default search action
I Wayan Mustika
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Bimo Sunarfri Hantono, Syukron Abu Ishaq Alfarozi, Azkario Rizky Pratama, Ahmad Ataka Awwalur Rizqi, I Wayan Mustika, Mardhani Riasetiawan, Anna Maria Sri Asih:
Enhancing Counterfeit Detection with Multi-Features on Secure 2D Grayscale Codes. Comput. 12(9): 183 (2023) - [j8]Sampurna Dadi Riskiono, Selo Sulistyo, I Wayan Mustika:
Fuzzy Tree Schematic for Spectrum Handoff Reduction in Cognitive Radio Networks. J. Commun. 18(7): 453-461 (2023) - 2022
- [c8]Sandhya Hizrian Sabila, I Wayan Mustika, Selo Sulistyo:
Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol). CCWC 2022: 870-875 - [c7]Anisa Rahmanti, Fajar Setiawan, I Wayan Mustika, Selo:
Case Study of Moth Flame Optimization Implementation for Network Challenges. ICOIN 2022: 363-367 - 2021
- [j7]Sahirul Alam, Selo Sulistyo, I Wayan Mustika, Ronald Adrian:
Handover Decision for V2V Communication in VANET Based on Moving Average Slope of RSS. J. Commun. 16(7): 284-293 (2021) - 2020
- [j6]Sahirul Alam, Selo Sulistyo, I Wayan Mustika, Ronald Adrian:
Fuzzy Adaptive Hysteresis of RSS for Handover Decision in V2V VANET. Int. J. Commun. Networks Inf. Secur. 12(3) (2020)
2010 – 2019
- 2019
- [j5]I Wayan Mustika, Nifty Fath, Selo Sulistyo, Koji Yamamoto, Hidekazu Murata:
A Novel Radio Resource Optimization Scheme in Closed Access Femtocell Networks Based on Bat Algorithm. IEICE Trans. Commun. 102-B(4): 660-669 (2019) - [j4]I Wayan Mustika, Sahirul Alam, Koji Yamamoto, Hidekazu Murata:
Fuzzy Enhanced Discrete Bacterial Foraging Optimization for Cell and Resource Blocks Selection in Femtocell Networks. Wirel. Pers. Commun. 108(1): 511-526 (2019) - 2017
- [j3]Anggun Fitrian Isnawati, Risanuri Hidayat, Selo Sulistyo, I Wayan Mustika:
A Novel Utility Function of Power Control Game in Multi-Channel Cognitive Femtocell Network. Int. J. Commun. Networks Inf. Secur. 9(3) (2017) - [j2]Emansa Hasri Putra, Risanuri Hidayat, Widyawan, I Wayan Mustika:
A Routing Optimization Based on Cross-Layer Design for Wireless Multimedia Sensor Networks (WMSNs). J. Comput. Sci. 13(10): 572-580 (2017) - [c6]Nilar Thein, Hanung Adi Nugroho, Teguh Bharata Adji, I Wayan Mustika:
Comparative Performance Study on Ordinary and Chaos Image Encryption Schemes. ACOMP 2017: 122-126 - 2016
- [c5]Nifty Fath, I Wayan Mustika, Selo Sulistyo, Koji Yamamoto, Hidekazu Murata:
Optimal resource allocation scheme in femtocell networks based on bat algorithm. APCC 2016: 281-285 - 2013
- [c4]I Wayan Mustika, Agus Nurcahyo, Widyawan, Koji Yamamoto:
A game-theoretic framework for joint base station and resource selection in LTE heterogeneous networks. APCC 2013: 447-452 - 2011
- [b1]I Wayan Mustika:
Distributed radio resource management for self-organizing wireless networks. Kyoto University, Japan, 2011 - [c3]I Wayan Mustika, Koji Yamamoto, Hidekazu Murata, Susumu Yoshida:
Potential game approach for self-organization scheme in open access heterogeneous networks. CrownCom 2011: 216-220 - [c2]I Wayan Mustika, Koji Yamamoto, Hidekazu Murata, Susumu Yoshida:
Potential Game Approach for Self-Organized Interference Management in Closed Access Femtocell Networks. VTC Spring 2011: 1-5 - 2010
- [j1]I Wayan Mustika, Koji Yamamoto, Hidekazu Murata, Susumu Yoshida:
Potential Game Approach for Spectrum Sharing in Distributed Cognitive Radio Networks. IEICE Trans. Commun. 93-B(12): 3284-3292 (2010) - [c1]I Wayan Mustika, Koji Yamamoto, Hidekazu Murata, Susumu Yoshida:
Spectrum Sharing with Interference Management for Distributed Cognitive Radio Networks: A Potential Game Approach. VTC Spring 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint