default search action
International Journal of Mobile Computing and Multimedia Communications, Volume 5
Volume 5, Number 1, 2013
- Nazrulazhar Bahama, Anton Satria Prabuwono, Teddy Mantoro:
Reconnaissance Attack on IPv6 to IPv4 Tunneling. 1-9 - Widodo Budiharto, Michael Yoseph Ricky, Ro'fah Nur Rachmawati:
The Novel Method of Adaptive Multiplayer Games for Mobile Application using Neural Networks. 10-24 - Andik Setyono, Md. Jahangir Alam, Chikkannan Eswaran:
Exploration and Development of the JPEG Compression for Mobile Communications System. 25-46 - Allam Mousa, Mahmoud Najjar, Bashar Alsayeh:
Path Loss Model Tuning at GSM 900 for a Single Cell Base Station. 47-56 - Sardjoeni Moedjiono, Aries Kusdaryono:
Power Layer Energy Efficient Routing Protocol in Wireless Sensor Network (PLRP). 57-68 - Media Anugerah Ayu, Mohamed Ahmed Elgharabawy:
Effects of Web Accessibility on Search Engines and Webometrics Ranking. 69-94
Volume 5, Number 2, 2013
- Mohamed Firdhous, Suhaidi Hassan, Osman Ghazali:
Statistically Enhanced Multi-Dimensional Trust Computing Mechanism for Cloud Computing. 1-17 - Puteri Azwa Ahmad, Massudi Mahmuddin, Mohd. Hasbullah Omar:
Node Placement Strategy in Wireless Sensor Network. 18-31 - Badiea Abdulkarem Mohammed, Tat Chee Wan:
Handoff and Route Optimization in Mobile Networks over IEEE 802.16e. 32-45 - Naseer Ali Husieen, Suhaidi Hassan, Osman Ghazali, Lelyzar Siregar:
The Robustness of RM-DSR Multipath Routing Protocol with Different Network Size in MANET. 46-57 - Vasuky Mohanan, Rahmat Budiarto:
Wireless Communication Technologies for Vehicular Nodes: A Survey. 58-77 - Abidah Hj Mat Taib, Wan Nor Ashiqin Wan Ali, Nurul Sharidah Shaari:
ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6. 78-100
Volume 5, Number 3, 2013
- Bogdan Groza, Pal-Stefan Murvay:
Secure Broadcast with One-Time Signatures in Controller Area Networks. 1-18 - Hendri Himawan Triharminto, Anton Satria Prabuwono, Teguh Bharata Adji, Noor Akhmad Setiawan:
Adaptive Dynamic Path Planning Algorithm for Interception of a Moving Target. 19-33 - Ricardo Neisse, Alexander Pretschner, Valentina Di Giacomo:
A Trustworthy Usage Control Enforcement Framework. 34-49 - Rainer Poisel, Marlies Rybnicek, Bernhard Schildendorfer, Simon Tjoa:
Classification and Recovery of Fragmented Multimedia Files using the File Carving Approach. 50-67 - Sanaa A. Alwidian, Ismail M. Ababneh, Muneer O. Bani Yassein:
Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks. 68-87 - Teddy Mantoro, Adamu I. Abubakar, Media A. Ayu:
3D Maps in Mobile Devices: Pathway Analysis for Interactive Navigation Aid. 88-106
Volume 5, Number 4, 2013
- Bhuvaneswari Mariappan, Shanmugalakshmi Ramachandran:
Estimation of Always Best Connected Network in Heterogeneous Environment Based on Prediction of Recent Call History and Call Blocking Probability. 1-14 - Sanjay Kumar Biswash, Chiranjeev Kumar:
A Novel Prediction-Based Location Management Technique for Mobile Networks. 15-34 - Mohammad Masdari, Javad Pashaei Barbin, Moazam Bidaki:
Towards Scalable Certificate Status Validation in Mobile Ad Hoc Networks. 35-48 - Joel Penhoat, Karine Guillouard, Nathalie Omnès, J. Zhang, Tayeb Lemlouma, Mikaël Salaün:
Proposal of a Hierarchical and Distributed Method for Selecting a Radio Network and a Transmission Mode. 49-81 - A. F. M. Saifuddin Saif, Anton Satria Prabuwono, Zainal Rasyid Mahayuddin, Teddy Mantoro:
Vision-Based Human Face Recognition Using Extended Principal Component Analysis. 82-94
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.