Sciweavers

797 search results - page 27 / 160
» Cloud Computing
Sort
View
CODASPY
2012
13 years 10 months ago
Comparison-based encryption for fine-grained access control in clouds
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
182
Voted
ICDCS
2010
IEEE
14 years 12 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
125
Voted
WETICE
2009
IEEE
15 years 9 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
CAD
2006
Springer
15 years 2 months ago
Automatic least-squares projection of points onto point clouds with applications in reverse engineering
A novel method for projecting points onto a point cloud, possibly with noise, is presented based on the point directed projection (DP) algorithm proposed by Azariadis P., Sapidis ...
Yu-Shen Liu, Jean-Claude Paul, Jun-Hai Yong, Pi-Qi...
115
Voted
SIGCSE
2009
ACM
193views Education» more  SIGCSE 2009»
16 years 3 months ago
Seattle: a platform for educational cloud computing
Cloud computing is rapidly increasing in popularity. Companies such as RedHat, Microsoft, Amazon, Google, and IBM are increasingly funding cloud computing infrastructure and resea...
Justin Cappos, Ivan Beschastnikh, Arvind Krishnamu...