Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information
نویسندگان
چکیده
منابع مشابه
Operating system protection through program evolution
In this paper, we introduce the use of program evolution as a technique for defending against automated attacks on operating systems.
متن کاملeffect of motivational interviewing on a weight loss program based on the protection motivation theory
conclusions our results demonstrated that mi, combined with the implementation of intention intervention, increased weight loss and pmt construct scores in our study population. results in the two intervention groups, the pmt construct scores, namely susceptibility (p = 0.001), severity (p = 0.001), rewards (p =0.004), self-efficacy (p = 0.001), response efficacy (p = 0.001), and costs (p = 0.0...
متن کاملDifferential program evaluation model in child protection.
Increasingly attention has been focused to the degree to which social programs have effectively and efficiently delivered services. Using the differential program evaluation model by Tripodi, Fellin, and Epstein (1978) and by Bielawski and Epstein (1984), this paper described the application of this model to evaluating a multidisciplinary clinical consultation practice in child protection. This...
متن کاملCausal Inference through a Witness Protection Program
One of the most fundamental problems in causal inference is the estimation of a causal effect when treatment and outcome are confounded. This is difficult in an observational study, because one has no direct evidence that all confounders have been adjusted for. We introduce a novel approach for estimating causal effects that exploits observational conditional independencies to suggest “weak” pa...
متن کاملExploiting Self-Modification Mechanism for Program Protection
In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by dummy instructions. Then, the binary progr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Broadcast Engineering
سال: 2010
ISSN: 1226-7953
DOI: 10.5909/jbe.2010.15.2.192