نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2009
Kenneth L. Marcus John Roberts

Title VII of the Civil Rights Act of 1964 forbids job discrimination based on race, color, religion, sex, or national origin.1 Title VII was originally enacted as a regulation of interstate commerce and applied only to private employers. In 1972, however, the Act was extended to the public sector pursuant to Congress’s Fourteenth Amendment authority to ensure that ‘‘[n]o State shall . . . deny ...

Journal: :Int. Arab J. Inf. Technol. 2015
Muhammad Khan Muhammad Akram Naveed Riaz Ansari

In the era of software globalization, the need for securing software is much sought to ensure its smooth functioning for continuous availability of services to the users. Particularly, in cloud computing environment, all the software in the cluster needs to be secured and shielded against unauthorized accesses. Software crackers are always in the search of flaws in the software to obtain access...

2002
Mariemma Inmaculada Yagüe del Valle Antonio Maña Javier Lopez Ernesto Pimentel José M. Troya

Security is a very relevant aspect in the implementation of most digital libraries. Two important security issues in these systems are distributed access control and secure content distribution. This paper presents a system that provides these two features for digital libraries. The system is based on the combination of the use of an external authorization infrastructure, a software protection ...

Journal: :Journal of Object Technology 2004
Charles Ashbacher

--Forbes Asap Protect your intellectual property rights Knowledge is power and nowhere is that more apparent than in today’s informationdriven, high technology economy. Fueled by the growing demand for new and improved technology, engineers, scientists, and the companies that employ them and manage technology have a vested interest in protecting the wealth generated by their innovative ideas an...

Journal: :Bioinformatics 2008
Iuliana Ionita-Laza Nan M. Laird Benjamin A. Raby Scott T. Weiss Christoph Lange

MOTIVATION Estimating the frequency distribution of copy number variants (CNVs) is an important aspect of the effort to characterize this new type of genetic variation. Currently, most studies report a strong skew toward low-frequency CNVs. In this article, our goal is to investigate the frequencies of CNVs. We employ a two-step procedure for the CNV frequency estimation process. We use family ...

2002
Yoichi Oshima

Considering the value of semiconductor IP (Intellectual Property), fundamental knowledge of legal protection for IP is essential requirement for both IP providers and IP users. Since IPs are recognized as one of the intangible assets, present intellectual property system, such as patent, copyright, trade secret, and mask work protection system should provide certain legal protection by their ow...

2008
Shafi Goldwasser

Program obfuscation is the process of taking a program as an input and modifying it so that the resulting program has the same I/O behavior as the input program but otherwise looks`completely garbled' to the entity that runs it, even if this entity is adversarial and has full access to the program. Impossibility results, origination with the work of Barak etal in 2001, have been proved that ass...

2009
M. NUÑO

We introduce a general framework to study the dynamics of multiple strain pathogens that can impart cross–immunity through a variety of structures. We propose two types of immunity and apply them to assess the dynamics of two competing strains. We illustrate this framework using two “visions”: the next–to–kin protection (NTKP) approach which assumes that strains confer cross–immunity to next in...

Journal: :Computer Networks 2008
Massimo Tornatore Matteo Carcagnì Canhui Ou Biswanath Mukherjee Achille Pattavina

Progress in network technologies and protocols is paving the road towards flexible optical transport networks, in which dynamic leasable circuits could be set up and released on a short-term basis according to customers’ requirements. Recently, new solutions for automatized network management promise to allow customers to specify the terms of the service level agreement (SLA) to be guaranteed (...

Journal: :CoRR 2012
Laszlo Gyongyosi Sándor Imre

We propose a quantum copy-protection system which protects classical information in the form of non-orthogonal quantum states. The decryption of the stored information is not possible in the classical representation and the decryption mechanism of data qubits is realized by secret unitary rotations. We define an authentication method for the proposed copy-protection scheme and analyse the succe...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید