Search Result Save to File Save as CSV
Your search for 43439 returns 500 document(s)
Lingkungan pervasive computing
Author: Sunario Megawan; | Call Number: TR-CSUI-007-2011 | Type: Technical Report
Find Similar |  Add To Favorites |  Detail in New Window 
Implementasi aplikasi contex-aware dalam lingkungan pervasive computing menggunakan UPnP network/ Anisa Fitriyah Hadi
Author: Anisa Fitriyah Hadi; | Call Number: SK-0549 (Softcopy SK-28) | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Fundamentals of mobile and pervasive computing
Call Number: 621.384 5 Fun | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Trust-based security in pervasive computing environments, page 154
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Jini home networking: a step toward pervasive computing, page 34
Author: Rahul Gupta | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Model pengembangan pervasive computing berdasarkan open source, Hal. 96-105
Author: Tranggono Iman Suwongso Turner; | Call Number: SEM-258 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan pervasive computing berbasis wireless sensor network dengan standar IEEE 802.15.4/Zighee
Author: Budiarto; | Call Number: SK-1076 (Softcopy SK-557) Source Code SK-409 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments (276-286)
Author: Filip Perich Anupam Joshi Yelena Yesha Timothy Finin; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next