Sciweavers

30 search results - page 2 / 6
» The Practice of 'Architecting' Cloud Solutions
Sort
View
IACR
2011
158views more  IACR 2011»
12 years 5 months ago
Can Homomorphic Encryption be Practical?
Abstract. The prospect of outsourcing an increasing amount of data storage and management to cloud services raises many new privacy concerns for individuals and businesses alike. T...
Kristin Lauter, Michael Naehrig, Vinod Vaikuntanat...
OOPSLA
2007
Springer
13 years 12 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
SIGMETRICS
2012
ACM
248views Hardware» more  SIGMETRICS 2012»
11 years 8 months ago
Pricing cloud bandwidth reservations under demand uncertainty
In a public cloud, bandwidth is traditionally priced in a pay-asyou-go model. Reflecting the recent trend of augmenting cloud computing with bandwidth guarantees, we consider a n...
Di Niu, Chen Feng, Baochun Li
BIBM
2010
IEEE
222views Bioinformatics» more  BIBM 2010»
13 years 3 months ago
CEO a cloud epistasis computing model in GWAS
The 1000 Genome project has made available a large number of single nucleotide polymorphisms (SNPs) for genome-wide association studies (GWAS). However, the large number of SNPs ha...
Zhengkui Wang, Yue Wang, Kian-Lee Tan, Limsoon Won...
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 5 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang