• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 4
  • 1
  • Tagged with
  • 12
  • 9
  • 7
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Chinese Intellectual's Journey: Lin Shen's adaptation of Daoban Fushide (The Pirated Faust 1999)

Zhou, Lin January 2010 (has links)
This thesis has as its focus Daoban Fushide 盗版浮士德 (The Pirated Faust), a Chinese staging of Goethe’s Faust I and II, which premiered in Beijing in 1999. The research questions of the study are how the adaptation remains true and differs from Goethe’s original and how it addresses the expectations and cultural sensitivities of modern Chinese society. The first and second chapters provide a general context of the discussion. Chapter one reviews Faust reception in China, including the Chinese publication of Faust in translation, critical assessments of Faust by Chinese scholars, and theatre productions adapted from Goethe’s original. Chapter two outlines the history of Chinese theatre from the ancient rituals to traditional Chinese theatre as it survives in modern times. With the influence of western culture a new theatrical form, spoken drama, emerged in the early 20th century. The Pirated Faust is an example of modern Chinese experimental theatre. Chapter three, the main part of the study, provides a systematic analysis of this Chinese Faust adaptation from numerous perspectives, including an explanation and discussion of the title, storylines, a structural comparison to Goethe’s original, and an analysis of the adaptation’s use of language, themes, characters, and settings. My study demonstrates that this Chinese adaptation is a recodification of Goethe’s classic in the context of Chinese modern society, deeply rooted in Chinese cultural and historical background. However, it still maintains the thematic thrust of Goethe’s original. Another accomplishment of this study is a complete English translation of the Chinese text of the adaptation, the only in existence, which is appended to the thesis. It provides the opportunity for non-Chinese readers who have an interest in Faust in China and The Pirated Faust to do further research.
2

A Chinese Intellectual's Journey: Lin Shen's adaptation of Daoban Fushide (The Pirated Faust 1999)

Zhou, Lin January 2010 (has links)
This thesis has as its focus Daoban Fushide 盗版浮士德 (The Pirated Faust), a Chinese staging of Goethe’s Faust I and II, which premiered in Beijing in 1999. The research questions of the study are how the adaptation remains true and differs from Goethe’s original and how it addresses the expectations and cultural sensitivities of modern Chinese society. The first and second chapters provide a general context of the discussion. Chapter one reviews Faust reception in China, including the Chinese publication of Faust in translation, critical assessments of Faust by Chinese scholars, and theatre productions adapted from Goethe’s original. Chapter two outlines the history of Chinese theatre from the ancient rituals to traditional Chinese theatre as it survives in modern times. With the influence of western culture a new theatrical form, spoken drama, emerged in the early 20th century. The Pirated Faust is an example of modern Chinese experimental theatre. Chapter three, the main part of the study, provides a systematic analysis of this Chinese Faust adaptation from numerous perspectives, including an explanation and discussion of the title, storylines, a structural comparison to Goethe’s original, and an analysis of the adaptation’s use of language, themes, characters, and settings. My study demonstrates that this Chinese adaptation is a recodification of Goethe’s classic in the context of Chinese modern society, deeply rooted in Chinese cultural and historical background. However, it still maintains the thematic thrust of Goethe’s original. Another accomplishment of this study is a complete English translation of the Chinese text of the adaptation, the only in existence, which is appended to the thesis. It provides the opportunity for non-Chinese readers who have an interest in Faust in China and The Pirated Faust to do further research.
3

A robust anti-tampering scheme for software piracy protection. / 有效防止盜版軟件的防篡改解決方案 / You xiao fang zhi dao ban ruan jian de fang cuan gai jie jue fang an

