1 - 5 of 5 articles
The data integrity verification process in cloud has become more promising research area in several Internet of Things (IoT) applications. The traditional data verification approaches use encryption in order to preserve data. Moreover, fog computing is considered as extensively employed...
Internet of Things (IoT) is characterized by the large volumes of data collection. Since IoT devices are themselves resource-constrained, this data is transferred to cloud-based systems for further processing. This data collected over a period of time possesses high utility as it is useful for...
Cloud computing has emerged as one of the hottest topics in technology and has quickly become a widely used information and communication technology model. Performance is a critical component in the cloud environment concerning constraints like economic, time, and hardware issues. Various...
Cloud computing is gaining a huge popularity for on-demand services on a pay-per-use basis. However, single data centre is restricted in offering the services, as it does not have unlimited resource capacity mostly in the peak demand time. Generally, the count of Virtual Machines (VM) is more in...
Modelling and analysis in software system development can be especially challenging in early requirements engineering (RE), where high-level system non-functional requirements are discovered. In the early stage, hard to measure non-functional requirements are critical; understanding the...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.