Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cloud computing 1,800
- Development 393
- Application software 370
- Amazon Web Services (Firm) 252
- Computer networks 236
- Management 230
- Web services 228
- Examinations 220
- Security measures 216
- Information technology 166
- Certification 159
- Computer security 150
- Electronic data processing personnel 144
- Windows Azure 139
- Database management 111
- Artificial intelligence 107
- Microsoft Azure (Computing platform) 107
- Big data 103
- Electronic data processing 103
- Machine learning 100
- Web applications 100
- Data processing 97
- Engineering & Applied Sciences 96
- Computer Science 83
- Computer programs 82
- Computer software 82
- Open source software 76
- Internet of things 66
- Application program interfaces (Computer software) 62
- Distributed processing 61
-
2081Publicado 2018Tabla de Contenidos: “…chapter 1 Introduction -- part PART I Supporting Technologies for BDMA and BDSP -- chapter Introduction to Part I -- chapter 2 Data Security and Privacy -- chapter 3 Data Mining Techniques -- chapter 4 Data Mining for Security Applications -- chapter 5 Cloud Computing and Semantic Web Technologies -- chapter 6 Data Mining and Insider Threat Detection -- chapter 7 Big Data Management and Analytics Technologies -- chapter Conclusion to Part I -- part PART II Stream Data Analytics -- chapter Introduction to Part II -- chapter 8 Challenges for Stream Data Classification -- chapter 9 Survey of Stream Data Classification -- chapter 10 A Multi-Partition, Multi-Chunk Ensemble for Classifying Concept-Drifting Data Streams -- chapter 11 Classification and Novel Class Detection in Concept-Drifting Data Streams -- chapter 12 Data Stream Classification with Limited Labeled Training Data -- chapter 13 Directions in Data Stream Classification -- chapter Conclusion to Part II -- part PART III Stream Data Analytics for Insider Threat Detection -- chapter Introduction to Part III -- chapter 14 Insider Threat Detection as a Stream Mining Problem -- chapter 15 Survey of Insider Threat and Stream Mining -- chapter 16 Ensemble-Based Insider Threat Detection -- chapter 17 Details of Learning Classes -- chapter 18 Experiments and Results for Nonsequence Data -- chapter 19 Insider Threat Detection for Sequence Data -- chapter 20 Experiments and Results for Sequence Data -- chapter 21 Scalability Using Big Data Technologies -- chapter 22 Stream Mining and Big Data for Insider Threat Detection -- chapter Conclusion to Part III -- part PART IV Experimental BDMA and BDSP Systems -- chapter Introduction to Part IV -- chapter 23 Cloud Query Processing System for Big Data Management -- chapter 24 Big Data Analytics for Multipurpose Social Media Applications -- chapter 25 Big Data Management and Cloud for Assured Information Sharing -- chapter 26 Big Data Management for Secure Information Integration -- chapter 27 Big Data Analytics for Malware Detection -- chapter 28 A Semantic Web-Based Inference Controller for Provenance Big Data -- part PART V Next Steps for BDMA and BDSP -- chapter Introduction to Part V -- chapter 29 Confidentiality, Privacy, and Trust for Big Data Systems -- chapter 30 Unified Framework for Secure Big Data Management and Analytics -- chapter 31 Big Data, Security, and the Internet of Things -- chapter 32 Big Data Analytics for Malware Detection in Smartphones -- chapter 33 Toward a Case Study in Healthcare for Big Data Analytics and Security -- chapter 34 Toward an Experimental Infrastructure and Education Program for BDMA and BDSP -- chapter 35 Directions for BDSP and BDMA -- chapter Conclusion to Part V -- chapter 36 Summary and Directions…”
Libro electrónico -
2082Publicado 2023Tabla de Contenidos: “…Healthcare engineering using AI and distributed technologies -- Cloud computing in healthcare : a systematic study -- Medical information extraction of clinical notes and pictorial visualization of electronic medical records summary interface -- Investigations on RFID enabled healthcare usage and adoption issues -- Photonic crystal fiber plasmonic sensor for applications in medicine -- Augmented reality as a boon to disability -- Augmented and virtual reality : transforming the future of psychological and medical sciences -- Artificial Intelligence in healthcare : perspectives from post-pandemic times -- Bioweapons v/s computer based counter measure techniques and mathematical modeling for prediction of Covid-19 -- Evolution of healthcare sector and evolving cyber attacks : a summary -- Improving cardiovascular health by deep learning…”
