Results 71 to 80 of about 26,866 (284)

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges

open access: yesAlgorithms
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend.
Tomer Raitsis   +5 more
doaj   +1 more source

“And in some cases, we're the best option:” A qualitative study of community‐based doula support for black perinatal mental health

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson   +5 more
wiley   +1 more source

Zero-Knowledge and Code Obfuscation [PDF]

open access: yes, 2000
In this paper, we investigate the gap between auxiliary-input zero-knowledge (AIZK) and blackbox-simulation zero-knowledge (BSZK). It is an interesting open problem whether or not there exists a protocol which achieves AIZK, but not BSZK. We show that the existence of such a protocol is closely related to the existence of secure code obfuscators.
openaire   +1 more source

Mapping Intimate Partner Financial Abuse Across Public and Private Systems

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article maps the ways that intimate partner financial abuse presents, and the range of public and private entities involved in its perpetration. It reports on an analysis of submissions by individuals to the Australian parliamentary inquiry into the Financial Services Regulatory Framework in Relation to Financial Abuse.
Adrienne Byrt   +3 more
wiley   +1 more source

Pure Infinitely Self-Modifying Code is Realizable and Turing-complete [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
Although self-modifying code has been shyed away from due to its complexity and discouragement due to safety issues, it nevertheless provides for a very unique obfuscation method and a different perspective on the relationship between data and code.
Gregory Morse
doaj   +1 more source

Expanded application to plant reproductive tissues of a branched DNA probe‐based in situ hybridization method

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya   +3 more
wiley   +1 more source

Different Obfuscation Techniques for Code Protection

open access: yesProcedia Computer Science, 2015
AbstractWith the advancements in digital technology, the threat of unimaginable level of duplicating and illegal reproducing of software also increases. Therefore the piracy rate is increasing proportionally. This scenario has clearly placed the threat for the software manufacturers and leads to the development of numerous software protection ...
Behera, Chandan Kumar   +1 more
openaire   +1 more source

Assessing the viability of genebanked seeds from rare, wild plants native to the United States using the D.E.A.D. paradigm

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Genebanks must maintain viable seeds for decades. Seeds that germinate are clearly alive, but some seeds, often from wild populations, do not germinate because they are dormant, empty, aged, or damaged (D.E.A.D.). This work evaluates the effects of D.E.A.D.
Christina Walters   +33 more
wiley   +1 more source

Classification of Obfuscation Techniques in LLVM IR: Machine Learning on Vector Representations

open access: yesMachine Learning and Knowledge Extraction
We present a novel methodology for classifying code obfuscation techniques in LLVM IR program embeddings. We apply isolated and layered code obfuscations to C source code using the Tigress obfuscator, compile them to LLVM IR, and convert each IR code ...
Sebastian Raubitzek   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy