


default search action
International Journal of Mobile Computing and Multimedia Communications, Volume 5
Volume 5, Number 1, 2013
- Nazrulazhar Bahama

, Anton Satria Prabuwono
, Teddy Mantoro
:
Reconnaissance Attack on IPv6 to IPv4 Tunneling. 1-9 - Widodo Budiharto

, Michael Yoseph Ricky
, Ro'fah Nur Rachmawati
:
The Novel Method of Adaptive Multiplayer Games for Mobile Application using Neural Networks. 10-24 - Andik Setyono

, Md. Jahangir Alam, Chikkannan Eswaran:
Exploration and Development of the JPEG Compression for Mobile Communications System. 25-46 - Allam Mousa

, Mahmoud Najjar, Bashar Alsayeh:
Path Loss Model Tuning at GSM 900 for a Single Cell Base Station. 47-56 - Sardjoeni Moedjiono, Aries Kusdaryono:

Power Layer Energy Efficient Routing Protocol in Wireless Sensor Network (PLRP). 57-68 - Media Anugerah Ayu

, Mohamed Ahmed Elgharabawy:
Effects of Web Accessibility on Search Engines and Webometrics Ranking. 69-94
Volume 5, Number 2, 2013
- Mohamed Firdhous

, Suhaidi Hassan
, Osman Ghazali:
Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing. 1-17 - Puteri Azwa Ahmad, Massudi Mahmuddin

, Mohd. Hasbullah Omar
:
Node Placement Strategy in Wireless Sensor Network. 18-31 - Badiea Abdulkarem Mohammed

, Tat Chee Wan
:
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e. 32-45 - Naseer Ali Husieen, Suhaidi Hassan

, Osman Ghazali, Lelyzar Siregar:
The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET. 46-57 - Vasuky Mohanan, Rahmat Budiarto

:
Wireless Communication Technologies for Vehicular Nodes: A Survey. 58-77 - Abidah Hj Mat Taib, Wan Nor Ashiqin Wan Ali

, Nurul Sharidah Shaari:
ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6. 78-100
Volume 5, Number 3, 2013
- Bogdan Groza

, Pal-Stefan Murvay
:
Secure Broadcast with One-Time Signatures in Controller Area Networks. 1-18 - Hendri Himawan Triharminto

, Anton Satria Prabuwono
, Teguh Bharata Adji, Noor Akhmad Setiawan
:
Adaptive Dynamic Path Planning Algorithm for Interception of a Moving Target. 19-33 - Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo:

A Trustworthy Usage Control Enforcement Framework. 34-49 - Rainer Poisel, Marlies Rybnicek, Bernhard Schildendorfer, Simon Tjoa

:
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. 50-67 - Sanaa A. Alwidian, Ismail M. Ababneh, Muneer O. Bani Yassein

:
Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks. 68-87 - Teddy Mantoro

, Adamu I. Abubakar, Media A. Ayu
:
3D Maps in Mobile Devices: Pathway Analysis for Interactive Navigation Aid. 88-106
Volume 5, Number 4, 2013
- Bhuvaneswari Mariappan

, Shanmugalakshmi Ramachandran:
Estimation of Always Best Connected Network in Heterogeneous Environment Based on Prediction of Recent Call History and Call Blocking Probability. 1-14 - Sanjay Kumar Biswash

, Chiranjeev Kumar
:
A Novel Prediction-Based Location Management Technique for Mobile Networks. 15-34 - Mohammad Masdari, Javad Pashaei Barbin

, Moazam Bidaki
:
Towards Scalable Certificate Status Validation in Mobile Ad Hoc Networks. 35-48 - Joel Penhoat, Karine Guillouard, Nathalie Omnès, J. Zhang, Tayeb Lemlouma, Mikaël Salaün:

Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode. 49-81 - A. F. M. Saifuddin Saif

, Anton Satria Prabuwono
, Zainal Rasyid Mahayuddin
, Teddy Mantoro
:
Vision-Based Human Face Recognition Using Extended Principal Component Analysis. 82-94

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














