Login / Signup
Methods for preventing unauthorized software distribution.
Mohammad Peyravian
Allen Roginsky
Nevenko Zunic
Published in:
Comput. Secur. (2003)
Keyphrases
</>
significant improvement
empirical studies
data mining
information retrieval
machine learning methods
machine learning
genetic algorithm
image segmentation
computational cost
semi supervised
data mining techniques
third party
qualitative and quantitative