• Aucun résultat trouvé

[PDF] Top 20 End-to-end security architecture for cloud computing environments

Has 10000 "End-to-end security architecture for cloud computing environments" found on our website. Below are the top 20 most common "End-to-end security architecture for cloud computing environments".

End-to-end security architecture for cloud computing environments

End-to-end security architecture for cloud computing environments

... (CIM) to manage the configuration and the hardware. New modules can be loaded to the kernel, assuming they have been signed by ...memory to detect integrity violations such as buffer ...hard to ... Voir le document complet

180

Security and privacy issues in cloud computing

Security and privacy issues in cloud computing

... work for cloud environments^ authored by Faria Mehak, Rahat Masood, Muhammad Awais Shibli, and Islam Elgedway pre- sents an extensible access control framework (EACF) for cloud-based ... Voir le document complet

4

Security of virtual networks in cloud computing for education

Security of virtual networks in cloud computing for education

... Crown Security of Virtual networks in cloud computing for education Abstract Cloud Computing emerge as new IT paradigm, which aims to provide applications delivered as ... Voir le document complet

5

Security in Cloud Computing: Evaluation and Integration

Security in Cloud Computing: Evaluation and Integration

... service to the Cloud in a way that satisfies its security requirements, the CSP should ensure security satisfaction during the whole service lifetime and avoid Security- SLA ... Voir le document complet

261

End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT

End-to-end Energy Models for Edge Cloud-based IoT Platforms: Application to Data Stream Analysis in IoT

... on Cloud infrastructures for storage and computing capabilities, transforming their architecture into more a distributed one based on edge facilities provided by Internet Service Providers ... Voir le document complet

22

VNET: Towards End-to-End Network Cloudification

VNET: Towards End-to-End Network Cloudification

... needs for future network services, existing network architecture should evolve significantly to pro- vide a higher level of flexibility, resilience and quality of ...of computing which has ... Voir le document complet

6

CoMe4ACloud: An End-to-End Framework for Autonomic Cloud Systems

CoMe4ACloud: An End-to-End Framework for Autonomic Cloud Systems

... Autonomic Computing has largely contributed to the development of self-manageable Cloud ...freeing Cloud administrators of the burden of manually managing varying-demand services, while still ... Voir le document complet

31

End-to-End Automation of 5G Networks

End-to-End Automation of 5G Networks

... Editorial End-to-End Automation of 5G Networks Tara Ali Yahiya , 1 Pinar Kirci , 2 and Andr´e-Luc Beylot 3 1 Department of Computer Science and Engineering, University of Kurdistan-Hewler, Erbil, ... Voir le document complet

3

End-to-End Automatic Speech Translation of Audiobooks

End-to-End Automatic Speech Translation of Audiobooks

... Terms— End-to-end models, Speech Translation, ...attempted to build end-to-end speech-to-text translation without using source language tran- scription during ... Voir le document complet

6

RPNet: an End-to-End Network for Relative Camera Pose Estimation

RPNet: an End-to-End Network for Relative Camera Pose Estimation

... respect to another camera’s reference ...task for many computer vision problems, such as Structure from Motion (SfM), Simultaneous Localisation And Mapping (SLAM), ...used to reject outliers in a ... Voir le document complet

9

End-to-End Encrypted Messaging Protocols: An Overview

End-to-End Encrypted Messaging Protocols: An Overview

... necessary for the design and refinement of technical proto- cols, with a focus on whether or not users understand and value the various security properties of the ...protocols. For example, do users ... Voir le document complet

12

End-to-End Probabilistic Ego-Vehicle Localization Framework

End-to-End Probabilistic Ego-Vehicle Localization Framework

... camera to provide an accurate ego-lane level ...modality for au- tomotive applications and it provides dense information of the ...attempt to provide a more robust and more accurate localization, the ... Voir le document complet

14

Confidence measure for speech-to-concept end-to-end spoken language understanding

Confidence measure for speech-to-concept end-to-end spoken language understanding

... Measure, End-to-End, Spoken Lan- guage Understanding, Neural networks ...Speech-to-concept end-to-end (E2E) neural architectures for Spoken Language Understanding ... Voir le document complet

6

Architecture Cloud Computing chez PSA

Architecture Cloud Computing chez PSA

... Le matériel et les logiciels évoluant de plus en plus rapidement et dans un contexte de très forte concurrence, les restrictions budgétaires et de personnels n’aidant pas, il devient dif[r] ... Voir le document complet

122

An end to end approach to the resequencing problem

An end to end approach to the resequencing problem

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ... Voir le document complet

29

End-to-End Learning of Polygons for Remote Sensing Image Classification

End-to-End Learning of Polygons for Remote Sensing Image Classification

... One of the most important problems of remote sensing im- age analysis is image classification, which means identify- ing a thematic class at every pixel location. A key applica- tion consists in integrating the ... Voir le document complet

5

An enhanced worst-case end-to-end evaluation method for SpaceWire networks

An enhanced worst-case end-to-end evaluation method for SpaceWire networks

... scheduled to be used as the sole on-board network for future ESA ...tools to ensure that critical temporal deadlines are met when using best-effort wormhole networks like ...method to compute ... Voir le document complet

5

The Brewing Storm in Cloud Gaming: A Measurement Study on Cloud to End-User Latency

The Brewing Storm in Cloud Gaming: A Measurement Study on Cloud to End-User Latency

... Technologies for on-demand gaming are closely related to technologies for video streaming, because on-demand gam- ing consists of sending a video stream of the game back to the ...are ... Voir le document complet

7

Decentralized Prediction of End-to-End Network Performance Classes

Decentralized Prediction of End-to-End Network Performance Classes

... The low-rank nature of various performance matrices enables their completion by matrix factorization tech- niques. This paper presents a novel decentralized ma- trix factorization approach based on Stochastic Gradi- ent ... Voir le document complet

12

Recent Advances in End-to-End Spoken Language Understanding

Recent Advances in End-to-End Spoken Language Understanding

... used for experiments (see Table 1). ASR data The corpus for ASR training was composed of corpora from various eval- uation campaigns in the field of automatic speech processing for French, as shown ... Voir le document complet

14

Show all 10000 documents...