نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

Journal: :JNW 2014
Ning Huang

To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. We propose an enhanced scheme of Hill cipher based on variable modulus and algebraic alphabet to protect software copy, which uses tridiagonal matrix. Since the modulus is not a fixed number and the a...

2012

This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a propo...

2012
Julien Vanegue Sean Heelan Rolf Rolles

Computational capacity of modern hardware and algorithmic advances have allowed SAT solving to become a tractable technique for the resolution of decision problems derived from complex software. In this article, we present three practical applications of SAT to software security in static vulnerability checking, exploit generation, and the study of copy protections. These areas are some of the ...

Journal: :Cyberpsychology, behavior and social networking 2013
Billie E. Cali Jill M. Coleman Catherine Campbell

The present study examines the stigma associated with online relationship initiation and its relation to women's self-protective behavior. Self-protective behaviors are those an individual engages in to avoid becoming a victim of dating violence. Female participants from a Midwestern university (N=82) were asked to read scenarios describing a hypothetical date. In one scenario, the prospective ...

2011
Sunil Kumar

With the advancement of technology and easy availability of imaging tools, it’s not difficult now a days to manipulate digital images to hide or create misleading images. Image forgery detection is currently one of the hot research fields of image processing. Many research papers have been published during recent years. Image forgery has already been categorized. Copy-Move forgery is one of the...

Journal: :PLoS Computational Biology 2005
Ruiqiang Li Jia Ye Songgang Li Jing Wang Yujun Han Chen Ye Jian Wang Huanming Yang Jun Yu Gane Ka-Shu Wong Jun Wang

We describe an algorithm, ReAS, to recover ancestral sequences for transposable elements (TEs) from the unassembled reads of a whole genome shotgun. The main assumptions are that these TEs must exist at high copy numbers across the genome and must not be so old that they are no longer recognizable in comparison to their ancestral sequences. Tested on the japonica rice genome, ReAS was able to r...

2009
Denis Saure Assaf Zeevi

We study a family of stylized assortment planning problems, where arriving customers make purchase decisions among offered products based on maximizing their utility. Given limited display capacity and no a priori information on consumers’ utility, the retailer must select which subset of products to offer. By offering different assortments and observing the resulting purchase behavior, the ret...

1999
Antonio Cordella Mathias Klang

In the last year, as a consequence of the diffusion of the MP3 standard, a very important discussion concerning property rights protection on the net has begun. The music industry is concerned about the increase in illegal exchange of protected material. Researching the most effective way of protecting intellectual rights has involved legal authorities at different levels: international agencie...

2016
Aurojit Panda Sangjin Han Keon Jang Melvin Walls Sylvia Ratnasamy Scott Shenker

The move from hardware middleboxes to software network functions, as advocated by NFV, has proven more challenging than expected. Developing new NFs remains a tedious process, requiring that developers repeatedly rediscover and reapply the same set of optimizations, while current techniques for providing isolation between NFs (using VMs or containers) incur high performance overheads. In this p...

1998
Charlotte K. Hemelrijk

In many group-living animals dominant individuals occupy the center of a group. This is generally thought to reflect a preference for locations, that provide optimal protection against predators. However, in this paper I will show that such spatial-structure also emerges among artificial entities that lack preference for any spatial location. The artificial entities dwell in a homogeneous world...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید