


default search action
EAI Endorsed Transactions on Cloud Systems, Volume 7
Volume 7, Number 20, 2021
- Nagresh Kumar:
Effect of Acceleration Coefficient on Particle Swarm optimization for Task Scheduling in Cloud Computing. e1 - Jipson George Thoomkuzhy
, Murugan Thangiah:
Cloud-IoT Implementations & Its Impact on Organizational Performance - A Quantitative Study on IT & Business Leaders. e2 - Ugochukwu Okwudili Matthew
, Jazuli Sanusi Kazaure, Nwamaka U. Okafor:
Contemporary Development in E-Learning Education, Cloud Computing Technology & Internet of Things. e3 - Arjun U
, Vinay S:
Outsourced Auditing With Data Integrity Verification Scheme (OA-DIV) and Dynamic Operations for Cloud Data with Multi-Copies. e4 - Akanksha Sathish, Diana Dsouza, K. Ramitha Ballal, Archana M., Tarunraj Singh, Glen Joshua Monteiro:
Advanced Mechanism to Achieve QoS and Profit Maximization of Brokers in Cloud Computing. e5
Volume 7, Number 21, 2022
- Aatish Chiniah, Avinash Mungur:
On the Adoption of Erasure Code for Cloud Storage by Major Distributed Storage Systems. e1 - Suvarna S. Pawar, Prasanth Yalla:
Modelling an Efficient Three-Tier Fault Tolerance Approach for Resource Provisioning over Cloud. e2 - Haythem Hayouni
:
AuthenIoT: A Lightweight Authentication Protocol for the Internet of Things Based Wireless Sensor Networks. e3 - Suvarna S. Pawar, Prasanth Yalla:
Design of an Efficient Trustful-Lightweight Cloud Service Provisioning Model using Service Optimizer. e4 - Fadi Mohsen, Cornelis Zwart, Dimka Karastoyanova, Georgi Gaydadjiev:
A Taxonomy for Large-Scale Cyber Security Attacks. e5
Volume 7, Number 22, 2022
- Asif Ali Laghari, H. Shah, Rashid Ali Laghari, K. Kumar, A. A. Waqan, Awais Khan Jumani:
A Review on Quantum Computing Trends & Future Perspectives. e1 - Chanchal Antony
, Manu A P:
Investigation of Security Breaches Due to Resource Sharing in Virtual Machine Migration Using Hybrid Ant Colony Optimization with ANN. e2 - Amor Ben El Khettab Lalmi, Abderrahim Djaballah, Mohamed Gharzouli
:
COVID-19 Fake News Detection Using Machine Learning Techniques: A Comparative Study. e3 - Cathryn Peoples, Adrian Moore, Nektarios Georgalas:
Service Level Agreement (SLA) Chains Supported by Cloud in a Complex Port Ecosystem with Competing Stakeholder Goals: Editorial. e4 - Premlata Chauhan, Shafeeq Ahmad, Pervez Rauf Khan, Naseem Ahmad Khan:
Investigating the IoT Security and Privacy Challenges: Summary and Recommendations. e5 - Nguyen Cong Danh:
The application of a optimal controller for the flexible joint robot. e6 - Nguyen Cong Danh:
Neural Networks Application for the Data of LQG Regulator for the Flexible Joint Robot. e7 - Nguyen Cong Danh:
System Modeling and Artificial Neural Network (ANN) Design for Lateral and Longitudinal of F-16. e8
Volume 7, Number 23, 2023
- Farhan Qazi:
Application Programming Interface (API) Security in Cloud Applications. e1

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.