Sciweavers

6195 search results - page 99 / 1239
» Cloud Computing Security
Sort
View
CSREASAM
2008
15 years 5 months ago
Securing Security Policies in Autonomic Computing Systems
Ghassan Jabbour, Daniel A. Menascé
NPAR
2006
ACM
15 years 9 months ago
Real-time rendering of cartoon smoke and clouds
We describe an algorithm for rendering animated smoke particle systems in a cartoon style. This style includes outlines and celshading. For efficient self-shadowing effects, we in...
Morgan McGuire, Andi Fein
VLSM
2005
Springer
15 years 9 months ago
A Surface Reconstruction Method for Highly Noisy Point Clouds
In this paper we propose a surface reconstruction method for highly noisy and non-uniform data based on minimal surface model and tensor voting method. To deal with ill-posedness, ...
DanFeng Lu, HongKai Zhao, Ming Jiang 0001, ShuLin ...
SIGMOD
2009
ACM
112views Database» more  SIGMOD 2009»
16 years 4 months ago
How is the weather tomorrow?: towards a benchmark for the cloud
Traditionally, the goal of benchmarking a software system is to evaluate its performance under a particular workload for a fixed configuration. The most prominent examples for eva...
Carsten Binnig, Donald Kossmann, Tim Kraska, Simon...
IEEEHPCS
2010
15 years 2 months ago
Service migration within the cloud: Code mobility in SP2A
Cloud Computing (CC) is characterized by dynamically scalable and often virtualized resources that are provided as a service over the Internet. To date, no generally agreed scheme...
Michele Amoretti, Maria Chiara Laghi, Fabio Tasson...