Libro electrónico -
2083Publicado 2013Tabla de Contenidos: “…Illustrative examples -- 3.3.1 Illustrative examples for general inconsistency identification and adjustment method -- 3.3.2 Illustrative examples for fast inconsistency identification and adjustment method -- 4: IBMM for Missing Data Estimation -- 4.1 Basics of the IBMM for missing data estimation -- 4.2 The processes of estimating missing data by the IBMM -- 4.3 Proofs of the IBMM for IPCM in order three -- 4.4 Illustrative examples -- 4.4.1 Illustrative examples in order three -- 4.4.2 Illustrative examples in order four -- Chapter 5: IBMM for Questionnaire Design Improvement -- 5.1 Motivation of the research -- 5.2 The principles of improving the questionnaire design -- 5.3 Illustrative example -- Chapter 6: IBMM for rank reversal -- 6.1 Rank reversal issue in the AHP/ANP -- 6.2 Sensitivity analysis of rank reversal by the IBMM -- 6.3 Illustrative examples -- 7: Applications of IBMM -- 7.1 Task scheduling and resource allocation in cloud computing environment by the IBMM -- 7.1.1 Resource allocation in cloud computing -- 7.1.2 Task-oriented resource allocation in cloud computing -- 7.1.3 Illustrative example -- 7.2 Risk assessment and decision analysis by the IBMM -- 7.2.1 Background of risk assessment and decision analysis -- 7.2.2 Illustrative Examples -- 8. …”
Libro electrónico -
2084por International Conference on Electronics, Communications and NetworksTabla de Contenidos: “…Front Cover; Table of contents; Preface; Organizing committee; Communications and networks; Novel scheduling techniques for multiuser diversity MU-MIMO TDD communication system; A cloud computing solution for medical institutions; A multicast transmission scheme based on block acknowledgment with network coding in wireless LANs; An enhanced TCP for satellite network with intermittent connectivity and random losses; Study on the propagation characteristics of uwb signal waveform distortion; Research on ultra-wideband dual-polarized quadruple-ridged horn antenna…”
Publicado 2015
Libro electrónico -
2085Publicado 2022Tabla de Contenidos: “…Performance Enhancement in Cloud Computing Using Efficient Resource Scheduling -- 4. …”
Libro electrónico -
2086Publicado 2022Tabla de Contenidos: “…Vitalization and cloud computing -- Chapter 16. Data centers -- Chapter 17. …”
Libro electrónico -
2087Publicado 2015Tabla de Contenidos: “…Chapter 1: Elements of Modern Networking -- Chapter 2: Requirements and Technology -- Chapter 3: SDN: Background and Motivation -- Chapter 4: SDN Data Plane and OpenFlow -- Chapter 5: SDN Control Plane -- Chapter 6: SDN Application Plane -- Chapter 7: Network Functions Virtualization: Concepts and Architecture -- Chapter 8: NFV Functionality -- Chapter 9: Network Virtualization -- Chapter 10: Quality of Service -- Chapter 11: QoE: User Quality of Experience -- Chapter 12: Network Design Implications of QoS and QoE -- Chapter 13: Cloud Computing -- Chapter 14: The Internet of Things: Components -- Chapter 15: The Internet of Things: Architecture and Implementation -- Chapter 16: Security -- Chapter 17: The Impact of the New Networking on IT Careers…”
Libro electrónico -
2088Publicado 2018“…Das Internet ist kein Neuland mehr, kritische Themen wie Cyberattacken, Privatsphäre, der Schutz Minderjähriger oder auch das Cloud Computing sind jedoch keinesfalls ausdiskutiert. …”
Libro electrónico -
2089Publicado 2021“…You'll then begin administering network services and hardening security, and learn about cloud computing, containers, and orchestration. Once you've learned how to work with the command line, you'll explore the essential Linux commands for managing users, processes, and daemons and discover how to secure your Linux environment using application security frameworks and firewall managers. …”
Libro electrónico -
