Auswahl der wissenschaftlichen Literatur zum Thema „Protection des IP“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Protection des IP" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Protection des IP"

1

McKenna, Brian. „Smart IP protection“. Infosecurity Today 1, Nr. 3 (Mai 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mujtaba, G., und М. Zia-Ul-Haq. „The Disclosure Requirements of Software Patents: Suggestions for Developing Countries“. Kutafin Law Review 11, Nr. 1 (10.04.2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.

Der volle Inhalt der Quelle
Annotation:
This is a research study of available options of Intellectual Property (IP) protections for software in the present IP systems, in most of the countries including copyright and patent protection. Each type of IP protection has its own advantages and limitations like enablement of subject matter for registration requirements, scope of rights conferred and period of protection etc. The trends and demands of software industry for the grant of patents protection for Computer Implemented Inventions (CIIs) were also discussed. The present research paper discusses a best mode of technical disclosure, more than an algorithm, of software patents and additional recommendations are also given as a solution to the technical problem of a suitable IP protection for software. A sui generis IP protection was suggested as a best option for a composite IP protection covering all aspects of advanced software inventions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Metz, C. „IP protection and restoration“. IEEE Internet Computing 4, Nr. 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Shi, Dengke. „Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion“. Lecture Notes in Education Psychology and Public Media 24, Nr. 1 (20.11.2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.

Der volle Inhalt der Quelle
Annotation:
This thesis aims to explore the intellectual property protection of virtual IP in the era of the digital economy and its jurisprudential discussion. With the continuous development of science and technology and the rise of the digital economy, virtual IP (virtual image and digital person) presents diverse connotations and expressions as an essential part of the digital economy. However, the intellectual property protection of virtual IP faces many dilemmas and challenges. This paper conducts an in-depth study on the protection of virtual IP through the legal perspective and puts forward some methods and strategies to crack the dilemma of virtual IP legal rights and interests. By improving the legal framework, clarifying the definition standard of virtual IP, and determining the scope of protected rights and interests of virtual IP, the legal protection of virtual IP can be effectively enhanced, and the legitimacy and stability of the property rights and interests of virtual IP can be maintained. This study has important theoretical and practical significance for promoting the development of the digital economy and protecting the intellectual property rights of virtual IP.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

CORREIA, N. S. C., und M. C. R. MEDEIROS. „Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection“. Fiber and Integrated Optics 24, Nr. 3-4 (Mai 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Saha, Debasri, und Susmita Sur-Kolay. „SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection“. VLSI Design 2011 (05.04.2011): 1–10. http://dx.doi.org/10.1155/2011/731957.

Der volle Inhalt der Quelle
Annotation:
Increased design complexity, shrinking design cycle, and low cost—this three-dimensional demand mandates advent of system-on-chip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and summarization to focus on the inherent tradeoff, existing security holes, and new research directions. This paper discusses the IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries, categorizes these infringements, and applies strategic analysis on the effectiveness of the existing IPP techniques for these categories of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Newbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez und W. T. Holman. „Watermarking ICs for IP protection“. Electronics Letters 38, Nr. 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Bolos, Mihaela Daciana. „IP Protection and International Trade“. Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shi, Guanming, Carl Pray und Wenhui Zhang. „Effectiveness of Intellectual Property Protection: Survey Evidence from China“. Agricultural and Resource Economics Review 41, Nr. 3 (Dezember 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.

Der volle Inhalt der Quelle
Annotation:
This paper examines Chinese pesticide firms’ use and perceptions of various means of intellectual property (IP) protection in protecting their innovations, using a unique dataset from 97 pesticide firms surveyed in 2008. These firms rate Chinese patents as quite effective in protecting their IP from infringement, although 70 percent of them state that improved enforcement is needed. Those firms that have been granted patents and those that claim their patents have been infringed upon both give lower ratings to the perceived effectiveness of patents. Trademarks are rated as less effective than patents, but firms that have had experience with patenting and infringement of patents tend to rate trademarks as more effective than those firms that do not have direct experience with the patent system. General government policies to encourage increased privatization, more private R&D, and higher education are associated with more faith in IP, but policies to strengthen IP by promoting mandatory IP training and the development of specialized IP divisions in the firms do not influence perceptions of IP effectiveness. We conclude that if the Chinese government wants to encourage innovation using IP protection, it must focus on improving the enforcement of patents.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Correia, N. S. C., und M. C. R. Medeiros. „On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection“. Photonic Network Communications 10, Nr. 1 (Juli 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Protection des IP"

