Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Operating system protection through program evolution

In this paper, we introduce the use of program evolution as a technique for defending against automated attacks on operating systems.

متن کامل

effect of motivational interviewing on a weight loss program based on the protection motivation theory

conclusions our results demonstrated that mi, combined with the implementation of intention intervention, increased weight loss and pmt construct scores in our study population. results in the two intervention groups, the pmt construct scores, namely susceptibility (p = 0.001), severity (p = 0.001), rewards (p =0.004), self-efficacy (p = 0.001), response efficacy (p = 0.001), and costs (p = 0.0...

متن کامل

Differential program evaluation model in child protection.

Increasingly attention has been focused to the degree to which social programs have effectively and efficiently delivered services. Using the differential program evaluation model by Tripodi, Fellin, and Epstein (1978) and by Bielawski and Epstein (1984), this paper described the application of this model to evaluating a multidisciplinary clinical consultation practice in child protection. This...

متن کامل

Causal Inference through a Witness Protection Program

One of the most fundamental problems in causal inference is the estimation of a causal effect when treatment and outcome are confounded. This is difficult in an observational study, because one has no direct evidence that all confounders have been adjusted for. We introduce a novel approach for estimating causal effects that exploits observational conditional independencies to suggest “weak” pa...

متن کامل

Exploiting Self-Modification Mechanism for Program Protection

In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary progr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Broadcast Engineering

سال: 2010

ISSN: 1226-7953

DOI: 10.5909/jbe.2010.15.2.192