default search action
Iping Supriana
Person information
- affiliation: Bandung Institute of Technology, Indonesia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j2]Aradea, Iping Supriana, Kridanto Surendro:
ARAS: adaptation requirements for adaptive systems. Autom. Softw. Eng. 30(1): 2 (2023)
2010 – 2019
- 2016
- [c19]Aradea, Iping Supriana, Kridanto Surendro, Irfan Darmawan:
Integration of Self-adaptation Approach on Requirements Modeling. SCDM 2016: 233-243 - [c18]Aradea, Iping Supriana, Kridanto Surendro, Irfan Darmawan:
Variety of Approaches in Self-adaptation Requirements: A Case Study. SCDM 2016: 253-262 - [c17]Wiwin Suwarningsih, Ayu Purwarianti, Iping Supriana:
Dependency Scheme for Revise and Reasoning Solution. SCDM 2016: 294-303 - 2014
- [c16]Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir:
Animation simulation of shooting aircraft events by combination of metamorphic animation on multi-object and on object of IFS fractal model: Based on cloning and collision detection techniques. IC3INA 2014: 154-159 - [c15]Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir:
Hybrid rotational and revolving simulation of propeller in aircraft with two propellers by fractal animation model: Based on shifting centroid method in double mode from a fixed point. IC3INA 2014: 166-171 - 2013
- [c14]Ayi Purbasari, Supriana S. Iping, Oerip S. Santoso, Rila Mandala:
Designing Artificial Immune System Based on Clonal Selection: Using Agent-Based Modeling Approach. Asia International Conference on Modelling and Simulation 2013: 11-15 - [c13]Tedjo Darmanto, Iping Supriana Suwardi, Rinaldi Munir:
Weaving effects in metamorphic animation of treelike fractal based on a family of multi-transitional iterated function system code. IC3INA 2013: 65-70 - 2011
- [c12]Peb Ruswono Aryan, Iping Supriana, Ayu Purwarianti:
Development of indonesian handwritten text database for offline character recognition. ICEEI 2011: 1-4 - [c11]W. Tjokorda Agung Budi, Iping Supriana Suwardi:
Fire alarm system based-on video processing. ICEEI 2011: 1-7 - [c10]Gerard Edwin, Iping Supriana:
Hand detection for virtual touchpad. ICEEI 2011: 1-5 - [c9]Aris Feryanto, Iping Supriana:
Location recognition using detected objects in an image. ICEEI 2011: 1-4 - [c8]Sanrio Hernanto, Iping Supriana Suwardi:
Webcam virtual keyboard. ICEEI 2011: 1-5 - [c7]Tien Fabrianti Kusumasari, Iping Supriana, Kridanto Surendro, Husni Sastramihardja:
Collaboration model of software development. ICEEI 2011: 1-6 - [c6]W. P. Santika, M. Ghifary, Adi Indrayanto, Iping Supriana:
Building an overlay for wireless mesh network. ICEEI 2011: 1-5 - [c5]David Soendoro, Iping Supriana:
Traffic sign recognition with Color-based Method, shape-arc estimation and SVM. ICEEI 2011: 1-6 - [c4]Abraham Ranardo Sumarsono, Iping Supriana Suwardi:
Facial expression control of 3-dimensional face model using facial feature extraction. ICEEI 2011: 1-5 - [c3]Iping Supriana, Peb Ruswono Aryan:
Direct skeleton extraction using river-lake algorithm. ICEEI 2011: 1-3 - [c2]Ferdian Thung, Iping Supriana Suwardi:
Blood parasite identification using feature based recognition. ICEEI 2011: 1-4
2000 – 2009
- 2009
- [j1]Yusuf Kurniawan, Adang Suwandi A., M. Sukrisno Mardiyanto, Iping Supriana, Sarwono Sutikno:
The New Block Cipher: BC2. Int. J. Netw. Secur. 8(1): 16-24 (2009) - 2004
- [c1]Husni Sastramihardja, M. Sukrisno Mardiyanto, Iping Supriana, Iman Sudirman, Stephan Maathuis, Arjen Wassenaar:
Growing Information System Model: How to Integrate Information System in Emergent Organization. iiWAS 2004
1980 – 1989
- 1985
- [b1]Iping Supriana Suwardi:
Mécanisme prédictif d'évaluation des caractéristiques géométriques des circuits VLSI. (Foreseeing evaluation mechanism of VLSI circuit geometrical characteristics). Grenoble Institute of Technology, France, 1985
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint