Sciweavers

6195 search results - page 183 / 1239
» Cloud Computing Security
Sort
View
ICDCSW
2011
IEEE
14 years 4 months ago
Cross-Examination of Datacenter Workload Modeling Techniques
Datacenter workload modeling has become a necessity in recent years due to the emergence of large-scale applications and cloud data-stores, whose implementation remains largely un...
Christina Delimitrou, Christos Kozyrakis
CVPR
2012
IEEE
13 years 7 months ago
Road network extraction from airborne LiDAR data using scene context
We presented a novel procedure to extract ground road networks from airborne LiDAR data. First point clouds were separated into ground and non-ground parts, and ground roads were ...
Jiaping Zhao, Suya You
APNOMS
2007
Springer
15 years 10 months ago
On a Low Security Overhead Mechanism for Secure Multi-path Routing Protocol in Wireless Mesh Network
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing att...
Muhammad Shoaib Siddiqui, Syed Obaid Amin, Choong ...
GI
2007
Springer
15 years 10 months ago
Developing a Security Event Management System for Intermodal Transport
: Bremen, Federal State of Germany, is planning to set up a headquarter for GMES - Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics an...
Rainer Müller
3DIM
2007
IEEE
15 years 11 months ago
Cached k-d tree search for ICP algorithms
The ICP (Iterative Closest Point) algorithm is the de facto standard for geometric alignment of threedimensional models when an initial relative pose estimate is available. The ba...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...