Computer surveillance

Results: 1478



#Item
431Imaging / Face recognition / Optics / 3D computer graphics / Facial recognition system / Surveillance / 3D modeling / Structure from motion / Three-dimensional face recognition / Computer vision / Visual effects / Vision

Microsoft PowerPoint - 3D face reconstruction v1.4.ppt

Add to Reading List

Source URL: www.computer-vision.org

Language: English - Date: 2011-04-19 21:37:17
432Computer architecture / IOS / Android / Tablet computer / App Store / Smartphones / Computing / Software

Redcare Surveillance Redcare View Watch Technical product information With the Redcare View Watch App you can access and control your Redcare View devices (Minicam, Encoders and Camera App) from your mobile, handheld dev

Add to Reading List

Source URL: www.redcare.bt.com

Language: English - Date: 2014-06-13 07:58:22
433Surveillance / French words and phrases / Crime prevention / Sociology / Civil disobedience / Sousveillance / Steve Mann / Wearable computer / Activity recognition / Technology / Security / National security

2014 IEEE Conference on Computer Vision and Pattern Recognition Workshops An Introduction to the 3rd Workshop on Egocentric (First-person) Vision Steve Mann, Kris M. Kitani, Yong Jae Lee, M. S. Ryoo, Alireza Fathi Abstr

Add to Reading List

Source URL: www.wearcam.org

Language: English - Date: 2014-10-24 01:10:29
434Security / Identity management / Law / Internet privacy / Google / Surveillance / Ethics / World Wide Web / Privacy

Excerpt from The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2009-02-05 14:00:38
435Tamron / Actuarial science / Computer security / Data security / Information security / Management system / Risk / Security / Public safety / Ethics

Management System ●Integrated Management System Triple Audit Systems for Surveillance and Finding Problems In 2010, we obtained unified certification applicable to the

Add to Reading List

Source URL: www.tamron.co.jp

Language: English - Date: 2013-12-02 06:12:12
436Radio-frequency identification / Surveillance / Privacy / Wireless / Barcode / Mobile ticketing / Automatic identification and data capture / Technology / Human–computer interaction

COMPANY INSIGHT The art of beginning by Jan Hendrik Croockewit | Photos by Nedap | lay-out by Maya Reus

Add to Reading List

Source URL: www.nedap.com

Language: English - Date: 2014-06-05 03:38:53
437Vision / Segmentation / Computer vision / Optical flow / Frame rate / Pixel / Scale-invariant feature transform / Video tracking / Image processing / Imaging / Computer graphics

High Level Description of Video Surveillance Sequences Patrick Piscaglia, Andrea Cavallaro1, Michel Bonnet2, and Damien Douxchamps3 1 Signal Processing Laboratory, Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: damien.douxchamps.net

Language: English - Date: 2015-03-29 10:38:28
438National security / Public safety / Espionage / Cryptography / Computer security / Digital security / Surveillance / Internet / Digital signature / Security / Computer network security / Crime prevention

Security Infrastructure for iRN Bart Jacobs Digital Security Group Institute for Computing and Information Sciences (iCIS), Radboud University Nijmegen, The Netherlands. Web: www.cs.ru.nl/B.Jacobs Email:

Add to Reading List

Source URL: www.nctv.nl

Language: English - Date: 2014-08-16 03:12:16
439Surveillance / Computer keyboard / Microsoft Windows / Operating system / Electronic engineering / Security / Windows Vista / Features new to Windows XP / Comparison of privilege authorization features / Espionage / Keystroke logging / Spyware

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-Login Overview The first step common to all modules of the H-Apps suite is the user authentication procedure required to gain access to any application res

Add to Reading List

Source URL: www.eisst.com

Language: English
440Object detection / QuickCam / Vision / Optics / Image processing / Imaging / Segmentation

Demo: Video-Surveillance application with Self-Organizing Maps Mohamed Dahmane and Jean Meunier DIRO, Universit´e de Montr´eal, CP 6128, Succursale Centre-Ville, 2920 Chemin de la tour, Montr´eal, Qu´ebec, Canada, H3

Add to Reading List

Source URL: www.computer-vision.org

Language: English - Date: 2011-04-19 21:37:17
UPDATE