2019
DOI: 10.1016/j.jpdc.2018.07.001
|View full text |Cite
|
Sign up to set email alerts
|

Configurable cost-quality optimization of cloud-based VoIP

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Results from previous studies related to uncertainty mitigation, data storage and transfer, clouds integration, and computation management for cloud computing are presented in [17][18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%
“…Results from previous studies related to uncertainty mitigation, data storage and transfer, clouds integration, and computation management for cloud computing are presented in [17][18][19][20][21].…”
Section: Related Workmentioning
confidence: 99%
“…Computational security for secret sharing schemes can be defined in more strong way [15]. It is based on the polynomial indistinguishability concept [16][17][18][19][20][21][22][23]. For any probability distribution ( , ), a secret sharing scheme is computationally secure if, for any pair of secrets (") , ($) and incomplete subsets of shares (") and ($) , the distributions N (") , (") V and N (") , (") Let = Pr N (") , (") V¡ = 1¡, = Pr N ($) , ($) V¡ = 1¡, = PrN N (") , (") V = 1V .…”
Section: T2x ›2$ X0)mentioning
confidence: 99%