Sciweavers

6195 search results - page 74 / 1239
» Cloud Computing Security
Sort
View
116
Voted
FOCM
2010
160views more  FOCM 2010»
15 years 2 months ago
Boundary Measures for Geometric Inference
We study the boundary measures of compact subsets of the d-dimensional Euclidean space, which are closely related to Federer’s curvature measures. We show that they can be comput...
Frédéric Chazal, David Cohen-Steiner...
94
Voted
WOA
2003
15 years 5 months ago
Spray Computers: Frontiers of Self-organization for Pervasive Computing
We envision a future in which clouds of microcomputers can be sprayed in an environment to provide, by spontaneously networking with each other, an endlessly range of futuristic a...
Marco Mamei, Franco Zambonelli
CLOUD
2010
ACM
15 years 8 months ago
Lithium: virtual machine storage for the cloud
To address the limitations of centralized shared storage for cloud computing, we are building Lithium, a distributed storage system designed specifically for virtualization workl...
Jacob Gorm Hansen, Eric Jul
146
Voted
HPDC
2010
IEEE
15 years 4 months ago
Reshaping text data for efficient processing on Amazon EC2
Text analysis tools are nowadays required to process increasingly large corpora which are often organized as small files (abstracts, news articles, etc). Cloud computing offers a ...
Gabriela Turcu, Ian T. Foster, Svetlozar Nestorov