Sciweavers

6195 search results - page 104 / 1239
» Cloud Computing Security
Sort
View
145
Voted
EDBT
2012
ACM
266views Database» more  EDBT 2012»
13 years 6 months ago
Stormy: an elastic and highly available streaming service in the cloud
In recent years, new highly scalable storage systems have significantly contributed to the success of Cloud Computing. Systems like Dynamo or Bigtable have underpinned their abil...
Simon Loesing, Martin Hentschel, Tim Kraska, Donal...
ISBI
2008
IEEE
16 years 4 months ago
An algorithm to map asymmetries of bilateral objects in point clouds
We present a method to automatically quantify the local asymmetries of bilateral structures in point clouds. The method relies on the robust computation of the approximate symmetr...
Benoît Combès, Robin Hennessy, John W...
91
Voted
ICDE
2010
IEEE
246views Database» more  ICDE 2010»
16 years 3 months ago
Admission Control Mechanisms for Continuous Queries in the Cloud
Abstract--Amazon, Google, and IBM now sell cloud computing services. We consider the setting of a for-profit business selling data stream monitoring/management services and we inve...
Alexandros Labrinidis, Christine Chung, Kirk Pruhs...
ICC
2009
IEEE
154views Communications» more  ICC 2009»
15 years 10 months ago
Load Balancing vs. Distributed Rate Limiting: An Unifying Framework for Cloud Control
— With the expansion of cloud-based services, the question as to how to control usage of such large distributed systems has become increasingly important. Load balancing (LB), an...
Rade Stanojevic, Robert Shorten
CIKM
2009
Springer
15 years 10 months ago
Packing the most onto your cloud
Parallel dataflow programming frameworks such as Map-Reduce are increasingly being used for large scale data analysis on computing clouds. It is therefore becoming important to a...
Ashraf Aboulnaga, Ziyu Wang, Zi Ye Zhang