|
The algorithm utilizes the Viola Jones method of calculating the integral image ... The sub-window (in red) is scanned across the image at various scales ...
http://ahprojects.com/c/itp/thesis
popularity:
security
privacy
face
computervision
research
makeup
design
facerecognition
recognition
camera
|
![]() |
Hosts essays, articles, and the text of legislation that covers cryptology, dual-use technologies, national security, and intelligence.
similarity:
popularity:
security
politics
government
news
privacy
intelligence
crypto
conspiracy
reference
cryptography
|
|
Free web proxy with optional removal of cookies, scripts, ads and referers. Requires cookies.
similarity:
popularity:
proxy
anonymous
privacy
security
web
tools
internet
online
free
browser
|
|
No information avaiable
similarity:
popularity:
security
hacking
sicurezza
linux
networking
network
informatica
privacy
research
computer
|
|
Provides up-to-date electronic privacy news stories from around the Web, as well as links to cryptography, encryption, and electronic privacy information.
similarity:
popularity:
privacy
security
news
politics
internet
rights
information
activism
technology
computer
|
|
Know the email address of someone but nothing more? Learn techniques to help you uncover the location and other details of the email sender.
similarity:
popularity:
email
search
security
howto
privacy
people
research
identity
google
tools
|
|
Weak passwords and passphrases are one of the most common flaws in computer security. ... No background in cryptography or mathematics is required. Just follow ...
similarity:
popularity:
security
password
passphrase
encryption
privacy
crypto
reference
tools
cryptography
passwords
|
![]() |
Earlier this week, a Lifehacker reader caught downloading copyrighted material using BitTorrent told us about the scary warning letter she received from her ISP after ...
similarity:
popularity:
privacy
bittorrent
torrent
security
p2p
lifehacker
howto
torrents
tips
software
|
|
Open source on-the-fly disk encryption software for Windows XP/2000 and Linux.
similarity:
popularity:
security
encryption
software
opensource
tools
cryptography
windows
linux
freeware
privacy
|
|
Advocacy center and information hub includes links, documents, and news for victims of identity theft. Also provides scam alerts, statistics, and more.
similarity:
popularity:
security
identity
privacy
identitytheft
theft
reference
idtheft
consumer
credit
identity_theft
|
![]() |
Web proxy with advanced filtering capabilities for protecting privacy, filtering content, managing cookies, controlling access, and removing ads, banners, and pop-ups. ...
similarity:
popularity:
proxy
privacy
security
software
web
internet
tools
anonymous
opensource
network
|