Computer surveillance

Results: 1478



#Item
891Public Meeting  July 23, [removed]PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD

Public Meeting July 23, [removed]PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD

Add to Reading List

Source URL: www.pclob.gov

Language: English - Date: 2014-08-11 10:00:17
892Citizen-Controlled Sensing: Using open source & nanotechnology to reduce surveillance & head off Iraq-style wars Version 0.6 DRAFT -- COMMENTS REQUESTED Christine Peterson

Citizen-Controlled Sensing: Using open source & nanotechnology to reduce surveillance & head off Iraq-style wars Version 0.6 DRAFT -- COMMENTS REQUESTED Christine Peterson

Add to Reading List

Source URL: opensourcesensing.org

Language: English - Date: 2009-05-29 18:30:34
893TESTIMONY OF DETECTIVE LEANNE SHIREY ON THE MARKETING OF SEXUALLY EXPLICIT MATERIAL COPA COMMISSION HEARING III AUGUST 3-4, 2000 SAN JOSE STATE UNIVERSITY

TESTIMONY OF DETECTIVE LEANNE SHIREY ON THE MARKETING OF SEXUALLY EXPLICIT MATERIAL COPA COMMISSION HEARING III AUGUST 3-4, 2000 SAN JOSE STATE UNIVERSITY

Add to Reading List

Source URL: www.copacommission.org

Language: English - Date: 2013-02-05 12:43:59
894Shanghai Jiao Tong University participation in high-level feature extraction, automatic search and surveillance event detection at TRECVID 2008 Xiaokang Yang, Rui Zhang, Yi Xu, Anwen Liu, Jiemin Liu, Zheng Lu, Xiaolin Ch

Shanghai Jiao Tong University participation in high-level feature extraction, automatic search and surveillance event detection at TRECVID 2008 Xiaokang Yang, Rui Zhang, Yi Xu, Anwen Liu, Jiemin Liu, Zheng Lu, Xiaolin Ch

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2008-12-03 08:54:08
895PKU@TRECVID2009: Single-Actor and Pair-Activity Event Detection in Surveillance Video Zhipeng Hu a, Guangnan Ye b, Guochen Jia a, Xibin Chen b, Qiong Hu c, Kaihua Jiang b, Yaowei Wang a, d, Lei Qing c, Yonghong Tian a, X

PKU@TRECVID2009: Single-Actor and Pair-Activity Event Detection in Surveillance Video Zhipeng Hu a, Guangnan Ye b, Guochen Jia a, Xibin Chen b, Qiong Hu c, Kaihua Jiang b, Yaowei Wang a, d, Lei Qing c, Yonghong Tian a, X

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2010-04-14 09:58:22
896Reprint as at 29 November 2010 Government Communications Security Bureau Act 2003 Public Act

Reprint as at 29 November 2010 Government Communications Security Bureau Act 2003 Public Act

Add to Reading List

Source URL: www.legislation.govt.nz

Language: English - Date: 2013-04-28 04:51:41
897IDR Team Summary 3 Define the trajectory, value, and risk of Extreme Lifelogging when nearly everything about a person is in Cyberspace.  CHALLENGE SUMMARY

IDR Team Summary 3 Define the trajectory, value, and risk of Extreme Lifelogging when nearly everything about a person is in Cyberspace. CHALLENGE SUMMARY

Add to Reading List

Source URL: www.keckfutures.org

Language: English - Date: 2013-05-15 13:34:55
8982010 International Conference on Pattern Recognition  Background Filtering for Improving of Object Detection in Images Ge Qin, Bogdan Vrusias, Member, IEEE, and Lee Gillam

2010 International Conference on Pattern Recognition Background Filtering for Improving of Object Detection in Images Ge Qin, Bogdan Vrusias, Member, IEEE, and Lee Gillam

Add to Reading List

Source URL: www.cs.surrey.ac.uk

Language: English - Date: 2012-09-05 04:43:44
899

PDF Document

Add to Reading List

Source URL: biometrics.nist.gov

Language: English - Date: 2009-10-22 14:50:35
900Microsoft Word - marburg_trecvid07_final.doc

Microsoft Word - marburg_trecvid07_final.doc

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2008-03-03 10:55:17