Computer surveillance

Results: 1478



#Item
301Human–computer interaction / Ubiquitous computing / Wireless / Surveillance / Asset tracking / Automatic identification and data capture / Radio-frequency identification / Technology

Microsoft PowerPoint - 3D RFID.ppt

Add to Reading List

Source URL: www.wca.org

Language: English - Date: 2008-07-14 05:14:54
302Privacy / Human rights / Crime prevention / Law enforcement / Internet privacy / Surveillance / Mass surveillance / Tor / Computer surveillance / Security / Ethics / National security

Do We Care About Surveillance? Edward Snowden’s Impact And Policy Implications Arya Azma, Louis DeScioli, and Evan Marshall 1  

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2014-08-10 11:09:32
303Public safety / Ambient intelligence / Internet of Things / Cloud computing security / Privacy / Computer security / Cloud computing / Internet privacy / Surveillance / Security / Crime prevention / National security

Mobile Working Group Peer Reviewed Document Security Guidance for Early Adopters of the Internet of Things (IoT)

Add to Reading List

Source URL: downloads.cloudsecurityalliance.org

Language: English - Date: 2015-04-30 19:58:23
304Machine learning / Face recognition / Automatic identification and data capture / User interface techniques / Facial recognition system / Surveillance / Cross-validation / Linear discriminant analysis / Pattern recognition / Statistics / Computer vision / Artificial intelligence

An Associate-Predict Model for Face Recognition Qi Yin1,3 1 Department of Information Engineering

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-05-10 22:53:57
305Iris recognition / University of Cambridge Computer Laboratory / Surveillance / Identity management / Authentication / Iris / Password / Security / Access control / Biometrics

Proceedings of The 4th International Platform on Integrating Arab e-Infrastructure in a Global Environment e-AGE 2014

Add to Reading List

Source URL: asrenorg.net

Language: English - Date: 2015-01-15 05:34:56
306Surveillance / Point of sale / Retailing / Computer keyboard / Function key / Technology / Electronics / Keystroke dynamics / Business / Embedded systems / Business software

Quick Start Guide In this Guide • Software Installation • Security Issues

Add to Reading List

Source URL: www.keystrokepos.com

Language: English - Date: 2011-12-12 14:58:44
307National security / Security guard / Surveillance / Information security / Singapore Police Force / Charles & Keith / Computer security / Security / Crime prevention / Public safety

Mr Paul Lim, Founder and CEO of leading security solutions provider Soverus Group, Cover Story talks about the paramount importance his staff plays in the company’s success.

Add to Reading List

Source URL: www.asme.org.sg

Language: English - Date: 2013-10-21 06:36:57
308Robot / Wireless sensor network / Mobile robot / Closed-circuit television / Camera phone / Time-of-flight camera / Computer vision / Digital cameras / Surveillance

EYE SOCIETY Jacky Mallett and V. Michael Bove, Jr. MIT Media Laboratory 20 Ames Street, Room E15-368B Cambridge MAUSA ,

Add to Reading List

Source URL: excedrin.media.mit.edu

Language: English - Date: 2013-07-01 08:09:40
309Computing / Television / TV tuner card / NTSC / Conventional PCI / Television technology / Computer hardware / Computer buses

Videum 004 AV/V0 Reinforce your video surveillance  infrastructure with a reliably superior multi-channel solution. Key Features Multi-Channel Capture Architecture

Add to Reading List

Source URL: www.winnov.com

Language: English - Date: 2014-07-03 19:09:12
310Technology / Internet / Computer network / Google / Email privacy / Computer surveillance in the workplace / Email / Computing / Digital media

Roper Gulf Regional Council Computer, Internet and Email Usage Policy ADM007- Computer, Telephones, Internet and Email Usage Policy 1.

Add to Reading List

Source URL: ropergulf.nt.gov.au

Language: English - Date: 2014-08-18 03:13:36
UPDATE