Conferences related to Cloud Computing

Back to Top

2014 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)

The CCGrid symposium provides a major international forum for presenting and sharing recent research accomplishments and technological developments in the field of Cluster,Cloud and Grid computing. The symposium is attended by researchers and practitioners from both industry and academia. In 2013 the conference will be held in Chicago Illinois USA.


NOMS 2014 - 2014 IEEE/IFIP Network Operations and Management Symposium

Held in even-numbered years since 1988, NOMS continues to be the primary forum for technical exchange of research, standards, development, systems integrator, service providers, and user communities, presenting the latest approaches and technical solutions in the area of network operations and management.

  • NOMS 2012 - 2012 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2012 will follow the 24 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2012 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments and cloud computing platform

  • NOMS 2010 - 2010 IEEE/IFIP Network Operations and Management Symposium

    Held in even-numbered years since 1988, NOMS 2010 will follow the 22 years tradition of NOMS and IM as the primary forum for technical exchange on network management in terms of research, standards, development, systems integration, service provider, and user communities. NOMS 2010 will present up-to-date approaches and technical solutions for new management paradigms to deal with the new management issues in future infrastructures such as Web 2.0 or beyond service environments, cloud computing platforms or


2013 IEEE 15th Conference on Business Informatics (CBI)

The IEEE Conference on Business Informatics seeks for methodological approaches to describe, explain, predict, and design information and communication models, architectures, and systems for the business environment. A key characteristic of business informatics research is that it considers a real-world business context in developing new theories and concepts that enable new practical applications. Thereby, business informatics research does not only extend the body of knowledge of the information society, but at the same time provides a tangible impact to industry.

  • 2012 IEEE 14th International Conference on Commerce and Enterprise Computing (CEC)

    The IEEE International Conference on Commerce and Enterprise Computing (CEC) is the premier forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in selected areas at the realm of the convergence between Business and Informatics. This convergence includes work in E-Commerce, Enterprise Computing, Technology-enabled Business Models and Transformation as well as specific Information Systems in Industries. The program of CEC 2012 will consist of invited talks, technical paper presentations, tutorials, industry sessions, workshops, and panel discussions representing both foundational contributions and applied research.

  • 2011 IEEE 13th Conference on Commerce and Enterprise Computing (CEC)

    The aim of the forum is to present and discuss the most recent innovations, trends, results, experiences and concerns in the field of E-Commerce technologies and Enterprise Computing, including Business Process Modeling and Management, Digital Ecosystems, Enterprise Architectures, Cloud Computing, and Green IT/Green Supply Chains.

  • 2010 IEEE 12th Conference on Commerce and Enterprise Computing (CEC)

    Commerce and Business System Architectures Electronic Commerce Technologies Business Process Management Business Intelligence Business Services Semantic Web and Ontological Engineering Mobile Business Applications Security and Trust Human Computer Interaction Cloud Computing Enterprise Green Computing and Energy Trading Software as a Service (SaaS)


2013 IEEE International Conference on Computer Science and Automation Engineering (CSAE)

Algorithms, Artificial Intelligence, Cloud computing, Database Technology and Data Warehousing, Grid computing, Human-Computer Interaction, Image processing and Acquisition, Information Retrieval and Web Search, Information Security, Internet and Web Applications, Knowledge Engineering and Management, Machine Learning and Knowledge Discovery, Natural Language processing, Neural Networks and Genetic Algorithms, Pattern Recognition and Analysis, Pervasive Computing, Programming Languages and Techniques, Rough and fuzzy Rough Set, Software Engineering, Automatic Control Systems, Control Theory and Control Engineering, Detection Technology and Automatic Equipment, E-Commerce and E-Government, Electric Automation, Fuzzy Control and Fuzzy System, Management Information System, Mechatronics and Robotics.

  • 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)

    The scope of the conference includes, but not limited to Algorithms, AI, Cloud Computing, Computer Vision, Control Theory and Control Engineering, Database Technology and Data Warehousing, Distributed and Parallel Computing, Fuzzy System, Genetic Algorithms, Information Retrieval, Intelligent Control, Robotics, Machine Learning, Machine Translation, Neural Networks, Rough Set, System Engineering Theory and Practice, Video & Image Processing, etc.

  • 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE)

    The scope of the conference includes, but not limited to Algorithms, AI, Cloud Computing, Computer Vision, Control Theory and Control Engineering, Database Technology and Data Warehousing, Distributed and Parallel Computing, Fuzzy System, Genetic Algorithms, Information Retrieval, Intelligent Control, Robotics, Machine Learning, Machine Translation, Neural Networks, Rough Set, System Engineering Theory and Practice, Video & Image Processing, etc.


