Popularity, Funding for Health-Effect Research and Cell-Phone Addiction
In: IEEE antennas & propagation magazine, Band 52, Heft 2, S. 164-166
ISSN: 1558-4143
161 Ergebnisse
Sortierung:
In: IEEE antennas & propagation magazine, Band 52, Heft 2, S. 164-166
ISSN: 1558-4143
In: IEEE antennas & propagation magazine, Band 52, Heft 1, S. 232-234
ISSN: 1558-4143
In: Progress in nuclear energy: the international review journal covering all aspects of nuclear energy, Band 51, Heft 2, S. 207-224
ISSN: 0149-1970
Software protection is of great interest to commercial industry. Millions of dollars and years of research are invested in the development of proprietary algorithms used in software programs. A reverse engineer that successfully reverses another company's proprietary algorithms can develop a competing product to market in less time and with less money. The threat is even greater in military applications where adversarial reversers can use reverse engineering on unprotected military software to compromise capabilities on the field or develop their own capabilities with significantly less resources. Thus, it is vital to protect software, especially the software's sensitive internal algorithms, from adversarial analysis. Software protection through obfuscation is a relatively new research initiative. The mathematical and security community have yet to agree upon a model to describe the problem let alone the metrics used to evaluate the practical solutions proposed by computer scientists. We propose evaluating solutions to obfuscation under the intent protection model, a combination of white-box and black-box protection to reflect how reverse engineers analyze programs using a combination white-box and black-box attacks. In addition, we explore use of experimental methods and metrics in analogous and more mature fields of study such as hardware circuits and cryptography. Finally, we implement a solution under the intent protection model that demonstrates application of the methods and evaluation using the metrics adapted from the aforementioned fields of study to reflect the unique challenges in a software-only software protection technique.
BASE
In: IEEE antennas & propagation magazine, Band 49, Heft 1, S. 212-214
ISSN: 1558-4143
In: Economics of education review, Band 22, Heft 2, S. 213-220
ISSN: 0272-7757
In: Contemporary economic policy: a journal of Western Economic Association International, Band 19, Heft 3, S. 360-368
ISSN: 1465-7287
The competition on foreign aid, as a means for securing foreign policy and other benefits by the donor, can lead to diplomatic rivalry. This article utilizes a game theoretic model to analyze the existing rivalry for foreign aid and international status between Taiwan and the People's Republic of China. Similar to the role of political contributions in the public choice theory, foreign aid is taken a means of international lobbying, to realize the donor's objective. Research results, based on the policy effect consideration, indicates that the equilibrium aid policy, which is endogenously determined, renders an inability on the part of the donors, which affects the recipient's optimal foreign policy. How does a donor obtain favorable outcomes when such rivalry exists? Strengthening diplomatic endeavors to realize the access effect has been proved an effective method. Analytical results have shown that this method not only complements aid rivalry but also increases the welfare of the donor.
In: Journal of international trade & economic development: an international and comparative review, Band 5, Heft 3, S. 319-339
ISSN: 1469-9559
Introduction: Reimagining Capitalism and Activism -- Profit, Purpose, and Progress -- Government Incorporated -- Corporate Rights, Money, and Activism -- Everything Is Your Business -- Restraining A President -- Original Sins -- Better Activism, Better Business -- The Perils of Corporate Social Activism -- The New Business of Change -- The Journey Forward -- Conclusion: We Are More Than.
In: Urbanization in Asia Series
In: Urbanization in Asia
Intro -- Contents -- Tables, Maps, and Figures -- Preface -- Acknowledgments -- 1 Introduction -- Part 1: National Context -- 2 The Operating System of Spatial Transformation -- 3 Maoist Plan-Ideological Space -- 4 Post-Mao Market-Regulatory Space -- Part 2: Development of the Pearl River Delta -- 5 Economic and Spatial Transformation -- 6 Rural Industrialization -- 7 Transport Development -- 8 Influence of Hong Kong -- 9 Conclusion -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z.
In: Routledge contemporary China series 40
In: 65 Boston College Law Review 833 (2024)
SSRN
In: Temple University Legal Studies Research Paper No. 2023-11
SSRN
SSRN
In: 68 Practical Lawyer 7 (August 2022)
SSRN