Sciweavers

6195 search results - page 105 / 1239
» Cloud Computing Security
Sort
View
114
Voted
OTM
2009
Springer
15 years 10 months ago
CLON: Overlay Networks and Gossip Protocols for Cloud Environments
Although epidemic or gossip-based multicast is a robust and scalable approach to reliable data dissemination, its inherent redundancy results in high resource consumption on both ...
Miguel Matos, António Sousa, José Pe...
152
Voted
SC
2009
ACM
15 years 8 months ago
Cloud technologies for bioinformatics applications
Executing large number of independent tasks or tasks that perform minimal inter-task communication in parallel is a common requirement in many domains. In this paper, we present o...
Xiaohong Qiu, Jaliya Ekanayake, Scott Beason, Thil...
GECON
2010
Springer
198views Business» more  GECON 2010»
15 years 5 months ago
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers
Success of Cloud computing requires that both customers and providers can be confident that signed Service Level Agreements (SLA) are supporting their respective business activitie...
Iñigo Goiri, Ferran Julià, Josep Ori...
INFOCOM
2012
IEEE
13 years 6 months ago
VDN: Virtual machine image distribution network for cloud data centers
—Cloud computing centers face the key challenge of provisioning diverse virtual machine instances in an elastic and scalable manner. To address this challenge, we have performed ...
Chunyi Peng, Minkyong Kim, Zhe Zhang, Hui Lei
GRC
2008
IEEE
15 years 4 months ago
Scalar-product based Secure Two-party Computation
—Secure multiparty computation is a very important research topic in cryptography. A secure multi-party computation involves N untrusful parties. It takes input xi from the ith p...
Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-...