Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Big sensor data is prevalent in both industry and scientific research applications where the data is..
With increasing presence and adoption of Web services on the World Wide Web, Quality-of-Service (QoS..
Trajectory are ubiquitous in the real world. This patterns that succinctly show the cumulative behav..
Fairness is one of the most significant indicators to evaluate resource allocation algorithms in clo..
The extraction of useful information from data is often a complex process that can be conveniently m..
Cloud-supported Internet of Things (Cloud-IoT)
has been broadly deployed in smart grid systems. The..
In medical cloud computing, a patient can remotely outsource her medical data to the cloud server. I..
Access control is an indispensable security component of cloud computing, and hierarchical access co..
The aim of Semi-supervised clustering algorithm is to improve the clustering performance by ..
Mobile cloud computing utilizing cloudlet is an
emerging technology to improve the quality of mobi..
User-to-user (U2U) relationship-based access control has become the most prevalent approach for mode..
Parameter Sweep Experiments (PSEs) allow scientists
and engineers to conduct experime..
Resource management plays a key role in the cloud computing environment in which applications face w..
Video content downloading
using the P2P approach is scalable, but does not always giv..
Machine-controlled motion detection technology is Associate in nursing integral element of intellige..