2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT) 2019
DOI: 10.1109/atit49449.2019.9030430
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating the Effectiveness of Cloud Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…In [2] the standards, attributes and characteristics of the profile are considered and a method of detecting signs of public opinion manipulation in social networks based on the construction of information security profiles of social Internet services, based on gradient boosting of binary trees, which automates early detection procedures.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In [2] the standards, attributes and characteristics of the profile are considered and a method of detecting signs of public opinion manipulation in social networks based on the construction of information security profiles of social Internet services, based on gradient boosting of binary trees, which automates early detection procedures.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Formulation of the problem. In software systems, the term «self-healing» implies the presence of any application, service or system that can detect that it is not working properly, and without any human intervention to make the necessary changes to restore itself to normal or design condition [18,20,23]. The same actions can be performed by the system in case of probable failure of its structural elements [5,19,26].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In some cases, there is a possibility of external influence on the performance of software components. In all these cases, there is a problem with software recovery [1]. It is necessary to create a system that will operate under the influence of interference.…”
Section: Introductionmentioning
confidence: 99%
“…If there is enough information to solve a specific problem, then they say that the information is complete. The correspondence of information about an object, process or phenomenon to their present state determines its accuracy [1,2,22].…”
Section: Literature Analysis and Problem Statementmentioning
confidence: 99%