메뉴 건너뛰기




Volumn , Issue , 2012, Pages 45-52

Does cloud computing deliver the promised benefitsfor IT industry?

Author keywords

Cloud computing; Content analysis; IaaS; PaaS; Perceived benefits; SaaS

Indexed keywords

CONTENT ANALYSIS; IAAS; PAAS; PERCEIVED BENEFITS; SAAS;

EID: 84866866148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2361999.2362007     Document Type: Conference Paper
Times cited : (17)

References (27)
  • 1
    • 63149163701 scopus 로고    scopus 로고
    • Cloud computing: New wine or just a new bottle?
    • Voas, J. and Zhang, J. 2009. Cloud Computing: New Wine or Just a New Bottle?. IT Professional.11,2,15-17.
    • (2009) IT Professional , vol.11 , Issue.2 , pp. 15-17
    • Voas, J.1    Zhang, J.2
  • 5
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the fifth utility
    • Buyya, R., Chee Shin Yeo, Venugopal, S., Broberg, J., and Brandic, I. 2009. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility. Future Generation Computer Systems. 25, 6, 599-616.
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Shin Yeo, C.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 8
    • 69149107137 scopus 로고    scopus 로고
    • CTO roundtable: Cloud computing
    • Creeger, M. 2009. CTO roundtable: cloud computing. Communications of the ACM. 52, 50-56.
    • (2009) Communications of the ACM , vol.52 , pp. 50-56
    • Creeger, M.1
  • 16
    • 79953653695 scopus 로고    scopus 로고
    • Monitoring cloud computing by layer, part 1
    • Spring, J. 2011. Monitoring Cloud Computing by Layer, Part 1. IEEE Security and Privacy, 9, 2,66-68.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.2 , pp. 66-68
    • Spring, J.1
  • 17
    • 79957589593 scopus 로고    scopus 로고
    • Monitoring cloud computing by layer, part 2
    • Spring, J. 2011. Monitoring Cloud Computing by Layer, Part 2. IEEE Security and Privacy, 9, 3,52-55.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 52-55
    • Spring, J.1
  • 21
    • 33646032128 scopus 로고    scopus 로고
    • Accuracy and self correction of information received from an internet breast cancer list: Content analysis
    • Clinical research ed.
    • Esquivel, A., Meric-Bernstam, F., and Bernstam, E.V. 2006. Accuracy and self correction of information received from an internet breast cancer list: content analysis. BMJ (Clinical research ed.), 939-942.
    • (2006) BMJ , pp. 939-942
    • Esquivel, A.1    Meric-Bernstam, F.2    Bernstam, E.V.3
  • 22
    • 27844554031 scopus 로고    scopus 로고
    • The role of an online community for people with a rare disease: Content analysis of messages posted on a primary biliary cirrhosis mailing list
    • Lasker, J., Sogolow, E., and Sharim, R. 2005. The role of an online community for people with a rare disease: content analysis of messages posted on a primary biliary cirrhosis mailing list. Journal of medical Internet research, 7,1,10.
    • (2005) Journal of Medical Internet Research , vol.7 , Issue.1 , pp. 10
    • Lasker, J.1    Sogolow, E.2    Sharim, R.3
  • 23
    • 65349097202 scopus 로고    scopus 로고
    • Look who's talking: A pilot study of the use of discussion lists by journalism educators and students
    • Paper presented at the, Anaheim, CA
    • Pearson, M. 1996. Look who's talking: A pilot study of the use of discussion lists by journalism educators and students. Paper presented at the Annual Meeting of the Association of Education in Journalism and Mass Communication, Anaheim, CA.
    • (1996) Annual Meeting of the Association of Education in Journalism and Mass Communication
    • Pearson, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.