January 2011 (has links)
Tsang, Hing Chung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (leaves 79-92). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Software Cracking --- p.2 / Chapter 1.3 --- Objectives --- p.4 / Chapter 1.4 --- Contributions --- p.5 / Chapter 1.5 --- Thesis Outline --- p.6 / Chapter 2 --- Related Work --- p.8 / Chapter 2.1 --- Hardware-based Protection --- p.8 / Chapter 2.2 --- Network-based Protection --- p.9 / Chapter 2.3 --- Software-based Protection --- p.11 / Chapter 2.3.1 --- Obfuscation --- p.11 / Chapter 2.3.2 --- Code Encryption --- p.13 / Chapter 2.3.3 --- Virtual Machine --- p.15 / Chapter 2.3.4 --- Self-checksumming --- p.16 / Chapter 2.3.5 --- Watermarking --- p.20 / Chapter 2.3.6 --- Self-modifying Code --- p.22 / Chapter 2.3.7 --- Software Aging --- p.23 / Chapter 3 --- Proposed Protection Scheme --- p.24 / Chapter 3.1 --- Introduction --- p.24 / Chapter 3.2 --- Protector --- p.27 / Chapter 3.2.1 --- A Traditional Protector Structure --- p.28 / Chapter 3.2.2 --- Protector Construction --- p.31 / Chapter "3,2.3" --- Protector Implementation - Version 1 --- p.32 / Chapter 3.2.4 --- Protector Implementation - Version 2 --- p.35 / Chapter 3.2.5 --- Tamper Responses --- p.37 / Chapter 3.3 --- Protection Tree --- p.39 / Chapter 3.4 --- Non-deterministic Execution of Functions --- p.43 / Chapter 3.4.1 --- Introduction to n-version Functions --- p.44 / Chapter 3.4.2 --- Probability Distributions --- p.45 / Chapter 3.4.3 --- Implementation Issues --- p.47 / Chapter 3.5 --- Desired Properties --- p.49 / Chapter 4 --- Cracking Complexity and Security Analysis --- p.52 / Chapter 4.1 --- Cracking Complexity --- p.52 / Chapter 4.2 --- Security Analysis --- p.55 / Chapter 4.2.1 --- Automation Attacks --- p.55 / Chapter 4.2.2 --- Control Flow Graph Analysis --- p.55 / Chapter 4.2.3 --- Cloning Attack --- p.56 / Chapter 4.2.4 --- Dynamic Tracing --- p.56 / Chapter 5 --- Experiments --- p.58 / Chapter 5.1 --- Execution Time Overhead --- p.59 / Chapter 5.2 --- Tamper Responses --- p.67 / Chapter 6 --- Conclusion and Future Work --- p.73 / Chapter 6.1 --- Conclusion --- p.73 / Chapter 6.2 --- Comparison --- p.75 / Chapter 6.3 --- Future Work --- p.77 / Bibliography --- p.79
4

Cultural conceptions of intellectual property: the pirated disc market in Xi'an, China.

January 2006 (has links)
West, Matthew Ellis. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 250-260). / Abstracts in English and Chinese. / Abstract (in English and Chinese) --- p.ii / Acknowledgments --- p.iv / Table of Contents --- p.vi / Chapter Chapter 1: --- Introduction ´ؤ China and Intellectual Property --- p.1 / Introduction / What is Intellectual Property? / Chenggong Music and Movies / Lost in Translation / Piracy / Copying / An Historical Perspective / "The Past, Sharing, and Censorship" / Methodology and Xi'an's Disc Market / Chapter Breakdown / Chapter Chapter 2: --- Literature Review 一 An Anthropological Approach to IP --- p.37 / The Anthropology of Property / Human Rights Discourses / Economic Pragmatism? / The Return of Power / Toward a Theory of IP / Metaphorical Framing / Stages of IP Advocacy / Local Contextualization / China: Global Pressure and Local Response / Chapter Chapter 3: --- Daoban as a Moral Business --- p.60 / The Commoditization of IP / Price is all that Matters! / Pricing Practices within Stores / Pricing Determinants / Moving Beyond Price and Quality / Consumer Fraud and Fakes: The Breakdown of Price and Quality / Competition and the Disc Business / Is it Zhengban or Daoban? / Doubting the Difference / Relative Morality: Guilt and Stealing / The Ambivalent Position of Chinese Retail Business / Conclusion: Passive Contestation and the Moral Sphere / Chapter Chapter 4: --- Daoban as an Illegal Commodity --- p.104 / Petty Economic Crime / "Cheating, Plagiarism, and Painting" / Petty Economic Illegality / Illegality in China's Context: The Government Connection / Backing (beijing) / Corruption / Structural Issues: Officials and Enforcement / Policing Norms / Norms of Copyright Enforcement / Social Consequences of Enforcement / Action Against Vendors / Action Against Pornography / Justifications and Responses / Conclusion: Daoban and Illegality / Chapter Chapter 5: --- Daoban and Intangible Property --- p.155 / What is Daoban? / Dowloading and the Law / Exceptions: Imported and Destroyed Titles / Blurring the Line: Tom and Jerry / Real or Fake / The Symbolic Importance of Zhengban / A Wider View? New Generations and Smalltime Creators / Conceptions of Intangible Property / The Centrality of Performance / The Nation / Conclusion: A Chinese Conception? / Chapter Chapter 6: --- "Conclusion ´ؤ Cultural Conceptions, Structures, and Agency" --- p.207 / "Structures, Agency, and Daoban" / Practice Theory: Structure and Agency / An Actor-Oriented Approach / Structures and Daoban / Creation / Commoditization / Passive Contestation / The Law as a Tool for Change / Final Thoughts / Bibliography --- p.238 / Appendix I: Chinese Characters Index --- p.248
5

Justifying defenses from the burglars: consumer psychology of pirated products. / Pirated products

January 2000 (has links)
Yeung Hoi Calvin. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 52-53). / Abstracts in English and Chinese, appendix in Chinese.
6

When piracy meets the Internet: the diverse film consumption of China in an unorthodox globalization.

January 2008 (has links)
Wu, Xiao. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 111-124). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Table of Contents --- p.v / Chapter Chapter One: --- Chinese Film Piracy Consumption and Media Globalization --- p.1 / Introduction: The Rampant Film Piracy in China --- p.1 / Literature Review --- p.4 / Focuses in Chinese Film Piracy --- p.4 / Four Theoretical Positions in Media Globalization --- p.7 / Summary --- p.17 / Chapter Chapter Two: --- Problematics of Chinese Film Piracy Consumption --- p.19 / Two Concepts --- p.19 / Diversity --- p.19 / Filmic Gene Pool --- p.20 / Two Arguments and One Deduction --- p.23 / The Argument for the Expanding Global Capital --- p.23 / The Argument for National Protectionism --- p.25 / The Long Tail --- p.26 / The Theoretical Deduction for the Chinese Case --- p.27 / Research Questions --- p.28 / Methodological Note --- p.28 / Chapter Chapter Three: --- A Re-Examination of Chinese Film Piracy Market --- p.32 / The Myth of Market Access --- p.32 / State Censorship Overlooked --- p.34 / The First-Release Obsession --- p.35 / An Internet Take-over? --- p.38 / Summary --- p.39 / Chapter Chapter Four: --- "In Search of the “Invisible"" Audience/Viewers" --- p.42 / The “Official´ح Audience --- p.42 / Chinese Film Audiences Re-Captured --- p.45 / Sketches on the ´بInvisible´ة Viewers --- p.51 / Conclusion --- p.56 / Chapter Chapter Five: --- Structural Analysis for Chinese Film Piracy Consumption --- p.58 / Chinese Piracy Viewers: An Idle Spare of the Nexus? --- p.58 / The Film Piracy Market in China --- p.61 / Summary --- p.63 / Chapter Chapter Six: --- A Brief History of Chinese Piracy Consumption --- p.67 / Video Hall (Mid-1980s to Mid-1990s) --- p.68 / Epoch of the Videodisc (Since mid-1990s) --- p.70 / Online Movie Forums and Blogs (1998-Present) --- p.73 / Online Social Networks of Cinephiles (2004-Present) --- p.76 / The Accompanying Print Media (1999-Present) --- p.78 / Conclusion --- p.82 / Chapter Chapter Seven: --- The Chinese Public Cine-Space --- p.83 / The Publicness of Piracy Viewing --- p.83 / A Public Cine-Space --- p.84 / Cultural Public Sphere: The Concept --- p.84 / The Chinese Internet --- p.85 / The Chinese Online Film Critics --- p.87 / The Chinese Public Cine-Space --- p.89 / A Trajectory of the Online Cine-Space --- p.90 / Mechanism towards Diversity --- p.93 / The Techno-Divide --- p.98 / Chapter Chapter Eight: --- Conclusion --- p.100 / Contributions --- p.100 / Historical Account of Chinese Film Piracy Consumption --- p.100 / Inclusive Model for Diversity of Cultural Market --- p.101 / Weaknesses and Future Suggestions --- p.103 / Final Remark --- p.106 / Appendix A --- p.108 / Bibliography --- p.111
7