1

Marolia, Pratik M. „Watermarking FPGA bitstream for IP protection“. Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Der volle Inhalt der Quelle
Annotation:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Lubasi, Mampi Nakutoma. „Real-time bandwidth encapsulation for IP/MPLS Protection Switching“. Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Der volle Inhalt der Quelle
Annotation:
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Boni, Giacomo <1996&gt. „Legal Regulation and IP Rights Protection of Online games in China“. Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Der volle Inhalt der Quelle
Annotation:
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the main companies and what trends are they following, regarding both hardware and software. In the latter part of the chapter, a brief confrontation of how said main countries view this industry from an IP (intellectual property) point of view. In the second one, the core, the author shifts the focus to the PRC, and researches the historic reasons for the current videogame publication regulation, from 2004 to 2018. Aiming to explain phenomenon such as the “console ban” and “licensing freeze” which deeply impacted the local industry. After this introduction the Author follows to analyze the main IP laws in china and their relevance to the videogaming market as well as providing example of how such law impact their economic environment. Finally, in the conclusion, the case study of the Digital Bros company is provided, analyzing the reasons and practices that allowed them successfully enter the Chinese videogame publishing market as well as some prediction for the future evolution of Chinese IP laws in the sector based on the content of the previous chapters .
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Buffet, Julien. „Techniques de protection contre les erreurs pour le streaming audio sur IP“. Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Der volle Inhalt der Quelle
Annotation:
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection contre les erreurs adaptée au codage MPEG-4 Audio combinant une adaptation au débit, un entrelacement de paquets et une récupération d'erreurs s'appuyant sur la FEC a été développée. Pour l'adaptation de débit et la récupération d'erreur, les propriétés de granularité et de "scalabilité" du flux MPEG-4 Audio sont utilisées. Un mécanisme d'entrelacement s'adaptant au processus de perte est mis en oeuvre. La combinaison de ces mécanismes donne lieu à un protocole "TCP fiendly" pour transferer en temps réel des données MPEG-4 au-dessus d'IP. Il a été impléménté pour l" streaming unicast. La plupart des technique FEC indépendantes du codage sont des adaptations de la théorie générale du codage au cas particulier des erreurs de streaming. Les codes correcteurs tel que les codes Hamming ou les codes Reed-Solomon peuvent détecter et corriger une ou plusieurs erreurs apparaissant sporadiquement dans un canal. Mais dans le streaming Internet qui nous concerne, les erreurs ont déjà été détectées par les protocoles bas niveau, le seul problème est la correctio. C'est un problème bien plus facile que celui de la détection-correction et nous n'avons pas besoin d'utiliser la théorie des codes correcteurs pour y répondre. Une nouvelle méthode dédiée aux problèmes de streaming a été développée en utilisant la théorie des systèmes linéaires sur des corps ou des anneaux finis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Hallbäck, Erik. „Digital Rights Management on an IP-based set-top box“. Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Der volle Inhalt der Quelle
Annotation:

Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.

This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Simpson, Eric. „Runtime Intellectual Property Protection on Programmable Platforms“. Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Der volle Inhalt der Quelle
Annotation:
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provides mutual assurances for the end-user and the intellectual-property developer. Further, this work demonstrates the use of SAM in a secure video messaging device on top of a Virtex-II Pro development system
Master of Science
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Colombier, Brice. „Methods for protecting intellectual property of IP cores designers“. Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Der volle Inhalt der Quelle
Annotation:
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettre au point un système complet d'activation à distance de composants virtuels, permettant au concepteur de savoir exactement combien de composants virtuels sont effectivement utilisés. Pour cela, les deux premières contributions de cette thèse portent sur la modification de la logique combinatoire d'un composant virtuel afin de le rendre activable. La première méthode permet de forcer les sorties à une valeur fixe de manière contrôlée. La seconde est une technique efficace de sélection de nœuds à altérer, encore une fois de manière contrôlée, afin de rendre le composant virtuel temporairement inutilisable. La troisième contribution de cette thèse est une méthode légère de correction d'erreurs à appliquer aux réponses issues des fonctions physiques non-clonables, qui constituent un identifiant intrinsèque des instances du composant virtuel. Réutilisant un protocole de correction d'erreurs issu de l'échange quantique de dés, cette méthode est beaucoup plus légère que les codes correcteurs d'erreurs classiquement utilisés pour cette application
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Fan, Dian. „Scalable Video Transport over IP Networks“. Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Der volle Inhalt der Quelle
Annotation:
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the available bandwidth and heterogeneous terminals. This work aims at improving the efficacy of scalable video transport over IP networks. In this work, we first propose an optimal interleaving scheme combined with motion-compensated fine granularity scalability video source coding and unequal loss protection schemes, under an imposed delay constraint. The network is modeled as a packet-loss channel with random delays. The motion compensation prediction, ULP allocation and the depth of the interleaver are jointly optimized based on the network status and the delay constraint. We then proceed to investigate the multiple path transport technique. A unified approach which incorporates adaptive motion compensation prediction, multiple description coding and unequal multiple path allocation, is proposed to improve both the robustness and error resilience property of the video coding and transmission system, while the delivered video quality is improved simultaneously. To analytically investigate the efficacy of error resilient transport schemes for progressively encoded sources, including unequal loss protection, best-effort and FEC transport schemes, we develop evaluation and optimization approaches for these transport schemes. In this part of the work, the network is modeled as an M/D/1/K queue, and then a comprehensive queueing analysis is provided. Armed with these results, the efficacy of these transport schemes for progressively encoded sources are investigated and compared.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Müller, Karen E. „MPLS-based recovery“. Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Der volle Inhalt der Quelle
Annotation:
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Ekrt, Ondřej. „Trademark and Design Protection of Applied Art“. Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Der volle Inhalt der Quelle
Annotation:
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community designs.   Further, the scope of protection conferred by both instruments is analysed and evaluated and it should be determined which type of protection confers a wider protection on its owner. The thesis also aims to respond a question “which of the analysed intellectual property law instruments is more suitable and favourable for protecting an appearance of products.” Therefore, based on this thesis, users of trademarks and designs should be able to decide which of these two types of protection they should use in order to protect their products or products of their clients.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Protection des IP"

1

American Bar Association. Section of Intellectual Property Law, Hrsg. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Editorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bossuet, Lilian, und Lionel Torres, Hrsg. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

M, Hyland Mark LL, Carey Louise und Law Society of Ireland, Hrsg. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Li, Meng, und David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Vasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Këllezi, Pranvera, Bruce Kilpatrick und Pierre Kobel, Hrsg. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mario, Pickavet, und Demeester Piet, Hrsg. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Wolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4. Aufl. Upper Saddle River, NJ: Prentice Hall, 2008.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Zeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Protection des IP"

1

Gassmann, Oliver, Angela Beckenbauer und Sascha Friesike. „The IP Protection Star“. In Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty und Ramesh Karri. „Obfuscation for IP Protection“. In Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty und Ramesh Karri. „Watermarking for IP Protection“. In Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Heim, Irina. „The Protection of IP“. In Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Jung, Edward, und Lilian Bossuet. „IP FSM Watermarking“. In Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Jayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu und J. Rajendran. „Analog IP Protection and Evaluation“. In Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Zamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi und Mark Tehranipoor. „IP Protection: A Historical View“. In Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Torres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol und Lilian Bossuet. „Digital Right Management for IP Protection“. In Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Cambou, Bertrand. „Enhancing Secure Elements—Technology and Architecture“. In Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Colombier, Brice, Lilian Bossuet und David Hély. „Turning Electronic Circuits Features into On-Chip Locks“. In Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Protection des IP"

1

Dalpasso, Marcello, Alessandro Bogliolo und Luca Benini. „Hardware/software IP protection“. In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Su, Hui-Kai, Cheng-Shong Wu und Yuan-Sun Chu. „IP Local Node Protection“. In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Cammarota, Rosario, Indranil Banerjee und Ofer Rosenberg. „Machine learning IP protection“. In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain und Ning Zhang. „IP Protection in TinyML“. In 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Liu, Qiang, und Haie Li. „A hierarchical IP protection approach for hard IP cores“. In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Rampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale und Mario Barbareschi. „Digital Right Management for IP Protection“. In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Li, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu und Patrick P. C. Lee. „Achieving Unified Protection for IP Routing“. In 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Wood, Steve, und Gordon W. Romney. „Protection methods against IP packet attacks“. In the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kepa, Krzysztof, Fearghal Morgan und Krzysztof Kosciuszkiewicz. „IP protection in Partially Reconfigurable FPGAs“. In 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Collini, Luca, Benjamin Tan, Christian Pilato und Ramesh Karri. „Reconfigurable Logic for Hardware IP Protection“. In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Protection des IP"

1

Hanlon, Walker, und Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, November 2019. http://dx.doi.org/10.3386/w26490.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Minero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Der volle Inhalt der Quelle
Annotation:
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern digital economy, data are being dubbed the ‘new oil’ and the sui generis right might be con- sidered a right to control any access to the database, thus having an undeniable relevance. Besides, there are still important inconsistences between IP Law and the GDPR, which must be removed by the European legislator. The genuine and free consent of the data subject for the use of his/her data must remain the first step of the legal analysis.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

De León, Ignacio L., und Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, September 2016. http://dx.doi.org/10.18235/0007023.

Der volle Inhalt der Quelle
Annotation:
This document analyzes the perceptions of small innovative enterprises (SIE) in Latin America of the effectiveness of the legal protection afforded by intellectual property rights (IPR). To analyze the costs of using IPR, the study surveyed 352 SIEs from Chile, Colombia, Costa Rica, Ecuador, Mexico, and Peru. It found evidence that SIEs do not know how the IP system works, and that most SIEs consider that knowing how it works is not important for business performance. The study finds large differences among countries with respect to the need to hire legal services to apply for IPR. There are also differences in perceptions of the efficiency of the IP system, unrelated to the countries' IPR enforcement (Park, 2008). The study also finds differences in the perception of the disadvantage in protect their IPR when innovations are imitated by a large firm. This difference is related to the countries' IPR enforcement.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

The Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, September 2022. http://dx.doi.org/10.53892/gzum7792.

Der volle Inhalt der Quelle
Annotation:
This report identifies possible pathways towards the integration of a rights-based approach in the legal conservation frameworks of Colombia and Peru. It does so in the context of tenure rights recognition for Indigenous Peoples (IP) and Afro-descendant Peoples (ADP) as an effective strategy for biodiversity protection in the Amazon. With this in mind, it highlights opportunities for implementing a rights-based approach within current and medium-term conservation frameworks and policies in both countries.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie