Computer surveillance

Results: 1478



#Item
1CALL FOR PAPERS IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY Special Issue on Deep Learning for Visual Surveillance Visual surveillance has been long researched in the computer vision community. Focus o

CALL FOR PAPERS IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY Special Issue on Deep Learning for Visual Surveillance Visual surveillance has been long researched in the computer vision community. Focus o

Add to Reading List

Source URL: tcsvt.polito.it

Language: English - Date: 2016-09-29 14:15:50
    2Computer Security Threat Monitoring and Surveillance

    Computer Security Threat Monitoring and Surveillance

    Add to Reading List

    Source URL: seclab.cs.ucdavis.edu

    - Date: 2006-01-16 10:12:37
      3Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger MIT Laboratory for Computer Science feamster, mbalazin, gch, hari, karger  @lcs.m

      Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger MIT Laboratory for Computer Science feamster, mbalazin, gch, hari, karger  @lcs.m

      Add to Reading List

      Source URL: gray-world.net

      Language: English - Date: 2010-06-12 03:14:41
        4Expert  In Protecting Your Interests M6 Rackmount Enterprise NVR Series As GVD’s Enterprise NVRs, the M6 Series

        Expert In Protecting Your Interests M6 Rackmount Enterprise NVR Series As GVD’s Enterprise NVRs, the M6 Series

        Add to Reading List

        Source URL: www.gvdigital.com

        Language: English - Date: 2016-06-19 23:56:05
        5Photography and Hostile Reconnaissance – A guide for BSIA members October 2011 For other information please contact:

        Photography and Hostile Reconnaissance – A guide for BSIA members October 2011 For other information please contact:

        Add to Reading List

        Source URL: www.qpcc.co.uk

        Language: English - Date: 2014-02-23 20:42:14
        6On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

        On the Security of the Automatic Dependent Surveillance-Broadcast Protocol arXiv:1307.3664v2 [cs.CR] 15 AprMartin Strohmeier∗ , Vincent Lenders+ , Ivan Martinovic∗

        Add to Reading List

        Source URL: www.lenders.ch

        Language: English - Date: 2014-12-19 11:12:15
        7UNCLASSIFIED  Impariamo Volume 1, Issue 4  “ A newsletter for the Intelligence Community Centers for Academic Excellence”

        UNCLASSIFIED Impariamo Volume 1, Issue 4 “ A newsletter for the Intelligence Community Centers for Academic Excellence”

        Add to Reading List

        Source URL: nssp.unm.edu

        Language: English - Date: 2013-10-28 19:00:49
        8Quanergy Systems to Showcase Powerful LiDAR Security Detection System at ISC West Surveillance solution from leading LiDAR company detects threats in real 3D space  April 06, :00 AM Pacific Daylight Time

        Quanergy Systems to Showcase Powerful LiDAR Security Detection System at ISC West Surveillance solution from leading LiDAR company detects threats in real 3D space April 06, :00 AM Pacific Daylight Time

        Add to Reading List

        Source URL: www.quanergy.com

        Language: English - Date: 2016-05-16 02:32:19
        9Surveillance Event Detection Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangliang Cao, Vuong Le, Shen-Fu Tsai, Kai-Hsiang Lin, Zhen Li, Jianchao Yang, Thomas S. Huang Department of Electrical and Computer Engineering Un

        Surveillance Event Detection Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangliang Cao, Vuong Le, Shen-Fu Tsai, Kai-Hsiang Lin, Zhen Li, Jianchao Yang, Thomas S. Huang Department of Electrical and Computer Engineering Un

        Add to Reading List

        Source URL: www.ifp.illinois.edu

        Language: English - Date: 2010-07-25 04:16:41
        10Automated License Plate Reader Audit Review Background Legislation related to law enforcement’s use of automated license plate reader (ALPR) data went into effect inAgencies using ALPRs when the new requirements

        Automated License Plate Reader Audit Review Background Legislation related to law enforcement’s use of automated license plate reader (ALPR) data went into effect inAgencies using ALPRs when the new requirements

        Add to Reading List

        Source URL: www.ipad.state.mn.us

        Language: English - Date: 2016-07-26 08:51:50