, Jose Fernando S. Cardoso, et al. "uStorage - A Storage Architecture to Provide Block-Level Storage Through Object-Based Storage." In Service-Oriented and Cloud Computing. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67262-5_16.
Pełny tekst źródłaPöppke, Tobias, and Dirk Achenbach. "ReDS: A System for Revision-Secure Data Storage." In Trusted Cloud Computing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12718-7_4.
Pełny tekst źródłaHua, Yu, and Xue Liu. "Backgrounds of Searchable Storage." In Searchable Storage in Cloud Computing. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-2721-6_1.
Pełny tekst źródłaBoopathy, D., and M. Sundaresan. "Secured Cloud Data Storage––Prototype Trust Model for Public Cloud Storage." In Advances in Intelligent Systems and Computing. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_35.
Pełny tekst źródłaStreszczenia konferencji na temat "Cloud computing and storage"
Umesh, Preksha, Ramannya Srivastava, Nisha Kumari, Maahira Khan, and P. Hemavathi. "DRA: Data Storage Security in Cloud Computing." In 2025 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2025. https://doi.org/10.1109/ickecs65700.2025.11035619.
Pełny tekst źródłaPratama Hartono, Ardhi Putra, Andrey Brito, and Christof Fetzer. "CRISP: Confidentiality, Rollback, and Integrity Storage Protection for Confidential Cloud-Native Computing." In 2024 IEEE 17th International Conference on Cloud Computing (CLOUD). IEEE, 2024. http://dx.doi.org/10.1109/cloud62652.2024.00026.
Pełny tekst źródłaLi, Wubin, and Benoit Tremblay. "Storage Benchmarking for Workload Aware Storage Platform." In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, 2016. http://dx.doi.org/10.1109/cloud.2016.0118.
Pełny tekst źródłaAgmon, Shunit, Orna Agmon Ben-Yehuda, and Assaf Schuster. "Collusion in Cloud Computing Auctions." In SYSTOR '18: International Systems and Storage Conference. ACM, 2018. http://dx.doi.org/10.1145/3211890.3211911.
Pełny tekst źródłaAarthy Priscilla, G. "Cloud Computing Elastic Storage System for Storage Optimization." In 2022 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2022. http://dx.doi.org/10.1109/icict54344.2022.9850781.
Pełny tekst źródłaYan Wang, Yuxia Sun, and Zhi Li. "Cloud computing key management mechanism for cloud storage." In Third International Conference on Cyberspace Technology (CCT 2015). Institution of Engineering and Technology, 2015. http://dx.doi.org/10.1049/cp.2015.0855.
Pełny tekst źródłaWu, Jiyi, Lingdi Ping, Xiaoping Ge, Ya Wang, and Jianqing Fu. "Cloud Storage as the Infrastructure of Cloud Computing." In 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI). IEEE, 2010. http://dx.doi.org/10.1109/icicci.2010.119.
Pełny tekst źródłaHellge, Cornelius, and Muriel Medard. "Multi-code Distributed Storage." In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, 2016. http://dx.doi.org/10.1109/cloud.2016.0119.
Pełny tekst źródłaNarkhede, Vaishali, Karuna Joshi, Adam J. Aviv, Seung Geol Choi, Daniel S. Roche, and Tim Finin. "Managing Cloud Storage Obliviously." In 2016 IEEE 9th International Conference on Cloud Computing (CLOUD). IEEE, 2016. http://dx.doi.org/10.1109/cloud.2016.0151.
Pełny tekst źródłaShrestha, Bibek Raj, Saptashwa Mitra, and Sangmi Lee Pallickara. "STRETCH: In-Memory Storage with Autoscaling for Cluster Computing." In 2019 IEEE 12th International Conference on Cloud Computing (CLOUD). IEEE, 2019. http://dx.doi.org/10.1109/cloud.2019.00047.
Pełny tekst źródłaRaporty organizacyjne na temat "Cloud computing and storage"
Ambiel, Suzanne. The Case for Confidential Computing: Delivering Business Value Through Protected, Confidential Data Processing. The Linux Foundation, 2024. https://doi.org/10.70828/iynl6589.
Pełny tekst źródłaLeathers, Emily, Clayton Thurmer, and Kendall Niles. Encryption for edge computing applications. Engineer Research and Development Center (U.S.), 2024. http://dx.doi.org/10.21079/11681/48596.
Pełny tekst źródłaZhylenko, Tetyana I. Auto Checker of Higher Mathematics - an element of mobile cloud education. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/3895.
Pełny tekst źródłaCully, John, and Susie Wright. Cloud computing. Parliamentary Office of Science and Technology, 2020. http://dx.doi.org/10.58248/pn629.
Pełny tekst źródłaWeber, Arnd, ed. Impacts of Cloud Computing (STOA Cloud Computing Del.3). Self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-3.
Pełny tekst źródłaWeber, Arnd, ed. Foundations of Cloud Computing (STOA Cloud Computing Del.2). Self, 2014. http://dx.doi.org/10.1553/ita-pb-a65-2.
Pełny tekst źródłaTakai, Teresa M. Cloud Computing Strategy. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada563989.
Pełny tekst źródłaHochstein, Lorin. High Performance Computing (HPC) Innovation Service Portal Pilots Cloud Computing (HPC-ISP Pilot Cloud Computing). Defense Technical Information Center, 2011. http://dx.doi.org/10.21236/ada549202.
Pełny tekst źródłaSeybold, Patricia. Cloud Computing in 2015. Patricia Seybold Group, 2013. http://dx.doi.org/10.1571/ta12-13-13cc.
Pełny tekst źródłaKim, Anya, and Ira S. Moskowitz. Incentivized Cloud Computing: A Principal Agent Solution to the Cloud Computing Dilemma. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada530441.
Pełny tekst źródła