Sciweavers

6195 search results - page 178 / 1239
» Cloud Computing Security
Sort
View
CGI
2001
IEEE
15 years 8 months ago
Modeling and Rendering of Various Natural Phenomena Consisting of Particles
The simulation of various natural phenomena is one of the important research fields in computer graphics. In particular, aspects such as sky, clouds, water, fire, trees, smoke, te...
Tomoyuki Nishita, Yoshinori Dobashi
ALENEX
2010
117views Algorithms» more  ALENEX 2010»
15 years 6 months ago
Untangling the Braid: Finding Outliers in a Set of Streams
Monitoring the performance of large shared computing systems such as the cloud computing infrastructure raises many challenging algorithmic problems. One common problem is to trac...
Chiranjeeb Buragohain, Luca Foschini, Subhash Suri
ICCV
2011
IEEE
14 years 4 months ago
Manhattan Scene Understanding Using Monocular, Stereo, and 3D Features
This paper addresses scene understanding in the context of a moving camera, integrating semantic reasoning ideas from monocular vision with 3D information available through struct...
Alex Flint, David Murray, Ian Reid
ECSA
2010
Springer
15 years 4 months ago
Formal approach to security metrics.: what does "more secure" mean for you?
Security metrics are the tools for providing correct and upto-date information about a state of security. This information is essential for managing security efficiently. Although...
Leanid Krautsevich, Fabio Martinelli, Artsiom Yaut...
COMPUTER
2006
64views more  COMPUTER 2006»
15 years 4 months ago
How Secure is RFID?
Sixto Ortiz Jr.