Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Cloud computing

Known as: Cloud vendors, Hardware as a service, Cloud computing user 
Cloud computing is a type of Internet-based computing that provides shared computer processing resources and data to computers and other devices on… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Driven by the emergence of new compute-intensive applications and the vision of the Internet of Things (IoT), it is foreseen that… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 4
Review
2019
Review
2019
With the breakthroughs in deep learning, the recent years have witnessed a booming of artificial intelligence (AI) applications… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Research in the Internet of Things (IoT) conceives a world where everyday objects are connected to the Internet and exchange… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • figure 2
Review
2019
Review
2019
Contrary to using distant and centralized cloud data center resources, employing decentralized resources at the edge of a network… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Review
2019
Review
2019
Abstract Cloud computing manages a variety of virtualized resources, which makes scheduling a critical component. In the cloud, a… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
Review
2019
Review
2019
Over the past decade deep learning has driven progress in 2D image understanding. Despite these advancements, techniques for… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Review
2019
Review
2019
Abstract In recent years, the Edge computing paradigm has gained considerable popularity in academic and industrial circles. It… Expand
Review
2019
Review
2019
An autonomous vehicle (AV) requires an accurate perception of its surrounding environment to operate reliably. The perception… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 3
Review
2019
Review
2019
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in most network defense systems for… Expand
Review
2017
Review
2017
Legacy encryption systems depend on sharing a key (public or private) among the peers involved in exchanging an encrypted message… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3