1
2
3
4
by Zhang, Yan.
Published 2021
Format:
Table of Contents: ... Caching Based on D2D Services -- 3.4.3 Hybrid Service-Enabled Edge Caching -- 3.5 Case Study: Deep...
Click to View
5
by Yeluri, Raghuram.
Published 2014
Format:
Table of Contents: ... -- The Cloud's Essential Characteristics -- The Cloud Service Models -- The Cloud Deployment Models...
Click to View
6
by Ruan, Xiaoyu.
Published 2014
Format:
Table of Contents: ... -- Network Management -- Boot Integrity -- Hardware-Based Protection -- Open-Source Software Best Practice...
Click to View
7
by Fleischmann, Albert.
Published 2015
Format:
Table of Contents: ...References -- 5 A Service Hardware Application Case Fiducia -- Abstract -- 5.1 Background -- 5...
Click to View
8
by Karner, Michael.
Published 2024
Format:
Table of Contents: ... Attacks -- 3.1 Confidentiality and Privacy Threats -- 3.2 Integrity-Based Attacks -- 3.3 Availability -- 4...
Click to View
9
by Gstrein, Oskar J.
Published 2023
Format:
Table of Contents: ... the Vacuum-Some Context -- 2.1 The Fourth Industrial Revolution -- 2.2 Covid-19 -- 3 The Case...
Click to View