AH Projects » Thesis
The algorithm utilizes the Viola Jones method of calculating the integral image ... The sub-window (in red) is scanned across the image at various scales ...
http://ahprojects.com/c/itp/thesis
popularity:
security
privacy
face
computervision
research
makeup
design
facerecognition
recognition
camera
|
OSF DataLossDB | Data Loss News, Statistics, and Research
... with the move to Open Security Foundation's DataLossDB.org, asks for contributions ... contained within the site, please contact curators@datalossdb.org. ...
similarity:
popularity:
security
privacy
statistics
database
research
data
reference
loss
hacks
dataloss
|
Anonymous proxy servers, by Anonymizer, hide IP addresses for surfing anonymously.
Enables anonyomous Web surfing through an intermediary to prevent unauthorized parties from gathering your personal information.
similarity:
popularity:
security
privacy
anonymous
tools
web
proxy
internet
software
anonymizer
computer
|
CMU Usable Privacy and Security Lab (CUPS)
Computation, Organizations and Society Engineering and Public Policy ... Nutrition Label Approach An Empirical Study of How People Perceive Online Behavioral ...
similarity:
popularity:
privacy
security
cmu
usability
research
internet
technology
anonymity
seguridad
school
|
Tor: An anonymous Internet communication system
No information avaiable
similarity:
popularity:
security
privacy
anonymous
internet
software
proxy
web
tor
tools
p2p
|
Face Recognition Homepage
Information portal for students and researchers in facial recognition. ... New @ face-rec.org. Research Groups. Newsgroup. Interesting Papers. New Papers. Databases ...
similarity:
popularity:
face
recognition
facerecognition
research
algorithm
ai
face-recognition
technology
programming
reference
|
Identity Theft Prevention – Identity Theft Protection – Stop Identity Theft
Identity Theft Prevention & Identity Theft Protection. Stop Identity Theft with LifeLock. LifeLock can guarantee identity theft never happens to you.
similarity:
popularity:
security
identitytheft
identity
privacy
credit
fraud
theft
finance
business
protection
|
Privacy Rights Clearinghouse--privacyrights.org
Offers information on how to protect your personal privacy.
similarity:
popularity:
privacy
security
consumer
rights
identity
law
reference
information
internet
resources
|
33 Bits of Entropy
But as we saw in a previous article, users often expect more subtle distinctions, ... To stay on top of future posts on 33bits.org, subscribe to the RSS feed or follow me on ...
similarity:
popularity:
privacy
security
blog
anonymity
research
socialnetworking
internet
blogs
datamining
anonymous
|
EPIC - Tools for Protecting Online Privacy
The Electronic Privacy Information Center (EPIC) focuses public attention on emerging civil liberties, privacy, First ... Search epic.org. Hot Policy Issues ...
similarity:
popularity:
privacy
security
tools
software
internet
encryption
email
anonymous
utilities
online
|
Technophilia: Protect your web searches - Lifehacker
by Wendy Boswell ... Common Cooking Myths You Can Easily Dispel #science #cooking. Set Up a Super Simple Evaporative Cooler for Immediate Heat Relief #heathacks #airconditioner ...
similarity:
popularity:
privacy
security
search
tips
web
lifehacks
google
howto
firefox
internet
|