Search Result
Save to File
Your search for
43439
returns
522
document(s)
Lingkungan pervasive computing
Author: Sunario Megawan; | Call Number: TR-CSUI-007-2011 | Type: Technical Report
Find Similar
|
Add To Favorites
|
Detail in New Window
Implementasi aplikasi contex-aware dalam lingkungan pervasive computing menggunakan UPnP network/ Anisa Fitriyah Hadi
Author: Anisa Fitriyah Hadi; | Call Number: SK-0549 (Softcopy SK-28) | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Fundamentals of mobile and pervasive computing
Call Number: 621.384 5 Fun | Type: Buku
Find Similar
|
Add To Favorites
|
Detail in New Window
Trust-based security in pervasive computing environments, page 154
Author: Lalana Kagal | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Jini home networking: a step toward pervasive computing, page 34
Author: Rahul Gupta | Type: Indeks Artikel Jurnal
Find Similar
|
Add To Favorites
|
Detail in New Window
Model pengembangan pervasive computing berdasarkan open source, Hal. 96-105
Author: Tranggono Iman Suwongso Turner; | Call Number: SEM-258 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
Pengembangan pervasive computing berbasis wireless sensor network dengan standar IEEE 802.15.4/Zighee
Author: Budiarto; | Call Number: SK-1076 (Softcopy SK-557) Source Code SK-409 | Type: Skripsi
Find Similar
|
Add To Favorites
|
Detail in New Window
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments (276-286)
Author: Filip Perich Anupam Joshi Yelena Yesha Timothy Finin; | Call Number: SEM-381 | Type: Indeks Artikel prosiding/Sem
Find Similar
|
Add To Favorites
|
Detail in New Window
A mathematical approach towards trust based security in pervasive computing environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 702-711
Author: Naima Iltaf; Mukhtar Hussain; Farrukh Kamran; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
A comparative analysis of HC-128 and rabbit encryption schemes for pervasive computing in WSN environment, (LNCS-Lecture Notes in Computer Science 5576) Hal 682-691
Author: Firdous Kausar; Ayesha Naureen; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar
|
Add To Favorites
|
Detail in New Window
Prev 1
2
3
4
5
6
7
8
9
10
Next