Computer surveillance

Results: 1478



#Item
501Imaging / Infrared imaging / 3D computer graphics / Surveillance / Webcams / Kinect / High dynamic range imaging / Tone mapping / Sousveillance / Computer graphics / Computing / Human–computer interaction

Three Dimensional High Dynamic Range Veillance for 3D Range-Sensing Cameras Raymond Lo, Valmiki Rampersad, Jason Huang, Steve Mann Department of Electrical & Computer Engineering, University of Toronto, Toronto, Ontario,

Add to Reading List

Source URL: www.eyetap.org

Language: English - Date: 2013-10-12 01:13:08
502Computer security / Crime prevention / Data security / Information security / National security / Health communication / Workplace surveillance / Instant messaging / Ambulance Service of New South Wales / Security / Computing / Health

Communications - Use & Management of Misuse of NSW Health Communications Systems

Add to Reading List

Source URL: www0.health.nsw.gov.au

Language: English - Date: 2014-10-01 18:01:42
503Public safety / French words and phrases / Crime prevention / Mixed reality / Virtual reality / Sousveillance / Augmented reality / Flux / Stereoscopy / Security / National security / Surveillance

Walking through Sight: Seeing the Ability to See, in a 3-D Augmediated Reality Environment Ryan Janzen, Seyed Nima Yasrebi, Avishek Joey Bose, Arjun Subramanian, Steve Mann Department of Electrical and Computer Engineeri

Add to Reading List

Source URL: www.eyetap.org

Language: English - Date: 2014-12-02 22:15:22
504Human–computer interaction / Surveillance / Intermec / Impinj / RFID on metal / Radio-frequency identification / Automatic identification and data capture / Technology

RFID Overview Introduction to Radio Frequency Identification Introduction to Radio Frequency (RF) RF technology is used in many different applications, such as television, radio, cellular phones, radar, and automatic

Add to Reading List

Source URL: www.currentdirections.com

Language: English - Date: 2013-01-09 14:33:23
505Fraud / Open government / Computer crimes / Credit card fraud / E-Government / Credit card / Theft / Surveillance / Identity theft / Crimes / Law / Ethics

Defrauding Governments in the Twenty-First Century

Add to Reading List

Source URL: anzsoc.org

Language: English - Date: 2009-04-20 01:12:14
506Computer security / Security operations center / National security / Public safety / Security engineering / Surveillance / Security

How to build and run a Security Operations Center v1.1 Nicolas FISCHBACH

Add to Reading List

Source URL: www.securite.org

Language: English - Date: 2008-11-21 09:21:34
507National security / Surveillance / Information technology management / Campaign for Nuclear Disarmament / Security operations center / Information Technology Infrastructure Library / Information security / Security / Computer security / Public safety

Building a SOC “The CND SOC Service is extremely flexible and can be tailored around a client’s needs. ” Computer Network Defence Ltd’s (CND) Security Operations Centre (SOC) Service is a framework which provides

Add to Reading List

Source URL: www.securitywizardry.com

Language: English - Date: 2013-01-25 17:48:05
508Computer security / Fred Cohen / Mass surveillance / Threat / National Security Agency / Security / Computer network security / Cyberwarfare

Information at all.net[removed]http://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2014-05-02 09:00:54
509Privacy of telecommunications / Computer law / Privacy / Crime prevention / Surveillance / Mass surveillance / Legal aspects of computing / Telecommunications data retention / Internet privacy / National security / Law / Ethics

Image: geralt Conference report Privacy, security and surveillance: tackling dilemmas and dangers in the digital realm Monday 17 – Wednesday 19 November 2014 | WP1361

Add to Reading List

Source URL: www.wiltonpark.org.uk

Language: English - Date: 2015-01-14 05:27:48
510Multimodal interaction / National security / Sociology / French words and phrases / User interface techniques / EyeTap / Steve Mann / Sousveillance / Computer-mediated reality / Human–computer interaction / Technology / Surveillance

Continuous Lifelong Capture of Personal Experience with EyeTap Steve Mann Dept. of Electrical and Computer Engineering University of Toronto Toronto, Canada

Add to Reading List

Source URL: wearcam.org

Language: English - Date: 2004-08-21 22:04:04
UPDATE