Search Result Save to File Save as CSV
Your search for 14204 returns 4416 document(s)
Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making, Page 465-488
Author: Idris Adjerid, Eyal Peer, and Alessandro Acquisti | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan prototype sistem enviar mobile dalam virtualisasi informasi wireless sensor network dengan representasi augmented reality berbasis lokasi
Author: Hafizh Hasrindra; | Call Number: SK-1200 (Softcopy SK-682) Source code SK-476 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan aplikasi indoor environment monitoring berbasis wireless sensor network dan SMS gateway
Author: I Gusti Ngurah Agung Riyandi; | Call Number: SK-0914 (Softcopy SK-395) Source code SK-335 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan prototype piranti lunak pada sistem wireless sensor network untuk aplikasi smart farm
Author: Glenn Mohammad Dwiyatcita; | Call Number: SK-0908 (Softcopy SK-388) Source code SK-333 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan prototipe perangkat lunak enviar dalam virtualisasi informasi wireless sensor network pada aplikasi demeter dengan representasi augmented reality
Author: Enggar Baskoro; | Call Number: SK-1064 (Softcopy SK-545) Source Code SK-397 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Big Sensor-Generated Data Streaming Using Kafta and Impala for Data Storage in wireless Sensor Network for CO2 Monitoring (97-102)
Author: Rindra Wiska Novian Habibie Ari Wibisono Widijanto Satyo Nugroho Petrus Mursanto; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Comparative Study of Lightweight SEcure Multiroute Communication System in Low Cost Wireless Network for CO2 Monitoring (145-150)
Author: Novian Habibie Rindra Wiska Aditya Murda Nugraha Ari Wibisono Petrus Mursanto Widijanto Satyo Nugroho SEtiadi Yazid; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Predictions for the core of the network, page 60
Author: Ross Callon | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Users' interaction with world wide web resources: an exploratory study using a holisyic approach, page 229
Author: Peiling Wang | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   5 6 7 8 9 10 11 12 13 14  Next