Sciweavers

2250 search results - page 127 / 450
» Authorizing applications in singularity
Sort
View
ACMSE
2006
ACM
15 years 4 months ago
Some new approaches for preventing software tampering
In this paper, we propose several methods to increase the difficulty of reverse engineering applications, with special emphasis on preventing the circumvention of copy protection ...
Bin Fu, Golden G. Richard III, Yixin Chen
CSC
2008
14 years 11 months ago
The Dirichlet problem for the Laplace equation in a starlike domain
Many applications of Mathematical Physics and Engineering are connected with the Laplacian, however, the most part of BVP relevant to the Laplacian are solved in explicit form onl...
Diego Caratelli, Paolo Emilio Ricci
JMLR
2006
148views more  JMLR 2006»
14 years 10 months ago
Computational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis
Dimensionality reduction is an important pre-processing step in many applications. Linear discriminant analysis (LDA) is a classical statistical approach for supervised dimensiona...
Jieping Ye, Tao Xiong
OTM
2005
Springer
15 years 3 months ago
Balancing Flexibility and Security in Adaptive Process Management Systems
Abstract. Process–aware information systems (PAIS) must provide sufficient flexibility to their users to support a broad spectrum of application scenarios. As a response to thi...
Barbara Weber, Manfred Reichert, Werner Wild, Stef...
JUCS
2006
119views more  JUCS 2006»
14 years 10 months ago
Course Modeling for Student Profile Based Flexible Higher Education on the Internet
: Higher education courses are increasingly created as student organized collections of interrelated modules. At the same time, frequent change of subject matter and knowledge in i...
László Horváth, Imre J. Rudas