CA Technologies

Results: 3271



#Item
1Surveillance / Biometrics / Security engineering / Computing / National security / Identification / Cybercrime / Keystroke dynamics / Soft biometrics / Typing / Computer security / Statistical classification

Estimating Gender and Age of Web Page Visitors from the Way They Use Their Mouse Krátky Peter, Chudá Daniela Faculty of Informatics and Information Technologies Slovak University of Technology Ilkoviˇcova 5, Br

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 00:46:41
2

Proceedings on Privacy Enhancing Technologies ; ):1–20 Cecylia Bocovich and Ian Goldberg Secure asymmetry and deployability for decoy routing systems

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2018-03-08 15:08:18
    3

    PREPRINT: "H. Kashif, J. J. Thomas, H. Patel, and S. Fischmeister, "Static slack-based instrumentation of programs," in 20th IEEE Conference on Emerging Technologies \\& Factory Automation, ETFA, 2015, pp. 1-8." Static S

    Add to Reading List

    Source URL: caesr.uwaterloo.ca

    Language: English - Date: 2017-11-20 15:52:59
      4

      Hard of Hearing Accessibility If you are deaf or hard of hearing, you can communicate in a variety of ways with iOS features like FaceTime video calling and unlimited texting. And assistive technologies such as closed ca

      Add to Reading List

      Source URL: www.atel.ri.gov

      Language: English - Date: 2017-11-09 15:52:09
        5

        Enhancing Teaching Presence and Reducing Distance Using Voice Technologies Karen Belfer Learning and Teaching Centre, British Columbia Institute of Technology (BCIT), Canada Tannis Morgan

        Add to Reading List

        Source URL: homonym.ca

        Language: English - Date: 2016-10-04 16:11:46
          6

          FRACTALS FOR ELECTRONIC APPLICATIONS Maciej J. Ogorzałek Department of Information Technologies Faculty of Physics, Astronomy and Applied Computer Science Jagiellonian University,

          Add to Reading List

          Source URL: iwcsn2006.irmacs.sfu.ca

          Language: English - Date: 2006-08-18 03:39:42
            7

            Proceedings on Privacy Enhancing Technologies ; ):184–201 Raphael R. Toledo, George Danezis, and Ian Goldberg Lower-Cost -Private Information Retrieval Abstract: Private Information Retrieval (PIR), despite be

            Add to Reading List

            Source URL: www.cypherpunks.ca

            Language: English - Date: 2016-06-28 09:30:18
              8

              Water Treatment: Where have we been and where are we going? R. Rhodes Trussell Trussell Technologies, Inc. Pasadena, CA

              Add to Reading List

              Source URL: www.trusselltech.com

              Language: English - Date: 2017-10-20 06:00:28
                9

                Proceedings on Privacy Enhancing Technologies ; ):83–101 Tariq Elahi*, John A. Doucette, Hadi Hosseini, Steven J. Murdoch, and Ian Goldberg A Framework for the Game-theoretic Analysis of Censorship Resistance

                Add to Reading List

                Source URL: www.cypherpunks.ca

                Language: English - Date: 2016-06-28 09:37:07
                  10

                  New Approaches to Oil Spill Technologies and Response Strategies in Remote Contexts Adams, Ives, McMahon, Russell (RESTCo) The goals: •Rapid response through

                  Add to Reading List

                  Source URL: www.restco.ca

                  Language: English - Date: 2017-11-06 16:20:59
                    UPDATE