Sciweavers

678 search results - page 127 / 136
» Provider-Independent Use of the Cloud
Sort
View
GIS
2008
ACM
14 years 8 months ago
Parallel ODETLAP for terrain compression and reconstruction
We introduce a parallel approximation of an Over-determined Laplacian Partial Differential Equation solver (ODETLAP) applied to the compression and restoration of terrain data use...
Jared Stookey, Zhongyi Xie, Barbara Cutler, W. Ran...
SIGCOMM
2009
ACM
14 years 2 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
AH
2008
Springer
14 years 2 months ago
Collection Browsing through Automatic Hierarchical Tagging
In order to navigate huge document collections efficiently, tagged hierarchical structures can be used. For users, it is important to correctly interpret tag combinations. In this ...
Korinna Bade, Marcel Hermkes
SSDBM
2003
IEEE
196views Database» more  SSDBM 2003»
14 years 1 months ago
Stream Window Join: Tracking Moving Objects in Sensor-Network Databases
The widespread use of sensor networks presents revolutionary opportunities for life and environmental science applications. Many of these applications involve continuous queries t...
Moustafa A. Hammad, Walid G. Aref, Ahmed K. Elmaga...
IEEESP
2006
108views more  IEEESP 2006»
13 years 7 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven