Sciweavers

811 search results - page 113 / 163
» Token-Based Cloud Computing
Sort
View
INFOCOM
2012
IEEE
12 years 11 days ago
Socialize spontaneously with mobile applications
—With the proliferation of mobile devices in both smartphone and tablet form factors, it is intuitive and natural for users to socially interact with their collaborators or compe...
Zimu Liu, Yuan Feng, Baochun Li
INFOCOM
2012
IEEE
12 years 11 days ago
Extensive analysis and large-scale empirical evaluation of tor bridge discovery
Abstract—Tor is a well-known low-latency anonymous communication system that is able to bypass Internet censorship. However, publicly announced Tor routers are being blocked by v...
Zhen Ling, Junzhou Luo, Wei Yu, Ming Yang, Xinwen ...
TKDE
2012
215views Formal Methods» more  TKDE 2012»
12 years 10 days ago
Outsourced Similarity Search on Metric Data Assets
—This paper considers a cloud computing setting in which similarity querying of metric data is outsourced to a service provider. The data is to be revealed only to trusted users,...
Man Lung Yiu, Ira Assent, Christian S. Jensen, Pan...
SMA
2008
ACM
173views Solid Modeling» more  SMA 2008»
13 years 9 months ago
Visibility-based feature extraction from discrete models
In this paper, we present a new visibility-based feature extraction algorithm from discrete models as dense point clouds resulting from laser scans. Based on the observation that ...
Antoni Chica
ICPR
2004
IEEE
14 years 11 months ago
Conformal Method for Quantitative Shape Extraction: Performance Evaluation
We evaluate our recently developed conformal method for quantitative shape extraction from unorganized 3D oriented point clouds. The conformal method has been tested previously on...
George Kamberov, Gerda Kamberova