Search
Now showing items 1-8 of 8
A layered security approach for cloud computing infrastructure
(I-SPAN 2009 - The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
A desktop application to learn the actual workload of the students
(Procedia - Social and Behavioral Sciences, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...
Integration of GIS: A showcase study on GML based WebGIS
(Proceedings of SPIE - The International Society for Optical Engineering, 2008)
The growth of Geographical Information Systems (GIS) emerges as analytical decision-making tools utilizing highly specialized geographic data. However, a simple system still does not exist for the integration/sharing ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(Sensors, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
Face matrix: A quick search and indexing method for suspect recognition in police departments
(Information Technology Journal, 2007)
This study presents an indexing and a quick sort method that could be used to find the possible matching guilty pictures from the police database by using a tracing software and eyewitness descriptions about the suspected ...
A Layered Security Approach for Cloud Computing Infrastructure
(IEEE, 2009)
This paper introduces a practical security model based on key security considerations by looking at a number of infrastructure aspects of Cloud Computing such as SaaS, Utility, Web, Platform and Managed Services, Service ...
Detection of hidden hostile/terrorist groups in harsh territories by using animals as mobile biological sensors
(MDPI, 2008)
Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist ...
A desktop application to learn the actual workload of the students
(ELSEVIER SCIENCE BV, 2009)
The use of European Credit Transfer system (ECTS) provides a reference standard for exchange students across the European Union (EU). It helps more transparency and compatibility to compare the self-study period and ...