Cloud Computing

This dataset contains measurements of TPC-C benchmark executions in MySQL server deployed in Google Cloud Platform.

Categories:
341 Views

Cloud forensics is different than digital forensics because of the architectural implementation of the cloud. In an Infrastructure as a Service (IaaS) cloud model. Virtual Machines (VM) deployed over the cloud can be used by adversaries to carry out a cyber-attack using the cloud as an environment.

Categories:
2903 Views

A proactive and reactive service composition service composition (PRSC) method for CMfg based on digital thread. Firstly, the digital thread-driven information interaction architecture is established, based on which the detailed process of PRSC and the constitution of digital thread are designed.

Categories:
206 Views

This repository contains code and instruction to reproduce the experiments presented in the paper
"A Methodology and Simulation-based Toolchain for Estimating Deployment Performance of Intelligent Collective Services at the Edge"
by Roberto Casadei, Giancarlo Fortino, Danilo Pianini, Andrea Placuzzi, Claudio Savaglio, and Mirko Viroli.

Categories:
262 Views

The dataset contains the navigation measurements obtained in the indoor experiment field. The volunteers move on the whole 4th floor of the Building D of Dong Jiu Teaching classes at Huazhong University of Science and Technology. Meanwhile, the experimental area consists of a total area of 717 m 2. These datasets were used and can be used to test and validate the radio map database updating-based localization positioning algorithm through the RSSI signals space.

Categories:
1398 Views

This is a dataset of client-server Round Trip Time delays of an actual cloud gaming tournament run on the infrastructure of the cloud gaming company Swarmio Inc. The dataset can be used for designing algorithms and tuning models for user-server allocation and server selection. To collect the dataset, tournament players were connected to Swarmio servers and delay measurements were taken in real time and actual networking conditions.

Categories:
950 Views

Pen testing the method to evaluate the security of an application or network by safely exploiting any security vulnerabilities present in the system. These security flaws can be present in various areas such as system configuration settings, login methods, and even end-users risky behaviors.

Categories:
515 Views

Here are some experimental results of the paper "A Variable-Length Mixed-Variable Pareto Optimization Approach to Evolutionary Cloud Service Allocation ".

Categories:
420 Views

The dataset attached is recordings done for 5 parameters to ascertain physical soil composition. Data was collected between March 2021 and April 2021. This dataset is the raw data.

Categories:
2670 Views

Pages