Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
3
0
2
Order By: Relevance
“…Studies Online detection [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [9], [39], [40], [41], [42], [43], [8], [44], [45], [46], [47], [48], [49] Offline detection [50], [51], [52], [53], [54], [7], [55], [56] Safety [57], [13], [58], [59], [60], [61],…”
Section: Categorymentioning
confidence: 99%
“…Studies Online detection [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [9], [39], [40], [41], [42], [43], [8], [44], [45], [46], [47], [48], [49] Offline detection [50], [51], [52], [53], [54], [7], [55], [56] Safety [57], [13], [58], [59], [60], [61],…”
Section: Categorymentioning
confidence: 99%
“…Untuk dapat mengakses rangkaian gambar dari sebuah kamera pengawas (TCP/IP enabled Camera) user memiliki beberapa opsi yang sudah tersedia saat ini di pasar, di antaranya: (1) melalui browser ataupun streaming client pada PC/Laptop (HTTP dan RTP); (2) melalui built-in media player pada handphone/ PDA (RTP) (Ibrahim, 2009). …”
Section: Penelitian Terdahuluunclassified
“…Dalam aplikasi ini terdapat beberapa parameter yang ditentukan menurut suatu pertimbangan dan asumsi (Gonzalez, 2005;Ibrahim, 2009). …”
Section: Parameter Hasilunclassified
“…The SLWE has found numerous successful applications in the literature. Applications of the SLWE include adaptive classifiers for spam filtering [36], adaptive file encoding with nonstationary distributions [26], intrusion detection in computer networks [30], tracking shifts of languages in online discussions [29], learning user preferences under concept-shift [22,33], fault-tolerant routing in Ad-hoc networks [21], digital content forensics for detecting illicit images [8], detection and tracking of malicious nodes in both Ad-hoc networks [24], vehicular mobile WiMAX networks [18], and optimizing firewall matching time via dynamic rule ordering [19]-to mention a few.…”
Section: Introductionmentioning
confidence: 99%