Sciweavers

6195 search results - page 67 / 1239
» Cloud Computing Security
Sort
View
CAD
2007
Springer
15 years 3 months ago
Detection of closed sharp edges in point clouds using normal estimation and graph theory
The reconstruction of a surface model from a point cloud is an important task in the reverse engineering of industrial parts. We aim at constructing a curve network on the point c...
Kris Demarsin, Denis Vanderstraeten, Tim Volodine,...
156
Voted
HPDC
2012
IEEE
13 years 6 months ago
Exploring the performance and mapping of HPC applications to platforms in the cloud
This paper presents a scheme to optimize the mapping of HPC applications to a set of hybrid dedicated and cloud resources. First, we characterize application performance on dedica...
Abhishek Gupta, Laxmikant V. Kalé, Dejan S....
107
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
101
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Rapid Processing of Synthetic Seismograms Using Windows Azure Cloud
Currently, numerically simulated synthetic seismograms are widely used by seismologists for seismological inferences. The generation of these synthetic seismograms requires large ...
Vedaprakash Subramanian, Liqiang Wang, En-Jui Lee,...
156
Voted
PAISI
2010
Springer
15 years 1 months ago
Efficient Privacy Preserving K-Means Clustering
Abstract. This paper introduces an efficient privacy-preserving protocol for distributed K-means clustering over an arbitrary partitioned data, shared among N parties. Clustering i...
Maneesh Upmanyu, Anoop M. Namboodiri, Kannan Srina...