The design and implementation of a prototype digital video watermarking scheme with dynamic traitor tracing

Salotto, Antony 12 1900 (has links)
Thesis (MEng)--Stellenbosch University, 2014. / ENGLISH ABSTRACT: We design and implement a prototype digital watermarking scheme that uses spread-transform dither modulation to embed hidden binary message signals into uncompressed digital video signals. The hidden messages are intended to identify the original recipient of a particular copy of a digital video, so that in the event that a pirate copy of that video is found, the recipient can be incriminated as a pirate. We test the ability of the watermark signal to survive various modifications to the watermarked video, including lossy compression, frame deletion, and amplitude scaling. We find that the scheme performs well when watermarked videos remain uncompressed, but the scheme is not sufficiently robust against lossy compression. We also implement a dynamic traitor tracing scheme based on the scheme of Fiat and Tassa, which is designed to identify a group of pirates who combine their watermarked videos in an attempt to defeat the watermarking scheme. We test the traitor tracing scheme in a simulated digitally watermarked video broadcast system where a pirate rebroadcast is monitored. We find that when the pirate rebroadcast is delayed, our traitor tracing scheme identifies and disconnects the pirates more quickly than the scheme of Fiat and Tassa. / AFRIKAANSE OPSOMMING: Ons ontwerp en implementeer ’n digitale watermerkskema-prototipe wat strektransform-bibbermodulasie gebruik om binêre boodskapseine in digitale videoseine te verskuil. Die doel van die versteekte boodskappe is om die oorspronklike ontvanger van ’n bepaalde digitale video-afskrif te identifiseer. Indien ’n onwettige afskrif van die video ontdek word, kan die oorspronklike ontvanger daarvoor verantwoordelik gehou word. Ons toets die vermoë van die watermerksein om verskeie veranderinge aan die gewatermerkte video te oorleef, byvoorbeeld kompressie, die verwydering van videorame, en amplitudeskalering. Die skema vaar goed in die afwesigheid van videokompressie, maar is nie robuus wanneer die video beduidend saamgepers word nie. Ons implementeer ook ’n dinamiese skema vir verraaier-opsporing, gebaseer op ’n tegniek deur Fiat en Tassa. Die doel van hierdie skema is om groepe gebruikers te identifiseer wat saamwerk om ’n watermerkskema te kul deur gewatermerkte videos te kombineer. Ons toets die verraaier-opsporingskema in ’n simulasie van ’n gewatermerkte video-uitsendingstelsel wat ’n roofuitsending monitor. Wanneer die roofuitsending vertraag is, vind ons dat die voorgestelde verraaier-opsporingskema die skuldige gebruikers vinniger uitwys as die skema van Fiat en Tassa.
8

Reproduction of copyrighted material for educational purposes

Malan, Karina 06 1900 (has links)
Law / LL.M.
9

Reproduction of copyrighted material for educational purposes

Malan, Karina 06 1900 (has links)
Law / LL.M.
10

Contemporary Pirates: An Examination of the Perceptions and Attitudes Toward the Technology, Progression, and Battles that Surround Modern Day Music Piracy in Colleges and Universities.

Latson, Christopher Craig 08 1900 (has links)
The pilot study used in this thesis examined the attitudes and perceptions of a small group of students at the University of North Texas. The participants in this pilot study (n=22) were administered an online music file sharing survey, a Defining Issues Test (DIT), and participated in a small focus group. This thesis also outlined the history and progression of online music piracy in the United States, and addressed four research questions which aimed to determine why individuals choose to engage in the file sharing of copyrighted music online.

Page generated in 0.0583 seconds