Sciweavers

6195 search results - page 109 / 1239
» Cloud Computing Security
Sort
View
JAT
2010
109views more  JAT 2010»
15 years 2 months ago
Networks of polynomial pieces with application to the analysis of point clouds and images
We consider H¨older smoothness classes of surfaces for which we construct piecewise polynomial approximation networks, which are graphs with polynomial pieces as nodes and edges ...
Ery Arias-Castro, Boris Efros, Ofer Levi
COMSNETS
2012
297views more  COMSNETS 2012»
13 years 11 months ago
Optimizing cloud resources for delivering IPTV services through virtualization
—Virtualized cloud-based services can take advantage of statistical multiplexing across applications to yield significant cost savings to the operator. However, achieving simila...
Vaneet Aggarwal, Vijay Gopalakrishnan, Rittwik Jan...
125
Voted
ISI
2006
Springer
15 years 3 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
PROVSEC
2009
Springer
15 years 10 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
126
Voted
MOC
2010
14 years 10 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug