Sciweavers

6195 search results - page 75 / 1239
» Cloud Computing Security
Sort
View
114
Voted
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
15 years 10 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
139
Voted
CG
2004
Springer
15 years 3 months ago
A barcode shape descriptor for curve point cloud data
In this paper, we present a complete computational pipeline for extracting a compact shape descriptor for curve point cloud data. Our shape descriptor, called a barcode, is based ...
Anne D. Collins, Afra Zomorodian, Gunnar Carlsson,...
97
Voted
CCS
2010
ACM
15 years 10 months ago
Computationally secure two-round authenticated message exchange
Klaas Ole Kürtz, Henning Schnoor, Thomas Wilk...
CCS
2008
ACM
15 years 5 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
ICRA
2009
IEEE
259views Robotics» more  ICRA 2009»
15 years 10 months ago
Fast Point Feature Histograms (FPFH) for 3D registration
— In our recent work [1], [2], we proposed Point Feature Histograms (PFH) as robust multi-dimensional features which describe the local geometry around a point p for 3D point clo...
Radu Bogdan Rusu, Nico Blodow, Michael Beetz