2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.334
|View full text |Cite
|
Sign up to set email alerts
|

PSO Based Multiobjective Reliable Optimization Model for Cloud Storage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…In our evaluation, an instance is considered as small if it can be evaluated within an hour using the exact method. We compared our contribution results with the standard version of NSGAII and a multi-objective version of Particle Swarm Optimization used in [46] (designated as PSO in the sequel). Finally, we evaluated the success rate of the repair function.…”
Section: Dcs Specificationsmentioning
confidence: 99%
See 3 more Smart Citations
“…In our evaluation, an instance is considered as small if it can be evaluated within an hour using the exact method. We compared our contribution results with the standard version of NSGAII and a multi-objective version of Particle Swarm Optimization used in [46] (designated as PSO in the sequel). Finally, we evaluated the success rate of the repair function.…”
Section: Dcs Specificationsmentioning
confidence: 99%
“…Regarding distributed clouds, several studies have been proposed [30,43,46,50,58,74,75,83,84]. They considered different applications such as bigdata analysis, workflow optimization and geo-replication, etc.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The simulation results from using the ACO scheme with cloud datasets in virtual machines confirm a better security level compared to the traditional baselines. Further, SI-empowered algorithms such as PSO can also build algorithms for providing data access reliability in cloud storage [152], by optimizing the data transfer trust and storage stability under cloud storage capability and storage cost.…”
Section: A Access Controlmentioning
confidence: 99%