The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We believe that a market-based resource allocation will be effective in a cloud computing environment where resources are virtualized and delivered to users as services. We propose such a market mechanism to allocate services to participants efficiently. The mechanism enables users (1) to order a combination of services for workflows and co-allocations and (2) to reserve future/current services in...
The wide-area vector meta computing infrastructure named a vector computing cloud has been proposed as a next generation high-performance computing infrastructure. However, in the vector computing cloud, the difference in site policies between organizations causes inefficient usage of vector computing resources. To achieve fairness and efficient job scheduling on the vector computing cloud, this paper...
Ubiquitous Life Care (u-Life care) is one of the most focus area of research. To provide robust healthcare services, recognition of patient daily life activities is required. Context information with real-time daily life activities can help in better services, service suggestions, and change in system behaviour for better healthcare. Human health, profile, as well as activities are monitored and processed...
A System Architecture [SA] plays the leading role in ICT based organization. It covers the entire organization and helps to achieve the mission of organization. As other architectures, it also has set of components and the relationship (connectors) among the components. It has pre-defined life cycle that determines the duration of the system in which it should provide the services continuously. It...
CVSS (Common Vulnerability Scoring System) is a framework scoring IT vulnerabilities. CVSS is composed of three metric groups: Base, Temporal, and Environmental. Although, the environmental score which gives risk of vulnerabilities in network environment of each user should be used for prioritizing actions, only base score is currently used. One of the reason for unused of environmental score is hard...
Increase in healthcare awareness has raised the number of subscriptions for e-Healthcare applications. Consequently e-Healthcare application providers are adopting Cloud computing to handle immense processing load and to reduce service delivery cost. Identity management has been an issue which hinders in adoption of e-Healthcare applications, due to sensitivity of the data involved in it. Existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.