Results 61 to 70 of about 21,953 (219)

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

DeepAPT: Nation-State APT Attribution Using End-to-End Deep Neural Networks

open access: yes, 2017
In recent years numerous advanced malware, aka advanced persistent threats (APT) are allegedly developed by nation-states. The task of attributing an APT to a specific nation-state is extremely challenging for several reasons.
E Stamatatos   +6 more
core   +1 more source

The Role of Actual and Purported Origin in e‐Commerce Wine Pricing: Evidence From Italian and French Names on Labels

open access: yesAgribusiness, EarlyView.
ABSTRACT The origin of a product, if associated with good quality, can contribute to building a positive collective reputation, leading to a potential price premium. However, it is conceivable that a producer markets a product by evoking symbols, images, words, and values typical of places other than where it was designed or produced, creating a ...
Annalisa Caloffi   +2 more
wiley   +1 more source

Toward Efficient Deobfuscation via Large Language Models

open access: yesIEEE Access
Obfuscation modifies code structure to impede reverse engineering and is widely used to protect intellectual property and evade malware detection. However, existing deobfuscation techniques largely rely on analyst-driven heuristics or are tailored to ...
Byunggeon Choi   +3 more
doaj   +1 more source

The Geography of Success: A Spatial Analysis of Export Intensity in the Italian Wine Industry

open access: yesAgribusiness, EarlyView.
ABSTRACT This paper investigates the paradox of how Italy's fragmented, SME‐dominated wine industry achieves global export success. Moving beyond purely firm‐centric explanations, we test whether export intensity is spatially dependent, clustering geographically in regional ecosystems.
Nicolas Depetris Chauvin, Jonas Di Vita
wiley   +1 more source

Pencegah Pembajakan Perangkat Lunak Dengan Menggunakan Teknik Identity-Based Encryption Dan Obfuscation [PDF]

open access: yes, 2009
Serangan-serangan terhadap proteksi hak cipta tentunya sangat merugikan pihak produsen yang telah susah payah membangun perangkat lunak ciptaannya. Teknik obfuscation dapat digunakan untuk melindungi isi perangkat lunak dari pesaing atau penyerang yang ...
Wardiana, W. (Wawan)
core  

Towards code obfuscation through video game crowd sourcing

open access: yes, 2014
Code obfuscation is used to prevent software piracy as well as to avoid reverse engineering of malicious software (malware). From the perspective of malware authors, unique approaches to obfuscate code are beneficial to avoid detection. There have been instances where malware authors have leveraged the support of unsuspecting humans for malicious ...
openaire   +2 more sources

VAE+DDPG: An Attention‐Enhanced Variational Autoencoder for Deep Reinforcement Learning‐Based Autonomous Navigation in Low‐Light Environments

open access: yesAdvanced Intelligent Systems, EarlyView.
Variational Autoencoder+Deep Deterministic Policy Gradient addresses low‐light failures of infrared depth sensing for indoor robot navigation. Stage 1 pretrains an attention‐enhanced Variational Autoencoder (Convolutional Block Attention Module+Feature Pyramid Network) to map dark depth frames to a well‐lit reconstruction, yielding a 128‐D latent code ...
Uiseok Lee   +7 more
wiley   +1 more source

OBSCURE: Versatile Software Obfuscation from a Lightweight Secure Element

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Software obfuscation is a powerful tool to protect the intellectual property or secret keys inside programs. Strong software obfuscation is crucial in the context of untrusted execution environments (e.g., subject to malware infection) or to face ...
Darius Mercadier   +3 more
doaj   +1 more source

Assessing the viability of genebanked seeds from rare, wild plants native to the United States using the D.E.A.D. paradigm

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Genebanks must maintain viable seeds for decades. Seeds that germinate are clearly alive, but some seeds, often from wild populations, do not germinate because they are dormant, empty, aged, or damaged (D.E.A.D.). This work evaluates the effects of D.E.A.D.
Christina Walters   +33 more
wiley   +1 more source

Home - About - Disclaimer - Privacy