scholarly journals Call Tree Transformation for Program Obfuscation and Copy Protection

Author(s):  
Valery Pryamikov



2010 ◽  
Vol 206 ◽  
pp. 012037
Author(s):  
Sofiane Braci ◽  
Abdelkader Miraoui ◽  
Claude Delpha ◽  
Rémy Boyer
Keyword(s):  






2021 ◽  
Author(s):  
David M M. Schruth

This protocol provides a method to realize phylogenetic control in multivariate regression modeling while estimating tree transformation parameters en route. The protocol requires compiling a list of all possible variable combinations (at multiple model lengths) and iterating through these while estimating the transformation parameters along side the regression. A combination of AIC and the coefficient of determination can be used, for example, to select the "best" model from numerous possible model lengths. The average of the tree transformation parameters can then be used on these "best" models to perform the final phylogenetically controlled multivariate regression.



Author(s):  
Deok-Gyu Lee ◽  
Im-Yeong Lee ◽  
Jong-Keun Ahn ◽  
Yong-Hae Kong
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document