Results 41 to 50 of about 19,819 (285)

Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]

open access: yes, 2012
Non peer ...
Bisdikian, Chatschik   +3 more
core   +1 more source

Artificial Intelligence‐Assisted Workflow for Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling

open access: yesAdvanced Materials, EarlyView.
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll   +19 more
wiley   +1 more source

Software watermarking scheme with cloud computing constraints

open access: yes网络与信息安全学报, 2016
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN   +6 more
doaj   +3 more sources

JSBiRTH: Dynamic javascript birthmark based on the run-time heap [PDF]

open access: yes, 2011
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection.
Chan, PPF, Hui, LCK, Yiu, SM
core   +1 more source

Asymmetry of the Ferroelectric Phase Transition in BaTiO3

open access: yesAdvanced Materials, EarlyView.
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz   +14 more
wiley   +1 more source

The method of generation program code with indistinguishable functionality

open access: yesБезопасность информационных технологий, 2017
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj   +1 more source

Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering

open access: yesIEEE Access, 2020
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi   +4 more
doaj   +1 more source

Exploiting code mobility for dynamic binary obfuscation [PDF]

open access: yes, 2011
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools
Barberis, Davide   +4 more
core   +2 more sources

Textile Actuation Based on In‐Air Actuating Polypyrrole‐Based Tape Yarns for Wearable Soft Robotics: Toward On‐Body Applications

open access: yesAdvanced Robotics Research, EarlyView.
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe   +4 more
wiley   +1 more source

Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53

open access: yesAdvanced Science, EarlyView.
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore   +20 more
wiley   +1 more source

Home - About - Disclaimer - Privacy