forked from HoGentTIN/bachproef-gids
-
Notifications
You must be signed in to change notification settings - Fork 0
/
voorbeelden.bib
91 lines (83 loc) · 7.07 KB
/
voorbeelden.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
% Encoding: UTF-8
@Article{Khan2016,
author = {Khan, Minhaj Ahmad},
title = {A survey of security issues for cloud computing},
journaltitle = {Journal of Network and Computer Applications},
year = {2016},
volume = {71},
pages = {11-29},
doi = {10.1016/j.jnca.2016.05.010},
url = {http://www.sciencedirect.com/science/article/pii/S1084804516301060},
abstract = {High quality computing services with reduced cost and improved performance have made cloud computing a popular paradigm. Due to its flexible infrastructure, net centric approach and ease of access, the cloud computing has become prevalent. Its widespread usage is however being diminished by the fact that the cloud computing paradigm is yet unable to address security issues which may in turn aggravate the quality of service as well as the privacy of customers' data.
In this paper, we present a survey of security issues in terms of security threats and their remediations. The contribution aims at the analysis and categorization of working mechanisms of the main security issues and the possible solutions that exist in the literature. We perform a parametric comparison of the threats being faced by cloud platforms. Moreover, we compare various intrusion detection and prevention frameworks being used to address security issues. The trusted cloud computing and mechanisms for regulating security compliance among cloud service providers are also analyzed. Since the security mechanisms continue to evolve, we also present the future orientation of cloud security issues and their possible countermeasures.},
keywords = {voorbeeld, Cloud computing, Educational technologies, Technology adoption, Diffusion of innovation, Sub-Sahara Africa, Developing countries},
owner = {bert},
timestamp = {2016-09-01},
}
@Article{SabiEtAl2016,
author = {Sabi, Humphrey M. and Uzoka, Faith-Michael E. and Langmia, Kehbuma and Njeh, Felix M.},
title = {Conceptualizing a model for adoption of cloud computing in education},
journaltitle = {International Journal of Information Management},
year = {2016},
volume = {36},
number = {2},
pages = {183--191},
doi = {10.1016/j.ijinfomgt.2015.11.010},
url = {http://www.sciencedirect.com/science/article/pii/S0268401215001115},
abstract = {Cloud computing is a pervasive computing paradigm that has revolutionized how computer infrastructure and services are delivered. Current research trends on cloud computing have been focused on the technology, applications, costs, benefits, and security of cloud computing at the organizational level within small and medium sized enterprises. Little research attention has been paid on adoption and usage of cloud computing at educational establishments and how contextual factors can influence diffusion and adoption of cloud computing. Universities in developing countries are faced with challenging socio-economic and political constraints that limit their ability to invest in expensive information systems to compete on the global stage. Using constructs from the diffusion of innovation theory and the technology acceptance model, this paper proposes a model that takes account of contextual, economic, and technological influences in the perception and adoption of cloud computing at universities in sub-Saharan Africa. Results from a pilot study, based on the model, through a survey of university lecturers and IS experts shows reliability and validity of the instrument and supports its usage for a more extensive study. Implications, potential contributions to research, and suggestions for future study are discussed.},
keywords = {voorbeeld, Cloud computing, Educational technologies, Technology adoption, Diffusion of innovation, Sub-Sahara Africa, Developing countries},
owner = {bert},
timestamp = {2016-09-01},
}
@InProceedings{VanVreckemEtAl2013,
author = {Van Vreckem, Bert and Borodin, Dmitriy and De Bruyn, Wim and Now\'{e}, Ann},
title = {A Reinforcement Learning Approach to Solving Hybrid Flexible Flowline Scheduling Problems},
booktitle = {Multidisciplinary International Scheduling Conference (MISTA) 2013},
year = {2013},
url = {https://expertise.hogent.be/files/10711623/hffsp_la.pdf},
urldate = {2016-09-01},
abstract = {In this paper, we present a method based on Learning Automata to solve Hybrid Flexible Flowline Scheduling Problems (HFFSP) with additional constraints like sequence dependent setup times, precedence relations between jobs and machine eligibility. This category of production scheduling problems is noteworthy because it involves several types of constraints that occur in complex real-life production schedul- ing problems like those in process industry and batch production. In the proposed technique, Learning Automata play a dispersion game to determine the order of jobs to be processed so that makespan is minimized, while avoiding precedence constraint violations. Experiments on a set of benchmark problems indicate that this method can yield better results than the ones known until now.},
keywords = {voorbeeld},
owner = {bert},
timestamp = {2016-09-01},
}
@Electronic{LewisFowler2014,
author = {Lewis, James and Fowler, Martin},
title = {Microservices: a definition of this new architectural term},
date = {2014-03-25},
url = {http://martinfowler.com/articles/microservices.html},
urldate = {2016-09-01},
abstract = {The term "Microservice Architecture" has sprung up over the last few years to describe a particular way of designing software applications as suites of independently deployable services. While there is no precise definition of this architectural style, there are certain common characteristics around organization around business capability, automated deployment, intelligence in the endpoints, and decentralized control of languages and data.},
keywords = {voorbeeld, application architecture, web services, microservices},
owner = {bert},
timestamp = {2016-09-01},
}
@Online{Hykes2013,
author = {Solomon Hykes},
title = {The future of Linux Containers (PyCon 2013)},
date = {2013-03-21},
url = {https://www.youtube.com/watch?v=wW9CAH9nSLs},
urldate = {2016-09-01},
abstract = {At PyCon Solomon Hykes shows docker to the public for the first time.},
keywords = {voorbeeld},
owner = {bert},
timestamp = {2016-09-01},
}
@InBook{Meyr2008,
author = {Meyr, Herbert},
title = {Forecast Methods},
booktitle = {Supply Chain Management and Advanced Planning},
year = {2008},
editor = {Stadtler, Hartmut and Kilger, Christoph},
booksubtitle = {Concepts, Models, Software, and Case Studies},
edition = {4e editie},
publisher = {Springer},
location = {Heidelberg},
isbn = {978-3-540-24814-9},
pages = {461--472},
comment = {https://www.springer.com/us/book/9783540248149},
keywords = {voorbeeld},
owner = {bert},
timestamp = {2016-09-02},
}
@Comment{jabref-meta: databaseType:biblatex;}