Journal of shanghai Jiaotong University (Science) ›› 2015, Vol. 20 ›› Issue (2): 149-155.doi: 10.1007/s12204-015-1603-1
Previous Articles Next Articles
LI Da-zhi1,2* (李大志), LIU Jian-hua3 (刘建华), DONG Xin1 (董鑫),LI Lu-qun2 (李鲁群), CHEN Jun-hua2 (陈军华)
Online:
2015-04-30
Published:
2015-04-02
Contact:
LI Da-zhi (李大志)
E-mail:lijunzhi@sjtu.edu.cn
CLC Number:
LI Da-zhi1,2* (李大志), LIU Jian-hua3 (刘建华), DONG Xin1 (董鑫),LI Lu-qun2 (李鲁群), CHEN Jun-hua2 (陈军华). Application-Oriented Cloud Monitoring Data Distribution Mechanism[J]. Journal of shanghai Jiaotong University (Science), 2015, 20(2): 149-155.
[1] | Khanli L M, Analoui M. An approach to grid resource selection and fault management based on ECA rules [J]. Future Generation Computer Systems, 2008,24(4): 296-316. |
[2] | Guo Y, Guo L. IC cloud: Enabling compositional cloud [J]. International Journal of Automation and Computing, 2011, 8(3): 269-279. |
[3] | Newman H B, Legrand I C, Galvez P, et al. Mon-ALISA: A distributed monitoring service architecture[C]//Proceedings of the Computing in High Energy and Nuclear Physics Conference. La Jolla, Ca, USA: IEEE,2003: 1-8. |
[4] | Kanstr′en T, Savola R. Definition of core requirements and a reference architecture for a dependable,secure and adaptive distributed monitoring framework[C]//Proceedings of the 3 International Conference on Dependability. Venice, Italy: IEEE, 2010: 154-163. |
[5] | Sun Y, Xiao Z, Bao D, et al. An architecture model of management and monitoring on cloud services resources[C]//Proceedings of the 3 International Conference on Advanced Computer Theory and Engineering.Chengdu, China: IEEE, 2010: V3207-V3211. |
[6] | Lahmadi A, Andrey L, Festor O. Performance of network and service monitoring frameworks[C]//Proceedings of the IEEE International Symposium on Integrated Network Management. [s. l.]: IEEE,2009: 815-820. |
[7] | He Q, Han J, Yang Y, et al. Formulating costeffective monitoring strategies for service-based systems[J]. IEEE Transactions on Software Engineering,2014, 40(5): 461-482. |
[8] | Buyya R, Yeo C S, Venugopal S, et al. Cloud computing and emerging it platforms: Vision, hype,and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6):599-616. |
[9] | Meng S, Liu L, Wang T. State monitoring in cloud data centers [J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(9): 1328-1344. |
[10] | Chung W C, Chang R S. A new mechanism for resource monitoring in Grid computing [J]. Future Generation Computer Systems, 2009, 25(1): 1-7. |
[1] | HE Zishu, SU Yang, CHENG Ting. Opportunistic Cooperative Target Tracking Algorithm Based on the Co-located MIMO Radar Networking System [J]. Air & Space Defense, 2022, 5(1): 6-11. |
[2] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
[3] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
[4] | Jiantao SHI, Xiukun LI, Zhaoxin ZHANG. CloudStack Based Virtual Simulation Cloud Platform for Network Attack and Defense Experiment [J]. Research and Exploration in Laboratory, 2017, 36(5): 75-78. |
[5] | Xu WU, Renan CHEN, Dezhi WEI. Design and Application of Speech Lab under Cloud Computing [J]. Research and Exploration in Laboratory, 2017, 36(5): 239-242. |
[6] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 440-442. |
[7] | WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao3 (王永涛). Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 398-405. |
[8] | CHI Ziwena,b,ZHANG Fenga,b,DU Zhenhonga,b,LIU Renyia,b. Parallel Resampling Method of Remote Sensing Data Based on Pre-Partitioning for Cloud Computing [J]. Journal of Shanghai Jiaotong University, 2014, 48(11): 1627-1632. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 230
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 825
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||