AINA
13 years 10 months ago
2010 IEEE
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
AINA
13 years 9 months ago
2010 IEEE
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
AINA
13 years 4 months ago
2010 IEEE
—This paper describes a method of linearizing the nonlinear characteristics of many sensors using an embedded neural network. The proposed method allows for complex neural networ...
AINA
13 years 10 months ago
2010 IEEE
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
AINA
13 years 4 months ago
2010 IEEE
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
|