Sciweavers

AINA
2010
IEEE
13 years 10 months ago
CloudAnalyst: A CloudSim-Based Visual Modeller for Analysing Cloud Computing Environments and Applications
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
Bhathiya Wickremasinghe, Rodrigo N. Calheiros, Raj...
AINA
2010
IEEE
13 years 9 months ago
Mnesic Evocation: An Isochron-Based Analysis
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
Hedi Ben Amor, Jacques Demongeot, Nicolas Glade
AINA
2010
IEEE
13 years 4 months ago
Compensation of Sensors Nonlinearity with Neural Networks
—This paper describes a method of linearizing the nonlinear characteristics of many sensors using an embedded neural network. The proposed method allows for complex neural networ...
Nicholas J. Cotton, Bogdan M. Wilamowski
AINA
2010
IEEE
13 years 10 months ago
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, ...
AINA
2010
IEEE
13 years 4 months ago
Resist Intruders' Manipulation via Context-Based TCP/IP Packet Matching
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
Yongzhong Zhang, Jianhua Yang, Santhoshkumar Bedig...
Computer Networks
Top of PageReset Settings