Amanote Research

Amanote Research

    RegisterSign In

SLA Violation Detection Mechanism for Cloud Computing

International Journal of Computer Applications
doi 10.5120/ijca2016907483
Full Text
Open PDF
Abstract

Available in full text

Date

January 15, 2016

Authors
Sahar MohamedAdil YousifMohammed Bakri
Publisher

Foundation of Computer Science


Related search

Application-Level Monitoring and SLA Violation Detection for Multi-Tenant Cloud Services

Emerging Research in Cloud Distributed Computing Systems
2015English

SLA in Cloud Computing Architectures: A Comprehensive Study

International Journal of Grid and Distributed Computing
Computer Science
2015English

Rule-Based SLA Management for Revenue Maximisation in Cloud Computing Markets

2010English

Economic Analysis of the SLA Mapping Approach for Cloud Computing Goods

2012English

A Multi-Objective Optimization of Cloud Based SLA-Violation Prediction and Adaptation

International Journal of Information Technology and Computer Science
2016English

An Emergency Demand Response Mechanism for Cloud Computing

Performance Evaluation Review
HardwareComputer NetworksSoftwareArchitectureCommunications
2016English

Malware Detection in Cloud Computing Infrastructures

IEEE Transactions on Dependable and Secure Computing
Electronic EngineeringElectricalComputer Science
2016English

Cuckoo Optimisation Based Intrusion Detection System for Cloud Computing

International Journal of Computer Network and Information Security
2018English

SLA Automated Negotiation Manager for Computing Services

2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy