نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
When a slowly varying voltage is detected the main problem is the noise especially when it is several times greater than the signal itself. A lock-in amplifier is used to measure the small signals in presence of noise. The aim of this paper is to do a digital lock-in amplifier based on virtual instrument language LabVIEW and later on, it will replace a practice of a subject from the Physics’ de...
This article investigates the security issues raised by the use of meta-programming systems with Java. For each possible type of MOP (compile-time, load-time, etc.), we study the permissions required for both the base and the meta-level protection domains, taking into account the flow of control between the different parts of the application. We show that the choice of a particular MOP architec...
IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and aut...
Internet Piracy and Book Sales: A Field Experiment Michal Krawczyk Widespread Internet piracy continues to fuel the debate about the appropriate level of copyright enforcement. In this project we used experimental methods to study the effect which underlies calls for stringent anti-piracy measures, namely that infringement has detrimental impact on legal sales. Focusing on the book industry, we...
Data security protection is essential for most multimedia data transmissions today. Classical multimedia content protection is dominated by symmetric encryption methods. This paper explores the possibility of public-key media content encryption. The key problem to the asymmetric selective encryption is formalized and defined as the “bounded plaintext problem”. Possible solutions to this problem...
Audio streaming has become a popular application on the Internet over the past few years, and is expected to grow with the advent of high-speed Internet access. Content adaptability, copyright protection and Quality of Service (QoS) monitoring of these streams are some of the major issues encountered in audio streaming. While many studies have tackled the issue of audio watermarking for copyrig...
Economic theory highlights the critical importance of excludability in encouraging private research and development in the agri-food sector. Without it, private research will languish and social welfare could suffer. Since 1970 governments around the world have recognized this and strengthened the legal protections for biotechnology processes and products (e.g. patents, plant breeders’ rights a...
1 The fundamental goal of an electric utility is to serve its customers with a reliable and low cost power supply. This goal has led to a number of standard protection engineering practices that ensure adequate service; however, with deregulation of the utility industry and increased competitive pressures, there is a desire to further improve service reliability and reduce costs. In this vein, ...
A new lock detection algorithm for digital quadrature phase-shift keying (QPSK) receiver is proposed. Analysis of the detector’s output characteristics is given and is verified by using computer simulation. Performance degradation due to carrier jitter is also considered. Analytic and simulation results show that the proposed algorithm is very useful as a lock detector in digital receivers beca...
The processing and encryption of multimedia content are generally considered sequential and independent operations. In certain multimedia content processing scenarios, it is however, desirable to carry out processing directly on encrypted signals. The field of secure signal processing poses significant challenges for both signal processing and cryptography research; only few ready to go fully i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید