Follow
Imam Adhita Virya
Title
Cited by
Cited by
Year
Fog computing: Will it be the future of cloud computing?
M Firdhous, O Ghazali, S Hassan
The Third International Conference on Informatics & Applications (ICIA2014), 2014
1822014
Survey on caching approaches in information centric networking
I Abdullahi, S Arif, S Hassan
Journal of Network and Computer Applications 56, 48-59, 2015
1512015
Trust management in cloud computing: a critical review
M Firdhous, O Ghazali, S Hassan
arXiv preprint arXiv:1211.3979, 2012
1142012
Comic image decomposition for reading comics on cellular phones
M Yamada, R Budiarto, M Endo, S Miyazaki
IEICE transactions on information and systems 87 (6), 1370-1376, 2004
692004
Membangun koneksi matematis siswa dalam pemecahan masalah verbal
N Tasni, E Susanti
Beta: Jurnal Tadris Matematika 10 (1), 103-116, 2017
612017
A comprehensive survey on scheduler for VoIP over WLAN
K Nisar, A Amphawan, S Hassan, NI Sarkar
Journal of Network and Computer Applications 36 (2), 933-948, 2013
472013
QoS multicast routing based on bandwidth estimation in mobile ad hoc networks
M Saghir, TC Wan, R Budiarto
Proceedings of the International Conference on Computer and Communication …, 2006
402006
Hubungan antara kontrol diri dan konformitas dengan prokrastinasi akademik pada mahasiswa program studi psikologi Unesa
E Susanti, D Nurwidawati
Jurnal Character 2 (3), 1-7, 2014
382014
Load balancing qos multicast routing protocol in mobile ad hoc networks
M Saghir, TC Wan, R Budiarto
Technologies for Advanced Heterogeneous Networks: First Asian Internet …, 2005
352005
A comparison of IP datagrams transmission using MPE and ULE over Mpeg-2/DVB networks
TC Hong, WT Chee, R Budiarto
2005 5th International Conference on Information Communications & Signal …, 2005
342005
A trust computing mechanism for cloud computing
M Firdhous, O Ghazali, S Hassan
Proceedings of ITU Kaleidoscope 2011: The Fully Networked Human?-Innovations …, 2011
332011
A routing layer-based hierarchical service advertisement and discovery for MANETs
SAH Seno, R Budiarto, TC Wan
Ad Hoc Networks 9 (3), 355-367, 2011
312011
Security mechanism for IPv6 stateless address autoconfiguration
S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ...
2015 International Conference on Automation, Cognitive Science, Optics …, 2015
272015
Securing duplicate address detection on IPv6 using distributed trust mechanism
S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ...
Int J Simulation—Systems, Sci Technol 17 (26), 2016
222016
Honeypots: why we need a dynamics honeypots?
R Budiarto, A Samsudin, CW Heong, S Noori
Proceedings. 2004 International Conference on Information and Communication …, 2004
222004
Simulation-based performance comparison of TCP-friendly congestion control protocols
S Hassan, M Kara
Proceedings of the 16th Annual UK Performance Engineering Workshop …, 2000
222000
Feasibility study of using IEEE 802.22 wireless regional area network (WRAN) in Malaysia
MH Omar, S Hassan, AHM Shabli
2010 Second International Conference on Network Applications, Protocols and …, 2010
212010
Improvement of address resolution security in IPv6 local network using trust-ND
S Praptodiyono, IH Hasbullah, M Anbar, RK Murugesan, A Osman
TELKOMNIKA Indonesian Journal of Electrical Engineering 13 (1), 195-202, 2015
162015
Meningkatkan penalaran siswa melalui koneksi matematika
E Susanti
Seminar Nasional Matematika Dan Pendidikan Matematika, 2012
162012
Formal modeling and analysis of hybrid systems in rewriting logic using higher-order numerical methods and discrete-event detection
M Fadlisyah, PC Ölveczky, E Abrahám
2011 CSI International Symposium on Computer Science and Software …, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20