2013 International Conference on High Performance Computing & Simulation (HPCS)

The conference is to address, explore and exchange information on the state -of-the-art in high performance and large scale computing systems, their use in modeling and simulation and data intensive applications. Work on Clouds, Clusters and Grids are of interest as is use of special purpose hardware like GPGPU's.

  • 2012 International Conference on High Performance Computing & Simulation (HPCS)

    The conference is to address, explore and exchange information on the state-of-the-art in high performance and large scale computing systems, their use in modeling and simulation and data intensive applications. Works on Clouds, Clusters and Grids are of interest as is use of special purpose hardware like GPGPU's.

  • 2011 International Conference on High Performance Computing & Simulation (HPCS)

    The conference is to address, explore and exchange information on the state-of-the-art in high performance and large scale computing systems, their use in modeling and simulation and data intensive applications. Work on Clouds, Clusters and Grids are of interest as is use of special purpose hardware like GPGPU's.

  • 2010 International Conference on High Performance Computing & Simulation (HPCS)

    The conference is to address, explore and exchange information on the state-of-the-art in high performance and large scale computing systems, their use in modeling and simulation, their design and use, and their impact. Participation is extended to researchers, designers, educators and interested parties in all related disciplines and specialties.

  • 2009 International Conference on High Performance Computing & Simulation (HPCS)

    The conference is to address, explore and exchange information on the state-of-the-art in high performance and large scale computing systems, their use in modeling and simulation, their design and use, and their impact. Participation is extended to researchers, designers, educators and interested parties in all related disciplines and specialties. The conference will include invited presentations from experts from academia, industry, and government.


More Conferences

Periodicals related to Cloud Computing

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


IT Professional

This IEEE Computer Society periodical covers the many rapidly emerging issues facing information technology professionals, developers, and managers of enterprise information systems. IT Professional's coverage areas include: Web services, Internet security, data management; enterprise architectures and infrastructures; organizing and utilizing data; instituting cross-functional systems; using IT for competitive breakthroughs; integrating systems and capitalizing on IT advances; emerging technologies like electronic ...


Proceedings of the IEEE

The most highly-cited general interest journal in electrical engineering and computer science, the Proceedings is the best way to stay informed on an exemplary range of topics. This journal also holds the distinction of having the longest useful archival life of any EE or computer related journal in the world! Since 1913, the Proceedings of the IEEE has been the ...


More Periodicals


Xplore Articles related to Cloud Computing

Back to Top

Auditing for Distributed Storage Systems

Anh Le; Athina Markopoulou; Alexandros G. Dimakis IEEE/ACM Transactions on Networking, 2016

Distributed storage codes have recently received a lot of attention in the community. Independently, another body of work has proposed integrity-checking schemes for cloud storage, none of which, however, is customized for coding- based storage or can efficiently support repair. In this work, we bridge the gap between these two currently disconnected bodies of work. We propose ssr NC mathchar"702D ...


Work in progress - digital school desk

Yung-Sheng Chen; Jer-Wei Rau 2009 39th IEEE Frontiers in Education Conference, 2009

Combining embedded computer, touch panel, and cloud computing capability, a newly designed digital school desk (DSD) is presented to further build an advanced classroom or meeting room considering not only e-service but also interpersonal interaction. Based on a highlighted digital ink, the frontier work of our DSD designed is to make a paper-free but paper-like desk which is used close ...


Smoothed Online Resource Allocation in Multi-tier Distributed Cloud Networks

Lei Jiao; Antonia Tulino; Jaime Llorca; Yue Jin; Alessandra Sala 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2016

In the emerging edge computing paradigm, small-scale highly distributed edge clouds are on the service path between end users and conventional large-scale clouds at the Internet core. A crucial problem that needs to be addressed in order to drive cost and performance in this multi-tier distributed infrastructure is the dynamic and joint allocation of cloud and network resources, which is ...


Let the Sun Shine

Greg Byrd Computer, 2016

Clemson University students designed an inexpensive sensor node and cloud computing infrastructure to collect real-time, localized solar irradiation data. This data can be used by consumers and utilities to predict the availability of solar-generated electricity and to manage its use.


On First Fit Bin Packing for Online Cloud Server Allocation

Xueyan Tang; Yusen Li; Runtian Ren; Wentong Cai 2016 IEEE International Parallel and Distributed Processing Symposium (IPDPS), 2016

Cloud-based systems often face the problem of dispatching a stream of jobs to run on cloud servers in an online manner. Each job has a size that defines the resource demand for running the job. Each job is assigned to run on a cloud server upon its arrival and the job departs after it completes. The departure time of a ...


