A Survey on Resource Allocation Strategies in Cloud
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
The cloud computing is an emerging technology in the era of Internet. It is advancement to grid computing. Basically cloud computing is combination of distributed, parallel and grid computing. The cloud is a shared pool of virtual resources and these resources are shared by multiple users at different geographical area. As cloud computing is being enhanced day by day, several issues are also increased like security, resource allocation, performance and cost. However one of the major pitfalls in cloud computing is related to optimizing the resources being allocated. In this paper, various resource allocation strategies are classified on the basis of different parameters, priority, hybridization, and other techniques. Each category has details of number of resource allocation techniques. This work is useful for researchers to get an idea of various resource allocation strategies at a glance.
Authors and Affiliations
Satveer Singh , Jaspal Singh
The Moderating Factors of 3G User Acceptance Technology in Shimla (India) Using UTAUT Model
The UTAUT model one of the best model that affect the behavior acceptance and also help us predicting the user acceptance technology. UTAUT model is current model that has used in predicting usage of mobiles, computer sy...
A STUDY ON CLOUD COMPUTING IN AVIATION AND AEROSPACE
Right from the time to establish aerospace and aviation industries till the air vehicle departures safely, passenger information, co-ordination and integration amongst several stakeholders are very crucial. The pressure...
Enhancing Efficiency and Accuracy of Imbalanced Datasets Using Fuzzy Neural Network
In Data Mining the class Imbalance classification problem is considered to be one of the emergent challenges. This problem occurs when the number of examples that represents one of the classes of the dataset is much lowe...
A Review on Recent Computer Crimes
With the evolution of technology, crimes happening with the help of computer and internet are increasing day by day and have become curse for the modern era. Cybercrime globally affects IT environment very much be it gov...
Exploratory Data Analysis of Turbulent Flows
Large Eddy Simulations (LES) contains 3D instantaneous velocity fields as well as passive scalar concentration field describing the coherent flow structures. The study of coherent flow structures has a major impact on th...