System-level optimizations for memory access in the execution migration machine
FREE-DOWNLOAD KS Shim, M Lis, MH Cho, O Khan… – … and Operating System …, 2011 – … Operating system and library support for this optimization has two components: (a) ensure that malloc() and friends allocate data for … The first part is entirely transparent to the programmer, and consists of replacing the central dynamic memory management structure […]
Free research papers and projects on cloud computing-recent
Identity-based authentication for cloud computing Cloud computing-An overview Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography Enabling public verifiability and data dynamics for storage security in cloud computing Community cloud computing Toward a cloud computing research agenda privacy manager for cloud computing Free research papers and projects on low power VLSI High performance parallel computing with clouds […]
Identity-based authentication for cloud computing
FREE-DOWNLOAD H Li, Y Dai, L Tian… – Cloud Computing, 2009 – Springer Abstract. Cloud computing is a recently developed new technology for complex systems with massive-scale services sharing among numerous users. Therefore, authentication of both users and services is a significant issue for the trust and security of the cloud computing. SSL