نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. We propose an enhanced scheme of Hill cipher based on variable modulus and algebraic alphabet to protect software copy, which uses tridiagonal matrix. Since the modulus is not a fixed number and the a...
This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a propo...
Computational capacity of modern hardware and algorithmic advances have allowed SAT solving to become a tractable technique for the resolution of decision problems derived from complex software. In this article, we present three practical applications of SAT to software security in static vulnerability checking, exploit generation, and the study of copy protections. These areas are some of the ...
The present study examines the stigma associated with online relationship initiation and its relation to women's self-protective behavior. Self-protective behaviors are those an individual engages in to avoid becoming a victim of dating violence. Female participants from a Midwestern university (N=82) were asked to read scenarios describing a hypothetical date. In one scenario, the prospective ...
With the advancement of technology and easy availability of imaging tools, it’s not difficult now a days to manipulate digital images to hide or create misleading images. Image forgery detection is currently one of the hot research fields of image processing. Many research papers have been published during recent years. Image forgery has already been categorized. Copy-Move forgery is one of the...
We describe an algorithm, ReAS, to recover ancestral sequences for transposable elements (TEs) from the unassembled reads of a whole genome shotgun. The main assumptions are that these TEs must exist at high copy numbers across the genome and must not be so old that they are no longer recognizable in comparison to their ancestral sequences. Tested on the japonica rice genome, ReAS was able to r...
We study a family of stylized assortment planning problems, where arriving customers make purchase decisions among offered products based on maximizing their utility. Given limited display capacity and no a priori information on consumers’ utility, the retailer must select which subset of products to offer. By offering different assortments and observing the resulting purchase behavior, the ret...
In the last year, as a consequence of the diffusion of the MP3 standard, a very important discussion concerning property rights protection on the net has begun. The music industry is concerned about the increase in illegal exchange of protected material. Researching the most effective way of protecting intellectual rights has involved legal authorities at different levels: international agencie...
The move from hardware middleboxes to software network functions, as advocated by NFV, has proven more challenging than expected. Developing new NFs remains a tedious process, requiring that developers repeatedly rediscover and reapply the same set of optimizations, while current techniques for providing isolation between NFs (using VMs or containers) incur high performance overheads. In this p...
In many group-living animals dominant individuals occupy the center of a group. This is generally thought to reflect a preference for locations, that provide optimal protection against predators. However, in this paper I will show that such spatial-structure also emerges among artificial entities that lack preference for any spatial location. The artificial entities dwell in a homogeneous world...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید