Sciweavers

811 search results - page 146 / 163
» Token-Based Cloud Computing
Sort
View
ICWS
2009
IEEE
14 years 4 months ago
Distributed Cross-Domain Change Management
Distributed systems increasingly span organizational boundaries and, with this, system and service management domains. Web services are the primary means of exposing services to c...
Bruno Wassermann, Heiko Ludwig, Jim Laredo, Kamal ...
EUROSYS
2009
ACM
14 years 4 months ago
Improving the responsiveness of internet services with automatic cache placement
The backends of today’s Internet services rely heavily on caching at various layers both to provide faster service to common requests and to reduce load on back-end components. ...
Alexander Rasmussen, Emre Kiciman, V. Benjamin Liv...
IEEEARES
2010
IEEE
14 years 2 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
ICRA
2009
IEEE
139views Robotics» more  ICRA 2009»
14 years 2 months ago
Laser-based navigation enhanced with 3D time-of-flight data
— Navigation and obstacle avoidance in robotics using planar laser scans has matured over the last decades. They basically enable robots to penetrate highly dynamic and populated...
Fang Yuan, Agnes Swadzba, Roland Philippsen, Orhan...
ICRA
2009
IEEE
248views Robotics» more  ICRA 2009»
14 years 2 months ago
Comparison of surface normal estimation methods for range sensing applications
— As mobile robotics is gradually moving towards a level of semantic environment understanding, robust 3D object recognition plays an increasingly important role. One of the most...
Klaas Klasing, Daniel Althoff, Dirk Wollherr, Mart...