[1]
M. Whaiduzzaman, M. Sookhak, A. Gani, R. Buyya: A survey on vehicular cloud computing, Journal of Network and Computer Applications, Vol. 40 (2014), pp.325-344.
DOI: 10.1016/j.jnca.2013.08.004
Google Scholar
[2]
V. Chang, R. J. Walters, G. Wills: The development that leads to the Cloud Computing Business Framework, International Journal of Information Management, Vol. 33 (2013), pp.524-538.
DOI: 10.1016/j.ijinfomgt.2013.01.005
Google Scholar
[3]
C. L. P. Chen, C. Y. Zhang: Data-intensive applications, challenges, techniques and technologies: A survey on Big Data, Information Sciences, Vol. 275 (2014), pp.314-347.
DOI: 10.1016/j.ins.2014.01.015
Google Scholar
[4]
R. V. Bossche, K. Vanmechelen, J. Broeckhove: Online cost-efficient scheduling of deadline-constrained workloads on hybrid clouds, Future Generation Computer Systems, Vol. 29 (2013), pp.973-985.
DOI: 10.1016/j.future.2012.12.012
Google Scholar
[5]
R. G. Tinedo, M. S. Artigas, A. Ramírez, A. M. Martínez: Giving form to social cloud storage through experimentation: Issues and insights, Future Generation Computer Systems, Vol. 40 (2014), pp.1-16.
DOI: 10.1016/j.future.2014.05.001
Google Scholar
[6]
X. Xu: From cloud computing to cloud manufacturing, Robotics and Computer-Integrated Manufacturing, Vol. 28 (2012), pp.75-86.
DOI: 10.1016/j.rcim.2011.07.002
Google Scholar
[7]
C. Modi, D. Patel, B. Borisaniya, H. Patel, A. Patel, M. Rajarajan: A survey of intrusion detection techniques in Cloud, Journal of Network and Computer Applications, Vol. 36 (2013), pp.42-57.
DOI: 10.1016/j.jnca.2012.05.003
Google Scholar