More Xplore Articles

Educational Resources on Cloud Computing

Back to Top

eLearning

A Resource-Aware Pairing Device Framework for Ubiquitous Cloud Applications

Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, 2012

With the increasing capability of today's smart devices such as smart phones, tablets, TV Set-top-boxes, along the growing Cloud service offers, we see the rising opportunity to bring ubiquitous services to consumers. A device framework that aims to ease the inter-connectivity of local devices and make them aware of surrounding resources is proposed to bring better user experience within physical ...


Table of contents

Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on, 2013

The following topics are dealt with: broadband communication; wireless computing; wireless network; mobile network; wireless sensor network; wireless mesh network; wireless communication system; mobile computing; body area sensor network; cloud computing; cluster computing; P2P technology; health technology; MANET; VANET; network security; health care; robot emotion; data security; network handover; renewable system; multimedia application; parallel system; distributed system; geo-location system; smart ...


Service Level Achievements -- Distributed Knowledge for Optimal Service Selection

Web Services (ECOWS), 2011 Ninth IEEE European Conference on, 2011

In a service-oriented setting, where services are composed to provide end user functionality, it is a challenge to find the service components with best-fit functionality and quality. A decision based on information mainly provided by service providers is inadequate as it cannot be trusted in general. In this paper, we discuss service compositions in an open market scenario where an ...


Data Integrity Evaluation in Cloud Database-as-a-Service

Services (SERVICES), 2013 IEEE Ninth World Congress on, 2013

Data integrity is a major concern in outsourced IT services like cloud computing. Cloud computing has become popular because of cost reductions, time saving and mobility in service. However data integrity is still an unresolved issue in cloud services. We present an efficient mechanism for evaluating data integrity in cloud database-as-a-service. Our approach is based on inserting fake tuples into ...


Intrusion damage assessment for multi-stage attacks for clouds

Communications, IET, 2013

Clouds represent a major paradigm shift from contemporary systems, inspiring the contemporary approach to computing. They present fascinating opportunities to address dynamic user requirements with the provision of flexible computing infrastructures that are available on demand. Clouds, however, introducing novel challenges particularly with respect to security that require dedicated efforts to address them. This study is focused at one such ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Cloud Computing"

IEEE-USA E-Books

  • No title

    This lecture provides an introduction to cyber foraging, a topic that lies at the intersection of mobile and cloud computing. Cyber foraging dynamically augments the computing resources of mobile computers by opportunistically exploiting fixed computing infrastructure in the surrounding environment. In a cyber foraging system, applications functionality is dynamically partitioned between the mobile computer and infrastructure servers that store data and execute computation on behalf of mobile users. The location of application functionality changes in response to user mobility, platform characteristics, and variation in resources such as network bandwidth and CPU load. Cyber foraging also introduces a new, surrogate computing tier that lies between mobile users and cloud data centers. Surrogates are wired, infrastructure servers that offer much greater computing resources than those offered by small, battery-powered mobile devices. Surrogates are geographically distributed to be as cl se as possible to mobile computers so that they can provide substantially better response time to network requests than that provided by servers in cloud data centers. For instance, surrogates may be co- located with wireless hotspots in coffee shops, airport lounges, and other public locations. This lecture first describes how cyber foraging systems dynamically partition data and computation. It shows how dynamic partitioning can often yield better performance, energy efficiency, and application quality than static thin-client or thick-client approaches for dividing functionality between cloud and mobile computers. The lecture then describes the design of the surrogate computing tier. It shows how strong isolation can enable third- party computers to host computation and store data on behalf of nearby mobile devices. It then describes how surrogates can provide reasonable security and privacy guarantees to the mobile computers that use them. The lecture concludes with a discussion of d ta staging, in which surrogates temporarily store data in transit between cloud servers and mobile computers in order to improve transfer bandwidth and energy efficiency. Table of Contents: Introduction / Partitioning / Management / Security and Privacy / Data Staging / Challenges and Opportunities

  • Cloud Computing in Emerging Markets

    Cloud computing is in the infant stage of development in emerging markets (EMs), and currently cloud usage has been shallow in these markets. Nonetheless, EMs are rapidly embracing the cloud-based economy as evidenced by more rapid growth in cloud deployment in these markets compared to more developed markets. This chapter analyzes the current status of the cloud industry in EMs and examines the fundamental forces driving and constraining the use and deployment of the cloud in these countries.