2090Publicado 2017“…It helps you manage all of those snapshot and IBM FlashCopy® images made to support DevOps, data protection, disaster recovery, and Hybrid Cloud computing environments. This IBM® RedpaperTM publication specifically addresses IBM Spectrum Copy Data Management in combination with IBM FlashSystem® A9000 or A9000R when used for Automated Disaster Recovery of SAP HANA…”
Libro electrónico -
2091Publicado 2011“…Whether you want to tackle cloud computing, big data, or mobile development, this complete video compilation of OSCON Java 2011 shows you how Java and open source technologies work together to help you solve a variety of challenges. …”
-
2092Publicado 2013“…This book is targeted toward technical professionals (consultants, technical support staff, IT Architects, and IT Specialists) responsible for providing cloud-computing solutions and support…”
Libro electrónico -
2093Publicado 2014“…When people hear "the Cloud," they think of cloud computing, just a sliver of what the Cloud is today. …”
Grabación musical -
2094Publicado 2021“…Chapters cover such topics as digitized learning, information and communication technology in sports, cloud computing for universities, and more. This book is a reference book for scholars, researchers, and practitioners looking to update their knowledge on methodologies, theoretical analyses, modeling, simulation, and empirical studies on e-services…”
Libro electrónico -
2095Publicado 2022Tabla de Contenidos: “…Virtualization and cloud Computing -- Chapter 16. Data Centers -- Chapter 17. …”
Libro electrónico -
2096Publicado 2016Tabla de Contenidos: “…Advanced optical network architecture for the next generation internet access -- chapter 12. Cloud computing systems for smart cities and homes -- chapter 13. …”
Libro electrónico -
2097por Bisong, Ekaba. authorTabla de Contenidos: “…Part 1: Getting Started with Google Cloud Platform -- Chapter 1: What Is Cloud Computing? -- Chapter 2: An Overview of Google Cloud Platform Services -- Chapter 3: The Google Cloud SDK and Web CLI -- Chapter 4: Google Cloud Storage (GCS) -- Chapter 5: Google Compute Engine (GCE) -- Chapter 6: JupyterLab Notebooks -- Chapter 7: Google Colaboratory -- Part 2: Programming Foundations for Data Science -- Chapter 8: What is Data Science? …”
Publicado 2019
Libro electrónico -
2098Publicado 2022Tabla de Contenidos: “…Trust discovery and information retrieval using artificial intelligence tools from multiple conflicting sources of web cloud computing and e-commerce users -- 9. Reliable diabetes mellitus forecasting using artificial neural network multilayer perceptron -- 10. …”
Libro electrónico -
2099Publicado 2025Tabla de Contenidos: “…10.5.2 Experimental results -- 10.5.2.1 Latency evaluation -- 10.5.2.2 Energy consumption analysis -- 10.5.2.3 Computational speed assessment -- 10.5.2.4 Data transfer rate examination -- 10.5.3 Discussion of results -- 10.5.3.1 Enhanced connectivity -- 10.5.3.2 Energy efficiency -- 10.5.3.3 Scalability and flexibility -- 10.5.3.4 Trade-offs and challenges -- 10.5.4 Comparative analysis -- 10.5.5 Limitations and future directions -- 10.6 Conclusion -- Reference -- 11 Internet of Things and mobile cloud computing service models -- 11.1 Introduction -- 11.2 The importance of the Internet of Things and mobile cloud computing -- 11.2.1 Mobile cloud computing -- 11.2.2 Internet of Things -- 11.3 How do service models work? …”
Libro electrónico -
2100Publicado 2013Tabla de Contenidos: “…Part I: Introduction -- Chapter 1: Motivation and Objectives -- Chapter 2: Patterns and Security Patterns --Chapter 3: A Secure Systems Development Methodology -- Part II: Patterns -- Chapter 4: Patterns for Identity Management -- Chapter 5: Patterns for Authentication -- Chapter 6: Patterns for Access Control -- Chapter 7: Patterns for Secure Process Management -- Chapter 8: Patterns for Secure Execution and File Management -- Chapter 9: Patterns for Secure OS Architecture and Administration -- Chapter 10: Security Patterns for Networks -- Chapter 11: Patterns for Web Services Security -- Chapter 12: Patterns for Web Services Cryptography -- Chapter 13: Patterns for Secure Middleware -- Chapter 14: Misuse Patterns -- Chapter 15: Patterns for Cloud Computing Architecture -- Part III: Use of the Patterns -- Chapter 16: Building Secure Architectures -- Chapter 17: Summary and the Future of Security Patterns…”
Libro electrónico