AH Projects » Thesis
The algorithm utilizes the Viola Jones method of calculating the integral image ... The sub-window (in red) is scanned across the image at various scales ...
http://ahprojects.com/c/itp/thesis
popularity:
security
privacy
face
computervision
research
makeup
design
facerecognition
recognition
camera
|
Tor: anonymity online
Ensemble d'outils open source permettant d'améliorer la confidentialité et la sécurité des échanges sur Internet en les routant sur une chaîne de proxy et les ...
similarity:
popularity:
security
privacy
proxy
anonymity
internet
software
tools
tor
anonymous
web
|
AnchorFree
Secure your web session, data, online shopping, and personal information online with ... Access all content privately without censorship; bypass firewalls. ...
similarity:
popularity:
vpn
security
proxy
software
wifi
privacy
free
tools
freeware
wireless
|
Electronic Privacy Information Center
The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, ... Search epic.org. Hot Policy Issues. Cloud Computing ...
similarity:
popularity:
privacy
internet
security
politics
activism
freedom
technology
law
information
reference
|
Get My FBI File
ever participate in a civil rights march? How about a Vietnam war ... ever sign an edgy political petition? ... ever know a guy named "Joey the Horse?" (Ever ...
similarity:
popularity:
fbi
privacy
government
security
identity
tools
file
information
research
politics
|
Face Detection Homepage: Face finding and recognition
Information about facial recognition technology and the task of detecting faces within images. With links to technical explanations, facial recognition software, ...
similarity:
popularity:
face
recognition
detection
programming
facerecognition
facedetection
research
software
image
face-detection
|
Center for Information Technology Policy » Lest We Remember: Cold Boot Attacks on Encryption Keys
J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William ... Although DRAMs become less reliable when they are not refreshed, they are not ...
similarity:
popularity:
security
encryption
cryptography
hardware
hack
research
crypto
memory
hacking
privacy
|
TRUSTe - Make Privacy Your Choice
No information avaiable
similarity:
popularity:
privacy
security
trust
web
business
internet
email
legal
resources
marketing
|
Faculty of Science : Vrije Universiteit
... any other questions, you can also send us an email at info@rfidguardian.org. ... Retrieved from "http://www.rfidguardian.org/index.php/Main_Page" Category: All ...
similarity:
popularity:
rfid
security
privacy
hardware
anonymity
technology
hack
research
wireless
firewall
|
World Privacy Forum | Home
The World Privacy Forum is a nonprofit, non partisan organization focused on conducting in-depth research and consumer education in the intersecting areas of ...
similarity:
popularity:
privacy
security
internet
activism
law
politics
consumer
reference
policy
technology
|
Digital Photocopiers Loaded With Secrets - CBS Evening News - CBS News
No information avaiable
similarity:
popularity:
security
privacy
copiers
photocopier
hardware
data
news
business
digital
hacks
|