Sciweavers

9245 search results - page 1599 / 1849
» Virtualization
Sort
View
GECON
2010
Springer
198views Business» more  GECON 2010»
15 years 5 months ago
Resource-Level QoS Metric for CPU-Based Guarantees in Cloud Providers
Success of Cloud computing requires that both customers and providers can be confident that signed Service Level Agreements (SLA) are supporting their respective business activitie...
Iñigo Goiri, Ferran Julià, Josep Ori...
CSREASAM
2009
15 years 5 months ago
Design Considerations for a Cyber Incident Mission Impact Assessment (CIMIA) Process
Virtually all modern organizations have embedded information systems and networking technologies into their core business processes as a means to increase operational efficiency, i...
Michael R. Grimaila, Larry Fortson, Janet Sutton
142
Voted
DAGM
2009
Springer
15 years 5 months ago
Realistic Depth Blur for Images with Range Data
Abstract. We present a system that allows for changing the major camera parameters after the acquisition of an image. Using the high dynamic range composition technique and additio...
Benjamin Huhle, Timo Schairer, Philipp Jenke, Wolf...
DAMON
2009
Springer
15 years 5 months ago
k-ary search on modern processors
This paper presents novel tree-based search algorithms that exploit the SIMD instructions found in virtually all modern processors. The algorithms are a natural extension of binar...
Benjamin Schlegel, Rainer Gemulla, Wolfgang Lehner
DBSEC
2009
112views Database» more  DBSEC 2009»
15 years 5 months ago
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers
There is an increasing need for sharing data repositories containing personal information across multiple distributed and private databases. However, such data sharing is subject t...
Pawel Jurczyk, Li Xiong
« Prev « First page 1599 / 1849 Last » Next »