Sciweavers

6195 search results - page 114 / 1239
» Cloud Computing Security
Sort
View
113
Voted
EOR
2010
88views more  EOR 2010»
15 years 4 months ago
Market-based pricing in grids: On strategic manipulation and computational cost
Grid technologies and the related concepts of utility computing and cloud computing enable the dynamic sourcing of computer resources and services, thus allowing enterprises to cu...
Jochen Stößer, Dirk Neumann, Christof W...
EUSAI
2003
Springer
15 years 9 months ago
Interaction Design for the Disappearing Computer
This invited talk starts out with a review of the previously developed Roomware® concept and sample prototypes as an approach for designing new forms of interaction and collaborat...
Norbert A. Streitz
183
Voted
SIGMOD
2012
ACM
288views Database» more  SIGMOD 2012»
13 years 6 months ago
Exploiting MapReduce-based similarity joins
Cloud enabled systems have become a crucial component to efficiently process and analyze massive amounts of data. One of the key data processing and analysis operations is the Sim...
Yasin N. Silva, Jason M. Reed
ACSAC
2005
IEEE
15 years 9 months ago
Looking Back at the Bell-La Padula Model
The Bell-La Padula security model produced conceptual tools for the analysis and design of secure computer systems. Together with its sibling engineering initiatives, it identifi...
David Elliott Bell