default search action
Vincent C. Emeakaroha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Jose Luis Lo Huang, Vincent C. Emeakaroha:
Performing Distributed Quantum Calculations in a Multi-cloud Architecture Secured by the Quantum Key Distribution Protocol. SN Comput. Sci. 5(4): 410 (2024) - 2023
- [c25]Jose Luis Lo Huang, Vincent C. Emeakaroha:
Enabling Quantum Key Distribution on a Multi-Cloud Environment to Secure Distributed Data Lakes. CLOSER 2023: 78-89 - [c24]John Gilvarry, Vincent C. Emeakaroha:
Achieving Reinforcement Learning Speedup via Quantum Kernel Estimation. ISTAS 2023: 1-8
2010 – 2019
- 2019
- [j7]Lisa van der Werff, Grace Fox, Ieva Masevic, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn:
Building consumer trust in the cloud: an experimental analysis of the cloud trust label approach. J. Cloud Comput. 8: 6 (2019) - 2017
- [j6]Vincent C. Emeakaroha, Kaniz Fatema, Lisa van der Werff, Philip D. Healy, Theo Lynn, John P. Morrison:
A Trust Label System for Communicating Trust in Cloud Services. IEEE Trans. Serv. Comput. 10(5): 689-700 (2017) - [c23]Vincent C. Emeakaroha, Eoin O'Meara, Brian Lee, Theo Lynn, John P. Morrison:
Establishing Trust in Cloud Services via Integration of Cloud Trust Protocol with a Trust Label System. CLOSER 2017: 590-597 - [c22]Theo Lynn, Pierangelo Rosati, Arnaud Lejeune, Vincent C. Emeakaroha:
A Preliminary Review of Enterprise Serverless Cloud Computing (Function-as-a-Service) Platforms. CloudCom 2017: 162-169 - [p1]Vincent C. Emeakaroha, Philip D. Healy, John P. Morrison:
Facilitating Cloud Federation Management via Data Interoperability. Cloud Computing, 2nd Ed. 2017: 227-253 - 2016
- [c21]Wipawee Victoria Paulsson, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn:
Cloud Service Brokerage: A systematic literature review using a software development lifecycle. AMCIS 2016 - [c20]David O'Shea, Vincent C. Emeakaroha, John Pendlebury, Neil Cafferkey, John P. Morrison, Theo Lynn:
A Wavelet-inspired Anomaly Detection Framework for Cloud Platforms. CLOSER (1) 2016: 106-117 - [c19]David O'Shea, Vincent C. Emeakaroha, Neil Cafferkey, John P. Morrison, Theo Lynn:
Detecting Anomaly in Cloud Platforms Using a Wavelet-Based Framework. CLOSER (Selected Papers) 2016: 131-150 - [c18]Vincent C. Emeakaroha, Martin Bullman, John P. Morrison:
Towards Automated Cost-Efficient Data Management for Federated Cloud Services. CloudNet 2016: 158-163 - 2015
- [c17]Vincent C. Emeakaroha, Neil Cafferkey, Philip D. Healy, John P. Morrison:
A Cloud-Based IoT Data Gathering and Processing Platform. FiCloud 2015: 50-57 - 2014
- [j5]Kaniz Fatema, Vincent C. Emeakaroha, Philip D. Healy, John P. Morrison, Theo Lynn:
A survey of Cloud monitoring tools: Taxonomy, capabilities and objectives. J. Parallel Distributed Comput. 74(10): 2918-2933 (2014) - [c16]Kaniz Fatema, Philip D. Healy, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn:
A Data Location Control Model for Cloud Service Deployments. CLOSER (Selected Papers) 2014: 117-133 - [c15]Kaniz Fatema, Philip D. Healy, Vincent C. Emeakaroha, John P. Morrison, Theo Lynn:
A User Data Location Control Model for Cloud Services. CLOSER 2014: 476-488 - 2013
- [j4]Vincent C. Emeakaroha, Ivona Brandic, Michael Maurer, Schahram Dustdar:
Cloud resource provisioning and SLA enforcement via LoM2HiS framework. Concurr. Comput. Pract. Exp. 25(10): 1462-1481 (2013) - [j3]Vincent C. Emeakaroha, Michael Maurer, Patrick Stern, Pawel P. Labaj, Ivona Brandic, David P. Kreil:
Managing and Optimizing Bioinformatics Workflows for Data Analysis in Clouds. J. Grid Comput. 11(3): 407-428 (2013) - [c14]Vincent C. Emeakaroha, Philip D. Healy, Kaniz Fatema, John P. Morrison:
Cloud Interoperability via Message Bus and Monitoring Integration. Euro-Par Workshops 2013: 65-74 - [c13]Vincent C. Emeakaroha, Philip D. Healy, Kaniz Fatema, John P. Morrison:
Analysis of Data Interchange Formats for Interoperable and Efficient Data Communication in Clouds. UCC 2013: 393-398 - 2012
- [j2]Michael Maurer, Vincent C. Emeakaroha, Ivona Brandic, Jörn Altmann:
Cost-benefit analysis of an SLA mapping approach for defining standardized Cloud computing goods. Future Gener. Comput. Syst. 28(1): 39-47 (2012) - [j1]Vincent C. Emeakaroha, Marco Aurélio Stelmar Netto, Rodrigo N. Calheiros, Ivona Brandic, Rajkumar Buyya, César A. F. De Rose:
Towards autonomic detection of SLA violations in Cloud infrastructures. Future Gener. Comput. Syst. 28(7): 1017-1029 (2012) - [c12]Toni Mastelic, Vincent C. Emeakaroha, Michael Maurer, Ivona Brandic:
M4Cloud - Generic Application Level Monitoring for Resource-shared Cloud Environments. CLOSER 2012: 522-532 - [c11]Vincent C. Emeakaroha, Tiago C. Ferreto, Marco Aurélio Stelmar Netto, Ivona Brandic, César A. F. De Rose:
CASViD: Application Level Monitoring for SLA Violation Detection in Clouds. COMPSAC 2012: 499-508 - 2011
- [c10]Ivan Breskovic, Michael Maurer, Vincent C. Emeakaroha, Ivona Brandic, Jörn Altmann:
Towards Autonomic Market Management in Cloud Computing Infrastructures. CLOSER 2011: 24-34 - [c9]Vincent C. Emeakaroha, Ivona Brandic, Michael Maurer, Ivan Breskovic:
SLA-Aware Application Deployment and Resource Allocation in Clouds. COMPSAC Workshops 2011: 298-303 - [c8]Michael Maurer, Ivan Breskovic, Vincent C. Emeakaroha, Ivona Brandic:
Revealing the MAPE loop for the autonomic management of Cloud infrastructures. ISCC 2011: 147-152 - [c7]Christoph Stögerer, Ivona Brandic, Vincent C. Emeakaroha, Wolfgang Kastner, Thomas Novak:
Applying availability SLAs to traffic management systems. ITSC 2011: 1501-1506 - [c6]Vincent C. Emeakaroha, Pawel P. Labaj, Michael Maurer, Ivona Brandic, David P. Kreil:
Optimizing bioinformatics workflows for data analysis using cloud management techniques. WORKS@SC 2011: 37-46 - [c5]Ivan Breskovic, Michael Maurer, Vincent C. Emeakaroha, Ivona Brandic, Schahram Dustdar:
Cost-Efficient Utilization of Public SLA Templates in Autonomic Cloud Markets. UCC 2011: 229-236 - 2010
- [c4]Ivona Brandic, Vincent C. Emeakaroha, Michael Maurer, Schahram Dustdar, Sandor Acs, Attila Kertész, Gabor Kecskemeti:
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. COMPSAC Workshops 2010: 365-370 - [c3]Vincent C. Emeakaroha, Ivona Brandic, Michael Maurer, Schahram Dustdar:
Low level Metrics to High level SLAs - LoM2HiS framework: Bridging the gap between monitored metrics and SLA parameters in cloud environments. HPCS 2010: 48-54 - [c2]Michael Maurer, Ivona Brandic, Vincent C. Emeakaroha, Schahram Dustdar:
Towards Knowledge Management in Self-Adaptable Clouds. SERVICES 2010: 527-534 - [i1]Vincent C. Emeakaroha, Michael Maurer, Ivona Brandic, Schahram Dustdar:
FoSII - Foundations of Self-Governing ICT Infrastructures. ERCIM News 2010(83): 40 (2010)
2000 – 2009
- 2009
- [c1]Brikena Statovci-Halimi, Vincent C. Emeakaroha:
Framework for multi-class and dynamic flow-aware admission control. LCN 2009: 344-347
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint