Search Result Save to File Save as CSV
Your search for 47948 returns 1967 document(s)
Pengembangan prototipe perangkat lunak enviar dalam virtualisasi informasi wireless sensor network pada aplikasi demeter dengan representasi augmented reality
Author: Enggar Baskoro; | Call Number: SK-1064 (Softcopy SK-545) Source Code SK-397 | Type: Skripsi
Find Similar |  Add To Favorites |  Detail in New Window 
Big Sensor-Generated Data Streaming Using Kafta and Impala for Data Storage in wireless Sensor Network for CO2 Monitoring (97-102)
Author: Rindra Wiska Novian Habibie Ari Wibisono Widijanto Satyo Nugroho Petrus Mursanto; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Comparative Study of Lightweight SEcure Multiroute Communication System in Low Cost Wireless Network for CO2 Monitoring (145-150)
Author: Novian Habibie Rindra Wiska Aditya Murda Nugraha Ari Wibisono Petrus Mursanto Widijanto Satyo Nugroho SEtiadi Yazid; | Call Number: SEM-340 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Security Challenges in Wireless Mesh Network Deployment and User Authentication (EAP) Method (V1-333 -- V1-337)
Author: Min Lin Shaoyong Chen; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Formal analysis of an authentication protocol for UMTS (Universal Mobile Telecommunications systems) Using AVISPA
Author: Ilham W. Kurnia; L. Yohanes Stefanus; Ari Saptawijaya | Call Number: Jurnal Ilmu Komputer dan Informasi (JIKI) Vol. 1 No. 2 Juni 2008 | Type: UI-ana Indek Artikel
Find Similar |  Add To Favorites |  Detail in New Window 
Energy consumption analysis of modified AODV routing protocol under random waypoint and reference point group mobility models, hal. 51-55
Author: Harris Simaremare, Abdusy Syarif, Abdelhafid Abouaissa, Riri Fitri Sari, Pascal Lorenz; | Call Number: SEM 304 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
PS-LTL for constraint-based security protocol analysis, (LNCS-Lecture Notes in Computer Science 3668) Hal 439-440
Author: Ricardo Corin; Ari Saptawijaya; Sandro Etalle; | Call Number: 005.133 Gab l | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Automated analysis of an audio control protocol, (LNCS-Lecture Notes in Computer Science 939) Hal 381-394
Author: Pei-Hsin Ho; Howard Wong-Toi; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of recovery in database system using a write-ahead log protocol (hal 175 - 184)
Author: Anant Jhingran, Pratap Khedkar; | Call Number: SEM - 359 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Improvement and Security analysis on Symmetric key authentication Protocol Needham-Schoeder (V1-357 -- V1-360)
Author: Junyao Ye Kening Liu Yinglian Wang; | Call Number: SEM-334 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   10 11 12 13 14 15 16 17 18 19  Next