Long back, I wrote posts related to Seminar Topics especially for computer science seminars. The idea is to bring some latest technology and its understanding in an easy way to […]
Long back, I wrote posts related to Seminar Topics especially for computer science seminars. The idea is to bring some latest technology and its understanding in an easy way to […]
Radio Frequency Identification (RFID) is an automated identification technology that used tags to transmit data upon RFID reader queries. Compared to barcodes identification technology, RFID tags provide a unique identifier, […]
Server load balancing is defined as a process and technology that distributes site traffic among several servers using a network device. A load balancer, intercepts network based traffic destined for […]
A parallel compute is a collection of processing elements that communicate and cooperate to solve large problems efficiently. Parallel computers vary in two fundamental architecture facets, (i) Single Instruction Multiple […]
The Internet is a network of networks in which users at any one computer can get access to the information from any other computer. It was conceived by the Advanced […]
MANETs are useful in many application environments and do not need any infrastructure support. Collaborative computing and communications in smaller areas (buildings, organizations, conferences, etc.) can be set up using […]
Developing support for routing is one of the most significant challenges in ad hoc networks and is critical for the basic network operations. Certain unique combinations of characteristics make routing […]
Agents (adaptive or intelligent agents and multi-agent systems) constitute one of the most prominent and attractive technologies in Computer Science at the beginning of this new century. Agent and multi-agent […]
One of the most successful applications of artificial intelligence reasoning techniques using facts and rules has been in building expert systems that embody knowledge about a specialized field of human […]
A basic cornerstone of security is to verify the integrity of fundamental data stored in the system. This integrity checking is being achieved using integrity tools such Tripwire, which depend […]