Results 41 to 50 of about 19,819 (285)
Trust and obfuscation principles for quality of information in emerging pervasive environments [PDF]
Non peer ...
Bisdikian, Chatschik +3 more
core +1 more source
AI‐Assisted Workflow for (Scanning) Transmission Electron Microscopy: From Data Analysis Automation to Materials Knowledge Unveiling. Abstract (Scanning) transmission electron microscopy ((S)TEM) has significantly advanced materials science but faces challenges in correlating precise atomic structure information with the functional properties of ...
Marc Botifoll +19 more
wiley +1 more source
Software watermarking scheme with cloud computing constraints
A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the ...
Guang SUN +6 more
doaj +3 more sources
JSBiRTH: Dynamic javascript birthmark based on the run-time heap [PDF]
JavaScript is currently the dominating client-side scripting language in the web community. However, the source code of JavaScript can be easily copied through a browser. The intellectual property right of the developers lacks protection.
Chan, PPF, Hui, LCK, Yiu, SM
core +1 more source
Asymmetry of the Ferroelectric Phase Transition in BaTiO3
Phase transitions are typically assumed to behave identically in forward and reverse. This work shows that in the ferroelectric material barium titanate this is not true: heating drives an abrupt, first‐order jump, while cooling gives a smooth, continuous change.
Asaf Hershkovitz +14 more
wiley +1 more source
The method of generation program code with indistinguishable functionality
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input.
Mikhail Andreevich Styugin
doaj +1 more source
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
In this research, a new Hybrid Obfuscation Technique was proposed to prevent prohibited Reverse Engineering. The proposed hybrid technique contains three approaches; first approach is string encryption.
Asma'a Mahfoud Hezam Al-Hakimi +4 more
doaj +1 more source
Exploiting code mobility for dynamic binary obfuscation [PDF]
Software protection aims at protecting the integrity of software applications deployed on un-trusted hosts and being subject to illegal analysis. Within an un-trusted environment a possibly malicious user has complete access to system resources and tools
Barberis, Davide +4 more
core +2 more sources
This work reports on the actuation behavior of CP‐based polypyrrole/PVdF TYs soaked in electrolyte/ionic liquids and woven actuators where such TYs are integrated. These studies are important toward the creation of on‐body applications such as wearable soft robotics, where textiles offer many advantages such as increased force, integrated electrical ...
Carin Backe +4 more
wiley +1 more source
Endocytic Control of Cell‐Autonomous and Non‐Cell‐Autonomous Functions of p53
NUMB Ex3‐containing isoforms localize to the plasma membrane, where they recruit p53 through SNX9 and direct it to multivesicular bodies and exosomes. Exported p53 is taken up by neighboring cells and activates nuclear programs, revealing an intercellular, exosome‐based pathway that might help establish a tumor‐suppressive microenvironment.
Roberta Cacciatore +20 more
wiley +1 more source