  • Notes

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of ersonal computers and the Internet and examines how it creates the conceptual and practical framework for a connected world. He explores the industrial Internet and machine-to-machine communication, the basis for smart manufacturing and end-to-end supply chain visibility; the growing array of smart consumer devices and services -- from Fitbit fitness wristbands to mobile apps for banking; the practical and technical challenges of building the IoT; and the risks of a connected world, including a widening digital divide and threats to privacy and security. Finally, he considers the long-term impact of the IoT on society, narrating an eye-opening "Day in the Life" of IoT connections circa 2025.

  • Research Topics in Cloud Computing

    The cloud computing research trends of industry and academia are determined by considering the aims and output of journals, conferences, and workshops during 2012 and 2013, white papers from major industry players in cloud computing; objectives of major cloud computing laboratories in universities; published government and industry research funding for cloud computing; and major government projects undertaken in various parts of the world.

  • Further Readings

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of ersonal computers and the Internet and examines how it creates the conceptual and practical framework for a connected world. He explores the industrial Internet and machine-to-machine communication, the basis for smart manufacturing and end-to-end supply chain visibility; the growing array of smart consumer devices and services -- from Fitbit fitness wristbands to mobile apps for banking; the practical and technical challenges of building the IoT; and the risks of a connected world, including a widening digital divide and threats to privacy and security. Finally, he considers the long-term impact of the IoT on society, narrating an eye-opening "Day in the Life" of IoT connections circa 2025.

  • No title

    In recent years, online social networking has revolutionized interpersonal communication. The newer research on language analysis in social media has been increasingly focusing on the latter's impact on our daily lives, both on a personal and a professional level. Natural language processing (NLP) is one of the most promising avenues for social media data processing. It is a scientific challenge to develop powerful methods and algorithms which extract relevant information from a large volume of data coming from multiple sources and languages in various formats or in free form. We discuss the challenges in analyzing social media texts in contrast with traditional documents. Research methods in information extraction, automatic categorization and clustering, automatic summarization and indexing, and statistical machine translation need to be adapted to a new kind of data. This book reviews the current research on Natural Language Processing (NLP) tools and methods for processing the no -traditional information from social media data that is available in large amounts (big data), and shows how innovative NLP approaches can integrate appropriate linguistic information in various fields such as social media monitoring, health care, business intelligence, industry, marketing, and security and defense. We review the existing evaluation metrics for NLP and social media applications, and the new efforts in evaluation campaigns or shared tasks on new datasets collected from social media. Such tasks are organized by the Association for Computational Linguistics (such as SemEval tasks) or by the National Institute of Standards and Technology via the Text REtrieval Conference (TREC) and the Text Analysis Conference (TAC). In the concluding chapter, we discuss the importance of this dynamic discipline and its great potential for NLP in the coming decade, in the context of changes in mobile technology, cloud computing, and social networking.

  • Cloud Outlook

    Cloud computing's transformational potential is huge. In order to embrace the cloud successfully and harness its power for traditional and new kinds of applications, we must properly address other related factors such as security, privacy, access management, compliance requirements, availability, and functional continuity in case of cloud failure. To assist cloud users in their transition to the cloud, a broader cloud ecosystem is emerging that aims to offer a spectrum of new cloud support services that augment, complement, or assist the foundational SaaS, PaaS and IaaS offerings. There are also several ongoing developments that are aimed at further advancing the cloud and its widespread adoption, addressing cloud's limitations and concerns. Cloud service providers, the IT industry, professional and industry associations, governments, and IT professionals all have a role to play in shaping, fostering, and harnessing the full potential of the emerging cloud ecosystem.

  • Service Orchestration Analysis

    This chapter contains sections titled: Service Orchestration Definition Policy-Based Management Cloud Management Service Orchestration's Role in Risk Mitigation Summary

  • Index

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of ersonal computers and the Internet and examines how it creates the conceptual and practical framework for a connected world. He explores the industrial Internet and machine-to-machine communication, the basis for smart manufacturing and end-to-end supply chain visibility; the growing array of smart consumer devices and services -- from Fitbit fitness wristbands to mobile apps for banking; the practical and technical challenges of building the IoT; and the risks of a connected world, including a widening digital divide and threats to privacy and security. Finally, he considers the long-term impact of the IoT on society, narrating an eye-opening "Day in the Life" of IoT connections circa 2025.

  • Domains

    This chapter contains sections titled: Domains and Principles, Security, Artificial Intelligence, Cloud Computing, Big Data, Conclusion



Standards related to Cloud Computing

Back to Top

No standards are currently tagged "Cloud Computing"