بحث بسيط
السجلات المعروضة 2281 -- 2290 من 2356
Cloud computing without seeing
(
Association for Computing Machinery
, 2011 , Conference Paper)
In the emerging cloud computing model, security is of paramount concern. This paper discusses the need for practical techniques that enable private outsourcing on the cloud by allowing the service provider to work on ...
Automatic verification of health regulatory compliance in cloud computing
(
IEEE
, 2013 , Conference Paper)
This paper aims to develop an approach that enables cloud computing clients to verify health regulatory compliance claimed by cloud computing providers. In this approach, clients of cloud computing could check automatically ...
Social access control language (SocACL)
(
Association for Computing Machinery
, 2013 , Conference Paper)
Online Social Networks hold vast amounts of readily accessible personal information leaving them particularly vulnerable to privacy breach attacks [6]. With the impact these breaches varying from simply embarrassing the ...
Tracking and constraining authorization provenance
(
Springer Berlin Heidelberg
, 2012 , Conference Paper)
Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. ...
A Process Model for Customisation of Software in Multi-tenant SaaS Model
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
This paper outlines a generic process framework for customisation of software in cloud computing. The flexibility for client-specific customisation of the software offered by software-as-a-service (SaaS) is limited. The ...
Soil-concrete interface properties subjected to temperature changes and cycles using direct shear tests
(
American Society of Civil Engineers Library (ASCE Library)
, 2017 , Conference Paper)
Geothermal foundations (energy piles) combine the structural function of deep foundations with the ground source heat exchangers to transfer geothermal energy to superstructures. The intermittent operation of the geothermal ...
Geothermal energy extraction from decommissioned petroleum wells
(
International Society for Rock Mechanics
, 2014 , Conference Paper)
Abandoned wells impose enduring liabilities to petroleum companies and/or governments. However, the depth and abundance of abandoned petroleum wells make them an economically attractive source of geothermal energy. Geothermal ...
A novel technique for extraction of geothermal energy from abandoned oil wells
(2012 , Conference Paper)
This paper investigates the possibility of design and construction of a geothermal heat exchanger suitable for installation in abandoned oil wells. Based on the in-situ data collected, an amenable heat transfer numerical ...
Engaging Engineering Students in Active Learning and Critical Thinking through Class Debates
(
Elsevier Ltd
, 2015 , Conference Paper)
Within the program of engineering, typically there are courses that are heavily dependent on mathematics and derivations of fundamental concepts. A lot of active learning can be done in these classes by using the engineering ...
Color-based Fuzzy Classifier for automated detection of cancerous cells in histopathological analysis
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
In usual clinical practice, grading of cancer tissues is often done by an expert histopathologist based on their analysis of micro-level architectural features of the cancerous tissue specimen as well as level of presence ...