نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
In an attempt to protect their intellectual property and compete effectively in an increasingly dynamic marketplace, software producers have employed a number of preventive and deterrent measures to counter software piracy. Conventional wisdom suggests that reducing piracy will force consumers to legitimately acquire software, thus increasing firm profits. In this paper, we develop an analytica...
the technology of VM(virtual-machine)-based software protection is a hot research field of software protection. Based on researching on the traditional VM-based software protection, we improvement this technology and design new one called NISLVMP, in which there are double register environment, security virtual instruction and more deformation templates. At last, analysis and test show that NIS...
ABSTRACT: In this article, I used series hazard modeling and multivariate logistic models to test the relative strengths of deterrence and reactance models for the risk of piracy attacks under a military intervention and several major events. I found significant evidence for the conclusion that the rate of piracy attacks reduced significantly when direct controls are implemented to reduce the e...
In this paper, we investigate the connection availabilities for the new protection scheme Demand-wise Shared Protection (DSP) and describe an appropriate approach for their computation. The exemplary case study on two realistic network scenarios shows that in most cases the availabilities for DSP are comparable with that for 1+1 path protection and better than in case of shared path protection.
We examine how environmental attitudes influence subjective well-being in urban China. We find that considering environmental protection important on its own has no effect on subjective wellbeing; however, those who consider environmental protection important and have a higher sense of collectivism or concern for others have a lower level of subjective well-being. We interpret this result as in...
This chapter was originally published in the book Interventions for Addiction. The copy attached is provided by Elsevier for the author's benefit and for the benefit of the author's institution, for non-commercial research, and educational use. This includes without limitation use in instruction at your institution, distribution to specific colleagues, and providing a copy to your institution's...
The software protection strategy of software developer and the inherent risk to end user in using pirated software are two major factors that affect a user’s decision on whether to purchase or pirate a software product. This paper analyzes the optimal protection strategy for software developer in horizontally and vertically differentiated markets. We find that the implementation cost of softwar...
The Northwest Forest Plan has sometimes been criticized for using a reserve-based approach. At other times, it has been criticized for not placing all of the remaining old growth into “true protection”, such in a park or wilderness area. These criticisms imply that “reserve” means one thing—a no-touch-no-management zone and that a reserve approach is either not valid for dynamic forests or is t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید