Sciweavers

6195 search results - page 53 / 1239
» Cloud Computing Security
Sort
View
96
Voted
SIMVIS
2004
15 years 4 months ago
Evaluation and Optimization of Laser Scan Data
The digitalization of objects from the real world is of great importance, e. g., in many multimedia applications, in 3D computer graphics, and in industrial measurement. In partic...
Christian Teutsch, Erik Trostmann, Michael Weber, ...
119
Voted
CVPR
2010
IEEE
15 years 11 months ago
Using cloud shadows to infer scene structure and camera calibration
We explore the use of clouds as a form of structured lighting to capture the 3D structure of outdoor scenes observed over time from a static camera. We derive two cues that relate ...
Nathan Jacobs, Brian Bies, and Robert Pless
156
Voted
CCS
2011
ACM
14 years 2 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
130
Voted
ESORICS
2012
Springer
13 years 5 months ago
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud
Motivated by the need to outsource file storage to untrusted clouds while still permitting limited use of that data by third parties, we present practical protocols by which a cli...
Lei Wei 0004, Michael K. Reiter
162
Voted
SIGGRAPH
2000
ACM
15 years 7 months ago
A simple, efficient method for realistic animation of clouds
This paper proposes a simple and computationally inexpensive method for animation of clouds. The cloud evolution is simulated using cellular automaton that simplifies the dynamics...
Yoshinori Dobashi, Kazufumi Kaneda, Hideo Yamashit...