Search

Your search keyword '"Kuspriyanto"' showing total 74 results

Search Constraints

Start Over You searched for: Author "Kuspriyanto" Remove constraint Author: "Kuspriyanto" Publisher ieee Remove constraint Publisher: ieee
74 results on '"Kuspriyanto"'

Search Results

1. Predicting Traffic Conditions Using Knowledge-Growing Bayes Classifier

2. Baggage Tracing at Airports using Near Field Communication

3. Candidate Recommendations for Voting System Using Modified AHP

4. Implementation of Simple Verifiability Metric to Measure the Degree of Verifiability of E-Voting Protocol

5. Semi-Ensemble Learning using Neural Network for Classifying Traffic Condition

6. MSOF-DT Strategy and Its Impact on Real-Time Systems Scheduling

9. Alignment Recovery for General Integer Scoring

10. The MSOF-DTW Method for Checking Timeseries Similarities

11. Metabolic Pathway Prediction using HMM

12. Processor Selection for OpenCL Kernels using KNN Algorithm

13. The Decision Accuracy of Acquaintance List from Different Risk-cost Analysis

14. Verifiability notion in e-Voting based on modified ThreeBallot system

15. Multistage process to decrease processing time in intrusion prevention system

16. A new approach to reducing execution time in real-time computation

17. HPC resources scheduling simulation using SimDAG

18. Statistical analysis on aggregate and flow based traffic features distribution

19. Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic

20. Negotiation strategies for meeting scheduling conflict management

21. Lane Keeping Assist System based on fuzzy logic

22. Transaction Level Modeling for Early Verification on Embedded System Design

23. State thresholding to accelerate reinforcement learning

24. Traffic anomaly detection in DDos flooding attack

25. Improved generalizations of the Karatsuba algorithm in GF(2n)

26. Big-data security management issues

27. Integration of Genetic and Tabu Search algorithm based load balancing for heterogenous grid computing

28. Extended word similarity based clustering on unsupervised PoS induction to improve English-Indonesian statistical machine translation

29. Methods for strengthening a Computer network security

30. Grid computing process improvement through computing resource scheduling using genetic algorithm and Tabu Search integration

31. IPv6 addressing technique based Dynamic Host Configuration Protocol in Mobile Ad-hoc Network

32. Decision system for robosoccer agent based on OODA Loop

33. The designing and implementation of a problem based learning in collaborative virtual environments using MMOG Technology

34. Joint action optimation for robotic soccer multiagent using reinforcement learning method

35. Some framework, Architecture and Approach for analysis a network vulnerability

36. Stock prices trends analysis using wavelet transform

37. Security metrics: A brief survey

38. Efficient tag-to-tag near field communication (NFC) protocol for secure mobile payment

39. Multi-Inductive Learning approach for Information Extraction

40. Co-citation & co-reference concepts to control focused crawler exploration

41. Influence of PoS on the accuracy translation from Indonesian to interlingua

42. Effeciency enhancement in embedded system design

44. VHDL design and simulation of MAM memory for LAPCAM parallel architecture for image processing

Catalog

Books, media, physical & digital resources