Search results for "cloud computing"

showing 10 items of 327 documents

GSaaS: A Service to Cloudify and Schedule GPUs

2018

Cloud technology is an attractive infrastructure solution that provides customers with an almost unlimited on-demand computational capacity using a pay-per-use approach, and allows data centers to increase their energy and economic savings by adopting a virtualized resource sharing model. However, resources such as graphics processing units (GPUs), have not been fully adapted to this model. Although, general-purpose computing on graphics processing units (GPGPU) is becoming more and more popular, cloud providers lack of flexibility to manage accelerators, because of the extended use of peripheral component interconnect (PCI) passthrough techniques to attach GPUs to virtual machines (VMs). F…

0301 basic medicineScheduleGeneral Computer ScienceComputer scienceDistributed computingnetworkingCloud computing02 engineering and technologycomputer.software_genre03 medical and health sciencesGPU resource management020204 information systems0202 electrical engineering electronic engineering information engineeringCloud computingGeneral Materials ScienceResource managementplatform virtualizationbusiness.industrycloud computingGeneral EngineeringVirtualizationShared resource030104 developmental biologyVirtual machineScalabilityGPU cloudificationlcsh:Electrical engineering. Electronics. Nuclear engineeringGeneral-purpose computing on graphics processing unitsbusinesscomputerlcsh:TK1-9971IEEE Access
researchProduct

Ontology-based annotation and retrieval of services in the cloud

2014

Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …

Information Systems and ManagementCloud computing securitybusiness.industryComputer scienceServices computingCloud computingcomputer.software_genreManagement Information SystemsWorld Wide WebSemantic gridUtility computingGrid computingArtificial IntelligenceInformation and Communications TechnologySemantic computingOntologyThe InternetSemantic Web StackWeb servicebusinesscomputerSemantic WebSoftwareKnowledge-Based Systems
researchProduct

Convolutional Neural Networks for Multispectral Image Cloud Masking

2020

Convolutional neural networks (CNN) have proven to be state of the art methods for many image classification tasks and their use is rapidly increasing in remote sensing problems. One of their major strengths is that, when enough data is available, CNN perform an end-to-end learning without the need of custom feature extraction methods. In this work, we study the use of different CNN architectures for cloud masking of Proba-V multispectral images. We compare such methods with the more classical machine learning approach based on feature extraction plus supervised classification. Experimental results suggest that CNN are a promising alternative for solving cloud masking problems.

Masking (art)FOS: Computer and information sciencesComputer Science - Machine Learning010504 meteorology & atmospheric sciencesContextual image classificationbusiness.industryComputer scienceComputer Vision and Pattern Recognition (cs.CV)Feature extractionMultispectral image0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionCloud computingPattern recognition02 engineering and technology01 natural sciencesConvolutional neural networkMachine Learning (cs.LG)Artificial intelligenceState (computer science)business021101 geological & geomatics engineering0105 earth and related environmental sciences
researchProduct

A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

2020

In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realis…

FOS: Computer and information sciencesComputer sciencemedia_common.quotation_subjectG.3Cloud computingComputer Science - Networking and Internet ArchitectureC.2.3BiomaterialsC.2.1Resource (project management)Electrical and Electronic EngineeringFunction (engineering)media_commonNetworking and Internet Architecture (cs.NI)Mobile edge computingbusiness.industryEnergy consumptionComputer Science ApplicationsTask (computing)User equipmentMechanics of MaterialsModeling and SimulationResource allocationG.3; C.2.3; C.2.1business46FxxComputer networkComputers, Materials & Continua
researchProduct

Essential Enabling Technologies

2016

The previous chapter contained presentations of several relevant collaboration methods. Section 3.1 indicated that the evolution in e-collaboration was associated with a number of technological breakthroughs.

Decision support systemBiometric systemComputer sciencebusiness.industrySection (typography)020206 networking & telecommunicationsCloud computingmacromolecular substances02 engineering and technologyData sciencehumanitiesBusiness intelligence0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMobile device
researchProduct

Optimal temporal resolution for detailed studies of cloud-enhanced sunlight (Overirradiance)

2013

Enhancement of sunlight by clouds can lead to irradiance peaks much exceeding the extraterrestrial levels - close to 2 suns near the Equator and at least 1.5 suns at latitudes of about 60°. Some extreme overirradiance events can last many minutes, but durations in the order of 1 second are also possible. The present paper reports the shortest bursts recorded in Southern Norway in the years 2012 and 2013. Our records of 10-millisecond resolution from 2012 show that the optimal instantaneous irradiance sampling interval is less than 0.15 s at the present test site, while the optimal averaging time is less than 0.13 s. We propose simple equations for deriving these times in an arbitrary geogra…

SunlightMeteorologybusiness.industryTemporal resolutionEquatorIrradianceEnvironmental scienceCloud computingbusinessSolar irradianceSuns in alchemyLatitudeRemote sensing2013 IEEE 39th Photovoltaic Specialists Conference (PVSC)
researchProduct

Using Cloud Computing to Implement a Security Overlay Network

2012

This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.

Cloud computing securityComputer Networks and CommunicationsComputer scienceNetwork securitybusiness.industryOverlay networkDenial-of-service attackCloud computingIntrusion detection systemElectronic mailNetwork Access ControlElectrical and Electronic EngineeringbusinessLawComputer networkIEEE Security & Privacy Magazine
researchProduct

Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages

2012

Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle.

EngineeringSoftwareProcess managementbusiness.industryData_MISCELLANEOUSCloud computingProduct (category theory)Marketingbusiness
researchProduct

Together We Stand, Divided We Fall : Analyzing Information Systems Acquisition as Service

2016

Information systems (IS) acquisition is not a widely studied topic in the literature. In particular, although the role and participation of different stakeholders such as business people, IT people, and external vendors and consultants is acknowledged, little is known about how they cooperate in an IS acquisition project. In this paper, we will apply a value co-creation framework taken from service research as a lens to study an IS acquisition project in an organization. The case organization intends to acquire their new IS as a cloud service. This approach is novel to all stakeholders, so they have to intensively cooperate for example under tight time constraints. The analysis reveals that…

Value (ethics)Service (business)ta113Knowledge managementComputer sciencebusiness.industry05 social sciencesContext (language use)Cloud computing02 engineering and technologyService research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systeminformation systems acquisition050211 marketingbusiness
researchProduct

Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector

2020

In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two larg…

Information securityScope (project management)business.industryCorporate governanceControl (management)Cloud sourcingCloud computingInformation securityBusiness agilityOutsourcingCloud sourcing; Information security; IT governanceParadigm shiftIT governanceBusinessIndustrial organization
researchProduct