2017 8th IEEE International Conference on Cognitive Infocommunications (CogInfoCom) 2017
DOI: 10.1109/coginfocom.2017.8268219
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic resource allocation using combinatorial methods in Cloud: A case study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The initial references of using mathematical models were found in the literature of network security, where noncooperative game theory had been used to depict the interconnection between malicious nodes and the network devices (nodes) [21]. Here, different mathematical models are taken into consideration for different security problems and threats.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The initial references of using mathematical models were found in the literature of network security, where noncooperative game theory had been used to depict the interconnection between malicious nodes and the network devices (nodes) [21]. Here, different mathematical models are taken into consideration for different security problems and threats.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Moreover, local and global optima are known challenges in the convergence of meta-heuristic optimization techniques. Therefore, the best algorithm should offer global overview and have fewer chances to be trapped into its local optima [11].…”
Section: Background and Related Work A Meta-heuristic Optimization Algorithmsmentioning
confidence: 99%
“…that verifies compliance with policies and procedures. According to the IIA (Institute of Internal Auditors) [9,31], following scopes are covered by a quality audit: Business process efficiencies, Trade process and business control, Commerce risks, Quality and utilizable efficiency and effectiveness, Cost diminution situations, Corporate governance effectiveness and Waste deletion www.ijacsa.thesai.org opportunities [4,22,23], and also value-added auditing is defined as follows: "Internal auditing is designed to improve companies' operations and enhance relevant assurance values, since this activity is an independent, objective and consulting, and using this would facilitate organizations through the accomplishment of their objectives by bringing disciplined and systematic techniques to appraise and progress control, risk effectiveness management and governance methods" [14,25,36]. Some of value-added IT audit benefits are in Table 2.…”
Section: Value-added It Auditmentioning
confidence: 99%