144
click to vote
AINA
15 years 6 months ago
2010 IEEE
—Advances in Cloud computing enable new possibilities to Internet applications developers. Previously, the main concern of Internet applications developers was deployment and hos...
293
click to vote
AINA
15 years 4 months ago
2010 IEEE
—Mnesic evocation occurs under the action of a stimulus. A successful evocation is observed as the overrun of a certain threshold of the neuronal activity followed by a medical i...
130
click to vote
AINA
15 years 12 days ago
2010 IEEE
—This paper describes a method of linearizing the nonlinear characteristics of many sensors using an embedded neural network. The proposed method allows for complex neural networ...
101
click to vote
AINA
15 years 6 months ago
2010 IEEE
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
125
click to vote
AINA
15 years 12 days ago
2010 IEEE
—Stepping-stone is the most popular way used to attack other computers. The reason is that intruders can be protected through a long connection chain involving some compromised c...
|