Computer surveillance

Results: 1478



#Item
21Computing / Artificial intelligence / Computational linguistics / Automatic identification and data capture / Surveillance / Humancomputer interaction / Idiap Research Institute / Martigny / Speech recognition / Speech synthesis / Biometrics / Computer vision

Technology Portfolio & Corporate Sponsorship Program January 2016 www.idiap.ch

Add to Reading List

Source URL: www.idiap.ch

Language: English - Date: 2016-01-19 04:36:28
22Biometrics / Surveillance / Face recognition / Automatic identification and data capture / Security / Artificial intelligence / Facial recognition system / Video surveillance / Three-dimensional face recognition / Recognition / Computer vision / Biometric points

Microsoft Word - DelBimbo.doc

Add to Reading List

Source URL: svg.dmi.unict.it

Language: English - Date: 2012-04-22 14:09:28
23Artificial intelligence / Computer vision / Vision / Image processing / Surveillance / Image segmentation / Medical imaging / Image analysis / Artificial neural network / Background subtraction / Facial recognition system / Image registration

Contents ix xiii xv SESSION 1

Add to Reading List

Source URL: www.icgip.org

Language: English - Date: 2015-03-25 03:38:01
24Security / Prevention / Safety / Crime prevention / Physical security / Surveillance / Cryptography / National security / Security guard / Computer security

Annex “B” TERMS OF REFERENCE SECURITY SERVICES

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2015-11-04 04:11:28
25Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
26Artificial intelligence / Computer vision / Humancomputer interaction / Face recognition / User interface techniques / Automatic identification and data capture / Surveillance / Gesture recognition / Virtual reality / EveR / Humanrobot interaction / Telepresence

Microsoft Word - Camera ready format.docx

Add to Reading List

Source URL: allrobotshelping.files.wordpress.com

Language: English - Date: 2016-06-16 09:47:40
27Prevention / Security / Safety / Crime prevention / National security / Cryptography / Data management / Computer security / Data security / Internet privacy / Data center / Surveillance

Security arrow.com We’re sitting at a unique moment in human history, not unlike the time of Gutenberg and the printing press. His seemingly

Add to Reading List

Source URL: www.fiveyearsout.com

Language: English - Date: 2016-08-12 12:28:45
28Security / Prevention / National security / Spyware / Cybercrime / Computer security / Cyberwarfare / Cyberspace / Citizen Lab / Cyber spying / GhostNet / Computer and network surveillance

Ronald J. Deibert, Black Code: Inside the Battle for Cyberspace

Add to Reading List

Source URL: blackcodebook.com

Language: English - Date: 2013-12-05 09:48:11
29Security / Prevention / Safety / Crime prevention / Security guards / Surveillance / Physical security / Public safety / United States Department of Homeland Security / Computer security / Job Corps

HOMELAND SECURITY C AREER PATHWAY C A REER TECHNIC A L T R A IN ING A RE A

Add to Reading List

Source URL: www.jobs.alaska.gov

Language: English - Date: 2016-04-08 18:27:20
30Artificial intelligence / Computer vision / Learning / Surveillance / Statistical classification / Face recognition / Machine learning / Biometrics / Identification / Support vector machine / Facial recognition system / K-nearest neighbors algorithm

ICB ICB CONFIDENTIAL REVIEW COPY. DO NOT DISTRIBUTE. 000

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2012-07-06 12:49:54
UPDATE