Sciweavers

6195 search results - page 100 / 1239
» Cloud Computing Security
Sort
View
FAST
2009
15 years 1 months ago
Making a Cloud Provenance-Aware
The advent of cloud computing provides a cheap and convenient mechanism for scientists to share data. The utility of such data is obviously enhanced when the provenance of the dat...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
152
Voted
CORR
2011
Springer
176views Education» more  CORR 2011»
14 years 10 months ago
Maximizing Cloud Providers Revenues via Energy Aware Allocation Policies
—Cloud providers, like Amazon, offer their data centers’ computational and storage capacities for lease to paying customers. High electricity consumption, associated with runni...
Michele Mazzucco, Dmytro Dyachuk, Ralph Deters
145
Voted
ECCV
2010
Springer
15 years 8 months ago
2.5D Dual Contouring: A Robust Approach to Creating Building Models from Aerial LiDAR Point Clouds
We present a robust approach to creating 2.5D building models from aerial LiDAR point clouds. The method is guaranteed to produce crack-free models composed of complex roofs and ve...
Qian-Yi Zhou, Ulrich Neumann
ECCV
2008
Springer
16 years 5 months ago
Segmentation and Recognition Using Structure from Motion Point Clouds
We propose an algorithm for semantic segmentation based on 3D point clouds derived from ego-motion. We motivate five simple cues designed to model specific patterns of motion and 3...
Gabriel J. Brostow, Jamie Shotton, Julien Fauqueur...
NSDI
2010
15 years 5 months ago
Centrifuge: Integrated Lease Management and Partitioning for Cloud Services
: Making cloud services responsive is critical to providing a compelling user experience. Many largescale sites, including LinkedIn, Digg and Facebook, address this need by deployi...
Atul Adya, John Dunagan, Alec Wolman