2021
DOI: 10.1109/tsusc.2020.3025180
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Resource Provisioning for Sustainable Cloud Computing Systems in the Presence of Correlated Failures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…The term "Digital Watermarking" had its dawn in 1992 and since then it has been an active topic of research [21]. Its applications are continuously branching out to new advents in technology; for example, the process of watermarking a neural network is known as "passporting" [22,23], security in cloud storage systems [24,25], electronic money transfers, e-governance [26]. However, the use of watermarking for purposes of copyright protection and authentication has always been a key focus ever since its arrival [27,28], thus is also the focus of this discussion.…”
Section: Related Workmentioning
confidence: 99%
“…The term "Digital Watermarking" had its dawn in 1992 and since then it has been an active topic of research [21]. Its applications are continuously branching out to new advents in technology; for example, the process of watermarking a neural network is known as "passporting" [22,23], security in cloud storage systems [24,25], electronic money transfers, e-governance [26]. However, the use of watermarking for purposes of copyright protection and authentication has always been a key focus ever since its arrival [27,28], thus is also the focus of this discussion.…”
Section: Related Workmentioning
confidence: 99%
“…IDSM systems use intent negotiation to meet user's service requirements under resource scarcity and quality-of-services (QoS) constraints, rather than simply rejecting them outright. The resource scarcity may occur due to the under-deployment of the resources, their over-utilization or failures, which is a frequent scenario in softwarized networks [9].…”
Section: Introductionmentioning
confidence: 99%
“…With the pressure of connecting billions of intelligent devices and having mobile terminals as a part of the Internet of Things (IoT), the intensity of migrating the services and assuring the safety of operations are critical [3]. Most recent works focus on service migration when an additional load is encountered in the network or the case of a change in the configuration of the network [4], [5]. These works utilize cost functions and build a priority system to handle incoming requests.…”
Section: Introductionmentioning
confidence: 99%