Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
The Necessity of Anti-Piracy and Anti-Monopoly in Software Industry
Jingfeng Meng,Xu Xiao
International Journal of Business and Management , 2009,
Abstract: The piracy and monopoly in the software industry is analyzed in this article which shows that they will ultimately endanger the national industry but not the foreign monopoly enterprises. The author considers that the low price of the pirated software and the internets monopoly form are the two reasons to form monopoly. Anti-pirate and anti-monopoly are both imperative ways to develop Chinese software industry. A general strategy regulation in the software industry elicited by this article is to strike piracy in the protected period, shorten moderately protection period of the software product and limit the monopoly manufacturers to some extent.
China’s Legal Enforcement on Anti-Piracy in South China Sea  [cached]
Yingying Deng
Asian Social Science , 2010, DOI: 10.5539/ass.v6n6p94
Abstract: The South China Sea is considered the most dangerous area for piracy in the world. China has a strong economic interest in South China Sea and Strait of Malacaa maritime security. In recent year, China has taken effective measures in combating piracy in the South China Sea. In order to build the legislation and law-enforcement on anti-piracy, the author put forward some suggestion.
The Anti-Piracy Measure Using Encryption of Embedded Products May Mitigate the Security Strength  [PDF]
Zhenglin Liu, Zhilong Xiong, Rui Zhang, Xin Zhan
Communications and Network (CN) , 2013, DOI: 10.4236/cn.2013.53B2079

In this paper, firstly we describe the piracy problem of embedded products. Then we formulate the security features of anti-piracy embedded products. Finally we prove that the anti-piracy measure using encryption of embedded products may mitigate the security strength.

CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks  [PDF]
Zhiqiang Ruan,Xingming Sun,Wei Liang,Decai Sun
Information Technology Journal , 2010,
Abstract: In this study, we focus on design efficient security techniques to maximize chances of data survival in wireless sensor networks, which involve disconnected or unattended operation with periodic visited by the sink, we refer to such networks as UWSNs. Data security in such UWSNs poses a number of challenges when applied in security-sensitive environments. First, sensors must accumulate data for a long time until it can be off loaded to a periodic sink. The adversary has lots of time to mount various attacks that aim to learn, erase, or modify potentially valuable data collected and held by sensors. Second, there is no ever-present sink, thus real time detection dose not help and the adversary can reach its goal and remain undetected. To address these security problems, we present CADS, a novel Co-operative and Anti-fraud Data Storage scheme for UWSNs by integrating the techniques of secret sharing and Discrete Logarithm Problem (DLP). We first propose a share generation and distributed scheme to achieve reliable and fault-tolerant initial data storage by providing redundancy for original data components, we then utilize discrete logarithm problem to ensure the integrity of the distributed data shares. The proposed scheme enables individual sensors to verify all the related data shares simultaneously in the absence of the original data in each round. Security analysis and simulations show that the proposed scheme has resistance against node capture attacks and outperforms existing security scheme in terms of data survival quantity and false negative probability.
Storage of classical information in quantum spins  [PDF]
F. Delgado,J. Fernández-Rossier
Physics , 2011, DOI: 10.1103/PhysRevLett.108.196602
Abstract: Digital magnetic recording is based on the storage of a bit of information in the orientation of a magnetic system with two stable ground states. Here we address two fundamental problems that arise when this is done on a quantized spin: quantum spin tunneling and back-action of the readout process. We show that fundamental differences exist between integer and semi-integer spins when it comes to both, read and record classical information in a quantized spin. Our findings imply fundamental limits to the miniaturization of magnetic bits and are relevant to recent experiments where spin polarized scanning tunneling microscope reads and records a classical bit in the spin orientation of a single magnetic atom.
The Moselle piracy: new chronological data from U/Th dating of speleothems
Speleogenesis and Evolution of Karst Aquifers , 2003,
Abstract: The Moselle piracy is one of the most important changes of the hydrographic network in Lorraine (France). For a long time, this phenomenon has been presumed to be relatively recent (at the end of the Middle Pleistocene) because of the well-preserved fluvial morphologies and deposits. With new relations between the surficial and subterranean data in the piracy area, the capture has been dated from 300ka using U/Th method on speleothem. This evaluation reveals an earlier time for the phenomenon, and is more precise than those proposed up to now. The latter were derived from the North-European glacial chronology and one thermoluminescence date obtained in the downstream valley of Meuse. In fact, the improvements in absolute dating, thanks to different methods and U/Th in particular, lead geomorphologists to abandon the simple relation between the glacial-interglacial periods and the accumulation-erosion processes in rivers.
Observation of Anti-correlation of Classical Chaotic Light  [PDF]
Hui Chen,Sanjit Karmakar,Zhenda Xie,Yanhua Shih
Physics , 2009,
Abstract: We wish to report an experimental observation of anti-correlation from first-order incoherent classical chaotic light. We explain why the classical statistical theory does not apply and provide a quantum interpretation. In quantum theory, either correlation or anti-correlation is a two-photon interference phenomenon, which involves the superposition of two-photon amplitudes, a nonclassical entity corresponding to different yet indistinguishable alternative ways of producing a joint-photodetection event.
Classical signal viewpoint to bunching and anti-bunching  [PDF]
Andrei Khrennikov
Physics , 2011,
Abstract: The similarity between classical wave mechanics and quantum mechanics (QM) played an important role in the development of QM (starting with works of De Broglie, Schr\"odinger, "late Einstein", Lamb, Lande, Mandel, Marshall, Santos, Boyer, and many others). We present a new wave-type approach, so called prequantum classical statistical field theory (PCSFT). PCSFT explores an analogy between some quantum phenomena and classical theory of random fields. Quantum systems are interpreted as symbolic representations of such fields (not only for photons, cf. Lande and Lamb, but even for massive particles). All quantum averages and correlations (including composite systems in entangled states) can be represented as averages and correlations for classical random fields. In this paper PCSFT is used to provide a classical signal representation of bunching and anti-bunching. At least the latter is typically considered as essentially quantum (nonclassical) phenomenon.
A quantum BRST anti-BRST approach to classical integrable systems  [PDF]
Michael Chesterman,Marcelo B. Silka
Physics , 2003, DOI: 10.1142/S0217732304013611
Abstract: We reformulate the conditions of Liouville integrability in the language of Gozzi et al.'s quantum BRST anti-BRST description of classical mechanics. The Das-Okubo geometrical Lax equation is particularly suited to this approach. We find that the Lax pair and inverse scattering wavefunction appear naturally in certain sectors of the quantum theory.
Research on Quality Selection and Anti-Piracy Policy of Vendors under Network Externalities  [PDF]
Hui Jiang
Journal of Human Resource and Sustainability Studies (JHRSS) , 2019, DOI: 10.4236/jhrss.2019.71002
Abstract: In view of the existence of pirated products in the market, this paper studies the pirate manufacturers, genuine manufacturers and consumer game models, and discusses the impact of the existence of pirate manufacturers on the quality selection of genuine manufacturers under the condition of network externalities. The study found that network externality enhancement will enable genuine manufacturers to improve product quality to bring more utility to consumers. Under certain conditions, the level of counterfeiting of pirated manufacturers is the key to whether a genuine manufacturer chooses a regulatory policy; when the level of counterfeiting is low, the role of the market mechanism itself can effectively protect legitimate manufacturers, and when the level of counterfeiting is high, the adjustment of the market mechanism is not enough to protect the genuine manufacturers. At this time, the genuine manufacturers will implement the policy of combating piracy to protect the genuine.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.