Search Result
Save to File
Your search for
14204
returns
4416
document(s)
Beyond the Privacy Paradox: Objective Versus Relative Risk in Privacy Decision Making, Page 465-488
Author: Idris Adjerid, Eyal Peer, and Alessandro Acquisti | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan prototype sistem enviar mobile dalam virtualisasi informasi wireless sensor network dengan representasi augmented reality berbasis lokasi
Author: Hafizh Hasrindra; | Call Number: SK-1200 (Softcopy SK-682) Source code SK-476 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan aplikasi indoor environment monitoring berbasis wireless sensor network dan SMS gateway
Author: I Gusti Ngurah Agung Riyandi; | Call Number: SK-0914 (Softcopy SK-395) Source code SK-335 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan prototype piranti lunak pada sistem wireless sensor network untuk aplikasi smart farm
Author: Glenn Mohammad Dwiyatcita; | Call Number: SK-0908 (Softcopy SK-388) Source code SK-333 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan prototipe perangkat lunak enviar dalam virtualisasi informasi wireless sensor network pada aplikasi demeter dengan representasi augmented reality
Author: Enggar Baskoro; | Call Number: SK-1064 (Softcopy SK-545) Source Code SK-397 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Big Sensor-Generated Data Streaming Using Kafta and Impala for Data Storage in wireless Sensor Network for CO2 Monitoring (97-102)
Author: Rindra Wiska Novian Habibie Ari Wibisono Widijanto Satyo Nugroho Petrus Mursanto; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Comparative Study of Lightweight SEcure Multiroute Communication System in Low Cost Wireless Network for CO2 Monitoring (145-150)
Author: Novian Habibie Rindra Wiska Aditya Murda Nugraha Ari Wibisono Petrus Mursanto Widijanto Satyo Nugroho SEtiadi Yazid; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Predictions for the core of the network, page 60
Author: Ross Callon | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Users' interaction with world wide web resources: an exploratory study using a holisyic approach, page 229
Author: Peiling Wang | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev
5
6
7
8
9
10
11
12
13
14
Next