Sciweavers

413 search results - page 55 / 83
» It outsourcing maturity model
Sort
View
CORR
2010
Springer
128views Education» more  CORR 2010»
13 years 8 months ago
Random Oracles in a Quantum World
Once quantum computers reach maturity most of today's traditional cryptographic schemes based on RSA or discrete logarithms become vulnerable to quantum-based attacks. Hence, ...
Özgür Dagdelen, Marc Fischlin, Anja Lehm...
BMCBI
2010
122views more  BMCBI 2010»
13 years 8 months ago
An overview of the CellML API and its implementation
Background: CellML is an XML based language for representing mathematical models, in a machine-independent form which is suitable for their exchange between different authors, and...
Andrew K. Miller, Justin Marsh, Adam Reeve, Alan G...
CVPR
2008
IEEE
14 years 10 months ago
Image selection for improved Multi-View Stereo
The Middlebury Multi-View Stereo evaluation [18] clearly shows that the quality and speed of most multi-view stereo algorithms depends significantly on the number and selection of...
Alexander Hornung, Boyi Zeng, Leif Kobbelt
CCS
2009
ACM
14 years 3 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...
SIGMETRICS
2005
ACM
120views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
Managing server energy and operational costs in hosting centers
The growing cost of tuning and managing computer systems is leading to out-sourcing of commercial services to hosting centers. These centers provision thousands of dense servers w...
Yiyu Chen, Amitayu Das, Wubi Qin, Anand Sivasubram...