Sciweavers

6195 search results - page 227 / 1239
» Cloud Computing Security
Sort
View
CLOUDCOM
2010
Springer
15 years 3 months ago
Applying Twister to Scientific Applications
Many scientific applications suffer from the lack of a unified approach to support the management and efficient processing of large-scale data. The Twister MapReduce Framework, whi...
Bingjing Zhang, Yang Ruan, Tak-Lon Wu, Judy Qiu, A...
148
Voted
ACCV
2010
Springer
15 years 20 hour ago
Continuous Surface-Point Distributions for 3D Object Pose Estimation and Recognition
We present a 3D, probabilistic object-surface model, along with mechanisms for probabilistically integrating unregistered 2.5D views into the model, and for segmenting model instan...
Renaud Detry, Justus H. Piater
PVLDB
2011
14 years 12 months ago
Implementing Performance Competitive Logical Recovery
New hardware platforms, e.g. cloud, multi-core, etc., have led to a reconsideration of database system architecture. Our Deuteronomy project separates transactional functionality ...
David B. Lomet, Kostas Tzoumas, Michael J. Zwillin...
CVPR
2012
IEEE
13 years 7 months ago
2.5D building modeling by discovering global regularities
We introduce global regularities in the 2.5D building modeling problem, to reflect the orientation and placement similarities between planar elements in building structures. Give...
Qian-Yi Zhou, Ulrich Neumann
CHI
2008
ACM
16 years 5 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...