Results 211 to 220 of about 14,131 (243)

Alternative DRM formulations

open access: yes, 2002
Wang, K.   +2 more
openaire   +1 more source

DRM tDCS

2021
Influence of tDCS during retrieval on DRM performance by Maximilian A.
Greene, Ciara   +2 more
openaire   +1 more source

DRM and privacy

Communications of the ACM, 2003
How should the law respond to DRM restrictions that invade user privacy?
openaire   +1 more source

A-DRM

ACM SIGPLAN Notices, 2015
Virtualization technologies has been widely adopted by large-scale cloud computing platforms. These virtualized systems employ distributed resource management (DRM) to achieve high resource utilization and energy savings by dynamically migrating and consolidating virtual machines.
Hui Wang   +5 more
openaire   +1 more source

DRM and Standardization – Can DRM Be Standardized?

2003
In this paper, we examine issues related to the standardization of DRM systems or, more generally, IPMP systems. Rationale behind the need for standardization, targets of standardization and some general guidelines for successful standardization are presented. Both successful and failed past standards are examined for lessons and strategy.
Spencer Cheng, Avni Rambhia
openaire   +1 more source

Audio DRM Conversion between Different DRM Content Formats

2008 Second International Conference on Electrical Engineering, 2008
Currently audio content is protected by many kinds of DRM systems each of which adopts different DRM technology. It might be impossible to use the content governed by one DRM System at other DRM compliant device even within one user's domain. In this paper, we propose a scheme that can converts one DRM's DRM content to other DRM's DRM content between ...
Yeonjeong Jeong   +2 more
openaire   +1 more source

Alternative DRM formulations

Engineering Analysis with Boundary Elements, 2003
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Wang, K.   +2 more
openaire   +2 more sources

The drm game

Proceedings of the 2007 ACM workshop on Digital Rights Management, 2007
In this paper we cast DRM in a setting that allows us to model a number of current approaches as games. The DRM game is partitioned into two subgames, one that considers the game associated with content acquisition, and a second that considers how a consumer uses the content, along with a vendor's response to this usage.
Gregory L. Heileman   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy