نتایج جستجو برای: drm

تعداد نتایج: 1511  

2003
Qiong Liu Reihaneh Safavi-Naini Nicholas Paul Sheppard

Transferring the traditional business model for selling digital goods linked to physical media to the online world leads to the need for a system to protect digital intellectual property. Digital Rights Management(DRM) is a system to protect high-value digital assets and control the distribution and usage of those digital assets. This paper presents a review of the current state of DRM, focusin...

2013
Alina Alb Lupaş

In the present paper we establish several strong differential subordinations regardind the extended new operator DRm λ defined by the Hadamard product of the extended generalized Sălăgean operator Dm λ and the extended Ruscheweyh derivative Rm, given by DRm λ : Anζ → Anζ , DRm λ f (z, ζ) = (Dm λ ∗Rm) f (z, ζ) , where Anζ = {f ∈ H(U × U), f(z, ζ) = z + an+1 (ζ) zn+1 + . . . , z ∈ U, ζ ∈ U} is th...

2010
Shane J. Macfarlan

The dual-role method (DRM) extracts subject preferences as two players in experimental economic games. Previous research indicates mixed effects of DRM on game performance. A two (role)-by-two (role order) design for the ultimatum game (UG) was implemented in a naturalistic setting across 2 years. Subjects played according to the role they were assigned (proposer or responder). Immediately afte...

2005
Leonardo Chiariglione

This article describes the work of the Digital Media Project (DMP) which is developing an industry-agnostic and scalable DRM standard that can at least reduce the most blatant impositions of DRM. As part of the effort, the DMP is also providing an Open Source Software implementation of the standard that can be exploited to accelerate the deployment of interoperable DRM solutions and to test how...

Journal: :Public health nutrition 2012
Niamh Rice Charles Normand

OBJECTIVE The present study aimed to establish the annual public expenditure arising from the health and social care of patients with diet-related malnutrition (DRM) in the Republic of Ireland. DESIGN Costs were calculated by (i) estimating the prevalence of DRM in health-care settings derived from age-standardised comparisons between available Irish data and large-scale UK surveys and (ii) a...

Journal: :The Journal of antimicrobial chemotherapy 2014
Cláudia P Muniz Marcelo A Soares André F Santos

OBJECTIVES Interpretation of drug resistance mutation (DRM) has been based solely on HIV-1 subtype B. Reverse transcriptase (RT) C-terminal domains have been disregarded in resistance interpretation, as their clinical relevance is still controversial. We determined the emergence of DRM in RT C-terminal domains of different HIV-1 subtypes, the genetic barrier for the acquisition of these DRM and...

2005
Bin B. Zhu Yang Yang Tierui Chen

We present a Digital Rights Management (DRM) system that supports what you see is what you pay. In our system, multimedia is compressed with a scalable codec and encrypted preserving the scalable granularity and multiaccess capability. This paper focuses on the DRM modules enabling efficient key generation and management. We employ a light license server which stores only the master keys of con...

Journal: :Developmental science 2007
Stephen A Dewhurst Rhian C Pursglove Charlie Lewis

False recognition in children aged 5, 8, and 11 years was investigated using the standard version of the Deese-Roediger-McDermott (DRM) procedure and an alternative version in which the DRM stimuli were embedded in stories designed to emphasize their overall theme. Relative to the 8- and 11-year-olds, the 5-year-olds falsely recognized fewer critical lures when the DRM stimuli were presented in...

Journal: :CoRR 2014
Ta Minh Thanh Munetoshi Iwakiri

In general, DRM (Digital Rights Management) system is responsible for the safe distribution of digital content, however, DRM system is achieved with individual function modules of cryptography, watermarking and so on. In this typical system flow, it has a problem that all original digital contents are temporarily disclosed with perfect condition via decryption process. In this paper, we propose...

2012
Jian Wang Zhiyong Zhang Fei Xiang Lili Zhang Qingli Chen

Terminals security vulnerabilities makes DRM researches to focus on trusted computing technology in recent years, however, no efficient and practical trusted authentication protocol is presented, especially with formal proof. To attest the integrity when access to the DRM server, the DRM client need perform mutual authentication and key agreement with the server first, and then use the sharing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید