Computer Applications

Results: 4069



#Item
681Image search / Web 2.0 / Artificial intelligence applications / Image processing / Image retrieval / Content-based image retrieval / Visual descriptors / Geotagging / Tag / Computer vision / Artificial intelligence / Vision

Automatic Geo-referencing of Flickr Videos Pascal Kelm, Sebastian Schmiedeke, Kai Clüver, Thomas Sikora Technische Universität, Berlin, Germany E-mail: {kelm, schmiedeke, cluever, sikora}@nue.tu-berlin.de Abstract: We

Add to Reading List

Source URL: elvera.nue.tu-berlin.de

Language: English - Date: 2011-09-15 03:29:31
682Digital signal processing / Computer graphics / Image processing / Computer file formats / JPEG / Discrete cosine transform / Compression artifact / Quantization / Steganalysis / Graphics file formats / Data compression / Computing

1 Detection of double-compression in JPEG images for applications in steganography Tom´asˇ Pevn´y and Jessica Fridrich

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2007-12-17 16:10:34
683Networking hardware / IEEE 802.11 / Telecommunications engineering / Fortinet / Wireless security / Wi-Fi / MIMO / Power over Ethernet / Wireless LAN / Computer network security / Technology / Computing

FortiAPTM-221C and 320C 802.11ac Wireless Access Points The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromis

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:08:58
684Cyberwarfare / OWASP / OWASP Mantra Security Framework / Penetration test / Computer network security / Computer security / Security

Lessons Learned Building Secure ASP.NET Applications Tom Fischer AppSec USA 2011

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:31:22
685DirectX / Computing / Microsoft Windows / OS/2 / Windows XP / Computer hardware / Universal Serial Bus / Software

The Most Comprehensive Software Available for Behavioral Research What is E-Prime®? What’s new for 2.0? E-Prime is a suite of applications used to design, generate,

Add to Reading List

Source URL: www.pstnet.com

Language: English - Date: 2012-09-17 11:50:19
686Distributed data storage / Local area networks / Cloud applications / Data synchronization / Gluster / Distributed file system / Computer cluster / Dropbox / SAS / Computing / Software / Network file systems

SCALE OUT ARCHITECTURE FOR SECURE ENTERPRISE FILE SHARING SCALE-OUT ARCHITECTURE FOR SECURE ENTERPRISE FILE SHARING Challenge With proliferation of mobile devices like smartphone and tablets, Bring Your Own Device

Add to Reading List

Source URL: pydio.com

Language: English - Date: 2015-01-27 14:09:44
687Human–computer interaction / Information Age / World Wide Web / Web browser / Opera / Web 2.0 / Web application / Web page / Internet / Software / Portable software / Cloud applications

Peering Editor: Charles Petrie • Will the Web Vanish? Charles Petrie • University of St. Gallen, Switzerland

Add to Reading List

Source URL: www-cdr.stanford.edu

Language: English - Date: 2015-04-08 11:00:27
688Quantum mechanics / Computational complexity theory / Computer algebra / Quantum information / Quantum information theory / Quantum computer / Quantum algorithm / Symbolic computation / Schrödinger equation / Applied mathematics / Theoretical computer science / Physics

Computer algebra in quantum computing and quantum information theory Special Session at the 21st International Conference on Applications of Computer AlgebraACA2015), July 20-23, 2015, Kalamata, Greece.

Add to Reading List

Source URL: www.iitis.pl

Language: English - Date: 2014-11-26 05:29:41
689Networking hardware / IEEE 802.11 / Telecommunications engineering / Fortinet / Wireless security / Wi-Fi / MIMO / Power over Ethernet / Wireless LAN / Computer network security / Technology / Computing

FortiAPTM-221C and 320C 802.11ac Wireless Access Points The Need for a Fortified Wireless LAN Enterprises are looking to increase productivity through uninterrupted access to applications and resources, without compromis

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:13
690Credit cards / Economics / Data privacy / Money / Computer law / Mobile payment / Payment Card Industry Data Security Standard / Payment card industry / Chase Paymentech / Payment systems / Electronic commerce / Business

Revenue - Credit Cards Mobile Payment Applications FIACCT DRAFT-WORKING DOCUMENT Effective: DRAFT COPY Revised: 12-Mar-15 Purpose

Add to Reading List

Source URL: finance.utah.gov

Language: English - Date: 2015-03-31 14:45:01
UPDATE