نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2013

Introduction A growing level of attention has recently been given to the automated control of potentially hazardous processes such as the overpressure or containment of dangerous substances. Several independent protection methods provide measures to reduce the risk from such hazards to personnel, the environment and assets. A significant level of this risk reduction is allocated to safety instr...

Journal: :Computers in Human Behavior 2014
Jennifer L. Bevan Ruth Gomez Lisa Sparks

The current study examined the relationship between general perceived levels of stress, quality of life, social networking usage, and disclosing important life events on Facebook in order to better understand the complex relationship between online disclosure and individual well-being. An online survey was completed by adult Facebook users aged 18–70. Results indicate that the more time spent o...

2013
Lara A. Wood Rachel L. Kendal Emma G. Flynn

Many animals, including humans, acquire information through social learning. Although such information can be acquired easily, its potential unreliability means it should not be used indiscriminately. Cultural ‘transmission biases’ may allow individuals to weigh their reliance on social information according to a model's characteristics. In one of the first studies to juxtapose two model-based ...

Journal: :Manufacturing & Service Operations Management 2008
Garrett J. van Ryzin Gustavo J. Vulcano

The procedure for calculating a sample based gradient accounting for choice behavior consists of two passes: In the forward pass, we keep track of the state of the network observed by the arrival stream of customers (i.e., available capacity met by customer t, and the quantity allocated to the different products in the preference order). The backward pass rebuilds the capacity found by each cus...

Journal: :J. Electron. Commerce Res. 2003
Kemal Altinkemer Junwei Guan

The enormous popularity of the Internet and the tremendous advances in communication technology have opened a new distribution channel for the software firms. However, at the same time, the Internet also makes the distribution of pirate software much easier. In order to analyze software firms’ protection strategies for online software distribution, a game theory base model is presented in the p...

2018
Bruno Biais

Protection buyers share risk with protection sellers, whose assets are only imperfectly pledgeable because of moral hazard. To mitigate moral hazard, privately optimal contracts involve variation margins. When margins are called, protection sellers must sell some of their assets to other investors. We analyse, in a general equilibrium framework, whether this leads to ine¢ cient …re sales. If ma...

2002
Thomas D. Crocker Jason F. Shogren

Shogren, J.F. and Crocker, T.D.. 1990. Adaptation and the option value of uncertain environmental resources. Ecol. Econ., 2 : 301-310. Just as ecology has benefited from the economic theory of optimizstion, economics can benefit from the ecological theory of adaptation. We examine the impact of short-term, non-genetic adaptive self-protection on the values individuals attach to uncertain prospe...

2005
Suma Venkatesh Levent Ertaul

Over the years, several software protection techniques have been developed to avoid global software piracy, which has increased over 40% and has caused $11 billion loss. Code Obfuscation is one of these techniques and it is very promising one. Code obfuscation is a form of software protection against unauthorized reverse-engineering. In this paper, we give information about available software o...

2007
Tiejun Huang

By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical and social viewpoints. Not only it is difficult to deploy and update content encryption and security infrastructure, but also the content diffusion is limited and Fair Use is affected. The new schema for DRM should conten...

Journal: :IBM Systems Journal 2006
Ginger Myles Stefan Nusser

G. Myles S. Nusser In this paper we review the state of the art in content protection for video games by describing the capabilities and shortcomings of currently deployed solutions. In an attempt to address some of the open issues, we present two novel approaches. The first approach uses branch-based software watermarking to discourage and detect piracy through a registration-based system. In ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید