Keyphrases
Active Consumer
9%
Administrators
9%
Admission Control
45%
Allocation Rules
11%
Application Experiences
11%
Auction Design
22%
Auction Mechanism
34%
Auction Theory
9%
Auction-based
22%
Autonomous Vehicles
45%
Back-end Database
9%
Bandwidth Cost
22%
Benchmark Applications
11%
Bidders
22%
BitTorrent
18%
Cache System
18%
Cloud Computing
45%
Cloud Computing Technology
11%
Cloud Market
22%
Cloud Service Provider
54%
Cloud Storage
11%
Cloud Storage Architecture
22%
Cloud Storage Service
68%
Cloud Storage System
90%
Cloud User
68%
Coding Process
9%
Coding Scheme
9%
Combinatorial Auctions
22%
Communication Protocol
11%
Competitive Level
9%
Competitive Ratio
11%
Computational Complexity
9%
Computational Cost
22%
Computational Speed
11%
Computer Centres
11%
Computing Power
11%
Computing Systems
11%
Content Distribution
9%
Control Problem
12%
Core-selecting Auction
45%
Darknet
45%
Data Access Service
9%
Data Availability
9%
Data Durability
18%
Data Reliability
9%
Database Management Systems
9%
Decoding Process
9%
Default Settings
11%
Demand-driven
22%
Design Problems
22%
Digital Procurement
45%
Disk Drive
9%
Distributed Systems
11%
Download Speed
9%
Downscaling
11%
Dynamic Demand
22%
Dynamic Voltage Frequency Scaling
45%
Economic Efficiency
22%
Economic Game Theory
9%
Economic Incentives
9%
Economic Mechanism
11%
Effective Approach
11%
Encoding Method
9%
Energy Conservation
45%
Energy Reduction
11%
Energy Saving
11%
Enterprise Users
9%
Exponential Rate
11%
Fair Price
9%
Fault Tolerance
9%
Free-rider Problem
9%
GF(q)
11%
Giving up
11%
GPU Platform
11%
GPU Programming
22%
Graphics Processing Unit
54%
High-performance Computing Application
11%
Highly Reliable
9%
Homomorphic Hash Function
45%
Homomorphic Hashing
11%
Huge Amounts of Data
9%
Hybrid Cloud Storage
22%
Hybrid Storage
9%
Implementation Analysis
9%
Implementation Evaluation
9%
In-memory
9%
In-memory Cache
45%
Incentive Mechanism
9%
Internet Content
9%
Key-value Cache
9%
Key-value Pairs
18%
Key-value Store
45%
Large Prime numbers
11%
Late Development
11%
Latency
18%
Latency Performance
9%
Leech
18%
Load Sharing Ratio
54%
Local Resources
20%
Malicious Node
11%
Marginal Price
22%
Market Efficiency
9%
Measurement Analysis
45%
Measurement Range
9%
Measurement Study
45%
Mechanism Design
11%
Memcached
45%
Microscopic Aspects
9%
Negative Effects
18%
Network Applications
11%
Network Bandwidth
9%
Network Churn
11%
Network Coding
90%
Network Resources
11%
New Architecture
9%
Node Failure
18%
Number of Servers
9%
Online Algorithm Design
11%
Online Algorithms
11%
Online Auctions
11%
Online Double Auction
9%
Optimal Auction
11%
Outbound
9%
Overall Cost
9%
Payment Rules
11%
Peer-to-peer Networks
11%
Performance Analysis
45%
Pervasive Data
9%
Phase Formation Mechanism
22%
Plethora
11%
Pollution Attack
34%
Popular
18%
Population Scale
11%
Power Cost
9%
Price Vector
22%
Price-based
11%
Pricing Function
22%
Pricing Model
9%
Private BitTorrent Community
45%
Private Community
18%
Procurement Auctions
45%
Provider Cost
11%
Public Transportation System
45%
Random Linear Network Coding
45%
Real-world Traces
11%
Reliable Storage
18%
Resource Pool
22%
Resource Pooling
45%
Retail Market
9%
Rule Rule
11%
Scheduling Control
45%
Scheduling Problem
12%
Seeding Time
9%
Seller
45%
Server Node
9%
Service Level Agreement
9%
Service Needs
9%
Service Provider
31%
Service-oriented
9%
Shill Bidding
22%
Shilling
22%
Simulation Study
11%
Site Activity
9%
Small Fraction
9%
Social Cost
11%
Storage Devices
18%
Storage Management
9%
Storage Resources
11%
Storage Service
20%
Storage Space
9%
Storage Structure
9%
Strategic Bidding
22%
System Energy Consumption
22%
System Scheduling
45%
Throughput Performance
9%
Torrent
18%
Traditional Computing
11%
Traffic Activity
9%
Traffic Site
9%
Truthful Bidding
22%
Underutilization
11%
Upload
9%
Upload Speed
9%
User Activity
9%
User Behavior
45%
User Populations
11%
User Request
11%
User Satisfaction
9%
VCG Auction
22%
VCG Mechanism
11%
Vector Space
22%
Virtual Instance
22%
Virtual Machine
45%
Virtual Machine Provisioning
22%
Voltage Scaling
11%
Voltage-frequency Scaling
11%
Vulnerability
22%
Web-based System
18%
Whole Network
11%
Work Study
11%
Computer Science
Admission Control
45%
Algorithm Design
22%
Analytical Property
6%
Application Benchmark
5%
Auction Theory
9%
Autonomous Vehicle
45%
Back End
9%
Bidding Behavior
15%
Bilevel Optimisation
6%
Cache Memory
45%
Cloud Computing
68%
cloud provider
30%
Cloud Service Provider
9%
Cloud Storage
45%
Cloud Storage Service
90%
Cloud Storage System
90%
Coding Technique
9%
Combinatorial Auction
15%
Communication Protocol
7%
Competitive Level
9%
Competitive Ratio
22%
Computational Complexity
9%
Computational Cost
15%
Computing Power
7%
Computing Technology
22%
Content Distribution
45%
Core Application
5%
Critical Component
22%
Data Access
9%
Data Availability
9%
Data Center
27%
Data Reliability
9%
Data Services
6%
Database Systems
9%
Decoding Process
9%
Design Implementation
9%
Design Problem
45%
Disk Storage
9%
Distributed System
7%
Double Auction
9%
Dynamic Voltage
45%
Economic Efficiency
15%
Effective Approach
5%
Energy Consumption
10%
Energy Saving
5%
Experimental Result
9%
fault-tolerance
9%
free-rider
45%
Genetic Algorithm
6%
Graphics Processing Unit
100%
Hash Function
30%
Hashing
7%
High Performance Computing Application
5%
Hybrid Cloud
45%
Incentive Mechanism
9%
Information Storage
22%
Information Technology
6%
Linear Program
6%
Maximum Profit
6%
Mechanism Design
22%
Memcached
45%
Memory Frequency
5%
Negative Effect
30%
Network Application
7%
Network Bandwidth
9%
Network Coding
90%
Network Coding Scheme
18%
Network Resource
22%
on-line algorithm
45%
Online Auction
22%
Peer to Peer Networks
7%
Performance Analysis
45%
Positive Effect
15%
Practical Solution
7%
Public Transportation
45%
Research Topic
5%
Resource Pooling
45%
Scheduling Problem
12%
Service Point
6%
Service Provider
54%
Service-Level Agreement
9%
Simulation Study
22%
Small Fraction
9%
Storage Management
9%
Storage Resource
22%
User Behavior
45%
User Population
22%
User Satisfaction
9%
Virtual Machine
45%
Virtual Machine Instance
15%
Web-Based System
9%