Results 1 - 10
of
877
(www.interscience.wiley.com) DOI: 10.1002/qj.105 Variance scaling in shallow-cumulus-topped mixed layers
"... ABSTRACT: Scaling of thermodynamic variance in shallow-cumulus-topped mixed layers is studied using large-eddy simulation (LES). First, the performance of the top-down scaling (the turbulent flux at mixed-layer top divided by w∗) is evaluated for transient shallow-cumulus convection over land. The r ..."
Abstract
- Add to MetaCart
of cloud-base transition-layer depth to sub-cloud mixed-layer depth. This puts ‘valve’- or ventilation-type closures for the cloud-base mass flux in the context of the variance budget for the sub-cloud layer. Copyright 2007 Royal Meteorological
Content Retrieval using Cloud-based DNS
"... Abstract—Cloud-computing systems are rapidly gaining momentum, providing flexible alternatives to many services. We study the Domain Name System (DNS) service, used to convert host names to IP addresses, which has historically been provided by a client’s Internet Service Provider (ISP). With the adv ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
, we investigate this problem in depth using Akamai as the content provider and Google DNS as the cloud-based DNS system. We demonstrate that the problem is rooted in the disparity between the number and location of servers of the two providers, and develop a new technique for geolocating data centers
Berthier A Cloud-based Intrusion Detection and Response System for Mobile Phones
- University of Illinois at Urbana-Champaign fahouman2, saliari2, rgbg@illinois.edu,2011
"... Abstract—As smart mobile phones, so called smartphones, are getting more complex and more powerful to efficiently pro-vide more functionalities, concerns are increasing regarding security threats against the smartphone users. Since smart-phones use the same software architecture as in PCs, they are ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
, they are vulnerable to similar classes of security risks such as viruses, trojans, and worms [6]. In this paper, we propose a cloud-based smartphone-specific intrusion detection and response engine, which continuously performs an in-depth forensics analysis on the smartphone to detect any misbehavior. In case a
A simple model of the atmospheric boundary layer: Sensitivity to surface evaporation
- Bound.- Layer Meteor
, 1986
"... Abstract. A simple formulation ofthe boundary layer is developed for use in large-scale models and other situations where simplicity s required. The formulation is suited for use in models where some resolution is possible within the boundary layer, but where the resolution is insufficient for resol ..."
Abstract
-
Cited by 182 (4 self)
- Add to MetaCart
. The model predicts growth of the convectively mixed layer easonably well and is well-behaved incases of weak surface heat flux and transitions between stable and unstable cases. The evolution fthe modelled boundary layer is studied for different ratios of surface vaporation topotential evaporation. Typical
Cloud-Based Robot Grasping with the Google Object Recognition Engine
"... Abstract — Rapidly expanding internet resources and wireless networking have potential to liberate robots and automation systems from limited onboard computation, memory, and software. “Cloud Robotics ” describes an approach that recognizes the wide availability of networking and incorporates openso ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
opensource elements to greatly extend earlier concepts of “Online Robots ” and “Networked Robots”. In this paper we consider how cloud-based data and computation can facilitate 3D robot grasping. We present a system architecture, implemented prototype, and initial experimental data for a cloud-based robot
1 Two Cloud-Based Cues for Estimating Scene Structure and Camera Calibration
"... Abstract—We describe algorithms that use cloud shadows as a form of stochastically structured light to support 3D scene geometry estimation. Taking video captured from a static outdoor camera as input, we use the relationship of the time series of intensity values between pairs of pixels as the prim ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
describe methods for using this cue to estimate focal length and scene structure. The second cue is based on the motion of shadow clouds across the scene; this cue results in a set of linear constraints on scene structure. These constraints have an inherent ambiguity, which we show how to overcome
Cloud-Base Distribution and Cirrus Properties Based on Micropulse Lidar Measurements at a Site in Southeastern China
, 2014
"... The cloud fraction (CF) and cloud-base heights (CBHs), and cirrus properties, over a site in southeastern China from June 2008 to May 2009, are examined by a ground-based lidar. Results show that clouds occupied the sky 41 % of the time. Significant seasonal variations in CF were found with a maximu ..."
Abstract
- Add to MetaCart
The cloud fraction (CF) and cloud-base heights (CBHs), and cirrus properties, over a site in southeastern China from June 2008 to May 2009, are examined by a ground-based lidar. Results show that clouds occupied the sky 41 % of the time. Significant seasonal variations in CF were found with a
Concept Paper Cloud-Based Automated Design and Additive Manufacturing: A Usage Data-Enabled Paradigm Shift
, 2015
"... † These authors contributed equally to this work. Abstract: Integration of sensors into various kinds of products and machines provides access to in-depth usage information as basis for product optimization. Presently, this large potential for more user-friendly and efficient products is not being r ..."
Abstract
- Add to MetaCart
realized because (a) sensor integration and thus usage information is not available on a large scale and (b) product optimization requires considerable efforts in terms of manpower and adaptation of production equipment. However, with the advent of cloud-based services and highly flexible additive
Mineral dust entrainment and deposition (DEAD) model: Description and 1990s dust climatology
- J. Geophys. Res
"... Abstract. We describe a model for predicting the size-resolved distribution of atmospheric dust for climate and chemistry-related studies. The dust distribution from 1990–1999 is simulated with our mineral aerosol entrainment and deposition module embedded in a chemical transport model. Mobilization ..."
Abstract
-
Cited by 125 (16 self)
- Add to MetaCart
. Mobilization processes include entrainment thresholds, moisture inhibition, drag partitioning, and saltation feedback. Soil erodibility is prescribed by a new physically based geomorphological index which is proportional to the runoff area upstream of each source region. Dry deposition processes include
The depth of seismic faulting and the upper transition from stable to unstable slip regimes
, 1988
"... Abstract. A number of observations indicate that an upper stability transition occurs along well-developed faults, such as the San Andreas, as a result of unconsolidated gouge within shallow regions of these faults. These observations include the depth distribution of seismicity along faults with an ..."
Abstract
-
Cited by 53 (6 self)
- Add to MetaCart
Abstract. A number of observations indicate that an upper stability transition occurs along well-developed faults, such as the San Andreas, as a result of unconsolidated gouge within shallow regions of these faults. These observations include the depth distribution of seismicity along faults
Results 1 - 10
of
877