2015
DOI: 10.1186/s13673-015-0031-4
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-based adaptable scheduler for SaaS providers in cloud computing

Abstract: Software as a Service (SaaS) in Cloud Computing offers reliable access to software applications for end users over the Internet without direct investment in infrastructure and software. SaaS providers utilize resources of internal datacenters or rent resources from a public Infrastructure as a Service (IaaS) provider in order to serve their customers. Internal hosting can increase cost of administration and maintenance, whereas hiring from an IaaS provider can impact quality of service due to its variable perf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…MRM service distributes a requested large-scale job and responds to the troubles of client or master nodes. When a large-scale job is distributed in the MRM, only the static resource information (MAC, IP, CPU, and memory) and dynamic information (MAC, IP, CPU, and memory utilization) of the mobile resources are used [30].…”
Section: Mobile Resource Management Without a Cloud Server (Mrm)mentioning
confidence: 99%
See 1 more Smart Citation
“…MRM service distributes a requested large-scale job and responds to the troubles of client or master nodes. When a large-scale job is distributed in the MRM, only the static resource information (MAC, IP, CPU, and memory) and dynamic information (MAC, IP, CPU, and memory utilization) of the mobile resources are used [30].…”
Section: Mobile Resource Management Without a Cloud Server (Mrm)mentioning
confidence: 99%
“…Therefore, more powerful authentication technology is required. While 2-factor and multi-factor authentication methods are being used, they require the input of users, which is cumbersome, and they are vulnerable to exposure by shoulder surfing attacks and smudge attacks [18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33].…”
mentioning
confidence: 99%
“…Gangman Yi et al proposed mobile resource management (MRM) without Cloud Server, which is the computing resource integrated management of mobile devices. It is able to establish mobile computing infrastructure without a cloud server and to provide computing services (Motavaselalhagh et al 2015). In order to measure the MRM availability during integration of the MRM resources and validate the service effectiveness, they evaluated the time required for resource integration and task assignments for computing service requests.…”
Section: Related Workmentioning
confidence: 99%
“…The only solution to this problem, however, is to discard surplus resources, which are connected to traditional on-premise systems, or to introduce virtualization technology for all surplus resources. Nevertheless, the latter solution drastically increases the cost of cloud computing [9][10][11][12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%