Sciweavers

6195 search results - page 76 / 1239
» Cloud Computing Security
Sort
View
129
Voted
IPPS
1999
IEEE
15 years 8 months ago
Parallel Out-of-Core Divide-and-Conquer Techniques with Application to Classification Trees
Classification is an important problem in the field of data mining. Construction of good classifiers is computationally intensive and offers plenty of scope for parallelization. D...
Mahesh K. Sreenivas, Khaled Alsabti, Sanjay Ranka
157
Voted
3DIM
2005
IEEE
15 years 5 months ago
Projection-Based Registration Using a Multi-View Camera for Indoor Scene Reconstruction
A registration method is proposed for 3D reconstruction of an indoor environment using a multi-view camera. In general, previous methods have a high computational complexity and a...
Sehwan Kim, Woontack Woo
133
Voted
ICSOC
2009
Springer
15 years 1 months ago
EC2 Performance Analysis for Resource Provisioning of Service-Oriented Applications
Abstract. Cloud computing is receiving increasingly attention as it provides infinite resource capacity and "pay-as-you-go" resource usage pattern to hosted applications....
Dejun Jiang, Guillaume Pierre, Chi-Hung Chi
119
Voted
CCGRID
2010
IEEE
15 years 4 months ago
Dynamic Auction Mechanism for Cloud Resource Allocation
We propose a dynamic auction mechanism to solve the allocation problem of computation capacity in the environment of cloud computing. Truth-telling property holds when we apply a s...
Wei-Yu Lin, Guan-Yu Lin, Hung-Yu Wei
119
Voted
ISPEC
2009
Springer
15 years 10 months ago
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying...