2015
DOI: 10.1007/978-3-662-46742-8_40
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Virtualization in Cloud Computing for Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…36) and the Rstudio-0.99.902 (ref. 37) web interface in addition to a custom R library for regression studies in a Docker container 38 . The packaged environment is publically available on Docker hub (https://hub.docker.com/r/chiragjp/nhanes_scidata/) and can be consistently deployed across local or cloud-based environments.…”
Section: Usage Notesmentioning
confidence: 99%
“…36) and the Rstudio-0.99.902 (ref. 37) web interface in addition to a custom R library for regression studies in a Docker container 38 . The packaged environment is publically available on Docker hub (https://hub.docker.com/r/chiragjp/nhanes_scidata/) and can be consistently deployed across local or cloud-based environments.…”
Section: Usage Notesmentioning
confidence: 99%
“…Many organizations encounter difficulties in acquiring and maintaining the vast information technology (IT) infrastructure needed for their daily business operations. Some of these organizations are in public and some of them are in private sectors, such as schools, hospitals, retailers and government agencies (Kacamarga et al , 2015; Oduh et al , 2018). The organizations experience difficulties mainly in acquiring, hosting, maintaining and supporting the required IT systems, applications and infrastructure that drive the alignment of their IT objectives with business objectives that leads to efficient business operations (Wilkin et al , 2016; Islam et al , 2017).…”
Section: Introductionmentioning
confidence: 99%
“…If the next population size is equal to n, it will be returned as the actual next population. However, if the size of combined fronts is greater than n, the first front up to (i − 1)th front are combined, and the remaining individuals are picked from the ith front by selecting the most elite ones as shown in lines [11][12][13][14][15][16][17][18][19]. Selecting the remaining individuals is done after going through three operators: normalization, association, and niching.…”
Section: Constraint Violation Valuementioning
confidence: 99%
“…However, if the size of combined fronts is greater than n, the first front up to (i − 1)th front are combined, and the remaining individuals are picked from the ith front by selecting the most elite ones as shown in lines[11][12][13][14][15][16][17][18][19]. However, if the size of combined fronts is greater than n, the first front up to (i − 1)th front are combined, and the remaining individuals are picked from the ith front by selecting the most elite ones as shown in lines[11][12][13][14][15][16][17][18][19].…”
mentioning
confidence: 99%