Sciweavers

6195 search results - page 182 / 1239
» Cloud Computing Security
Sort
View
SMA
2009
ACM
228views Solid Modeling» more  SMA 2009»
15 years 11 months ago
Robust mesh reconstruction from unoriented noisy points
We present a robust method to generate mesh surfaces from unoriented noisy points in this paper. The whole procedure consists of three steps. Firstly, the normal vectors at points...
Hoi Sheung, Charlie C. L. Wang
ICPR
2008
IEEE
15 years 11 months ago
Registration by using a pseudo color attribute
This paper presents a new variant of the classical Iterative Closest Point (ICP) algorithm. The ICP result depends heavily on the matching between 3D points of the two cloud of po...
Felipe Trujillo-Romero, Michel Devy
CLOUD
2010
ACM
15 years 9 months ago
Hermes: clustering users in large-scale e-mail services
Hermes is an optimization engine for large-scale enterprise e-mail services. Such services could be hosted by a virtualized e-mail service provider, or by dedicated enterprise dat...
Thomas Karagiannis, Christos Gkantsidis, Dushyanth...
CLOUD
2010
ACM
15 years 9 months ago
The case for PIQL: a performance insightful query language
Large-scale, user-facing applications are increasingly moving from relational databases to distributed key/value stores for high-request-rate, low-latency workloads. Often, this m...
Michael Armbrust, Nick Lanham, Stephen Tu, Armando...
PVLDB
2010
179views more  PVLDB 2010»
15 years 2 months ago
MRShare: Sharing Across Multiple Queries in MapReduce
Large-scale data analysis lies in the core of modern enterprises and scientific research. With the emergence of cloud computing, the use of an analytical query processing infrast...
Tomasz Nykiel, Michalis Potamias, Chaitanya Mishra...