Academic literature on the topic 'Protection des IP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection des IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection des IP"

1

McKenna, Brian. "Smart IP protection." Infosecurity Today 1, no. 3 (May 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mujtaba, G., and М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries." Kutafin Law Review 11, no. 1 (April 10, 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.

Full text
Abstract:
This is a research study of available options of Intellectual Property (IP) protections for software in the present IP systems, in most of the countries including copyright and patent protection. Each type of IP protection has its own advantages and limitations like enablement of subject matter for registration requirements, scope of rights conferred and period of protection etc. The trends and demands of software industry for the grant of patents protection for Computer Implemented Inventions (CIIs) were also discussed. The present research paper discusses a best mode of technical disclosure, more than an algorithm, of software patents and additional recommendations are also given as a solution to the technical problem of a suitable IP protection for software. A sui generis IP protection was suggested as a best option for a composite IP protection covering all aspects of advanced software inventions.
APA, Harvard, Vancouver, ISO, and other styles
3

Metz, C. "IP protection and restoration." IEEE Internet Computing 4, no. 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion." Lecture Notes in Education Psychology and Public Media 24, no. 1 (November 20, 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.

Full text
Abstract:
This thesis aims to explore the intellectual property protection of virtual IP in the era of the digital economy and its jurisprudential discussion. With the continuous development of science and technology and the rise of the digital economy, virtual IP (virtual image and digital person) presents diverse connotations and expressions as an essential part of the digital economy. However, the intellectual property protection of virtual IP faces many dilemmas and challenges. This paper conducts an in-depth study on the protection of virtual IP through the legal perspective and puts forward some methods and strategies to crack the dilemma of virtual IP legal rights and interests. By improving the legal framework, clarifying the definition standard of virtual IP, and determining the scope of protected rights and interests of virtual IP, the legal protection of virtual IP can be effectively enhanced, and the legitimacy and stability of the property rights and interests of virtual IP can be maintained. This study has important theoretical and practical significance for promoting the development of the digital economy and protecting the intellectual property rights of virtual IP.
APA, Harvard, Vancouver, ISO, and other styles
5

CORREIA, N. S. C., and M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection." Fiber and Integrated Optics 24, no. 3-4 (May 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saha, Debasri, and Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection." VLSI Design 2011 (April 5, 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.

Full text
Abstract:
Increased design complexity, shrinking design cycle, and low cost—this three-dimensional demand mandates advent of system-on-chip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and summarization to focus on the inherent tradeoff, existing security holes, and new research directions. This paper discusses the IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries, categorizes these infringements, and applies strategic analysis on the effectiveness of the existing IPP techniques for these categories of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
APA, Harvard, Vancouver, ISO, and other styles
7

Newbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez, and W. T. Holman. "Watermarking ICs for IP protection." Electronics Letters 38, no. 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bolos, Mihaela Daciana. "IP Protection and International Trade." Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shi, Guanming, Carl Pray, and Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China." Agricultural and Resource Economics Review 41, no. 3 (December 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.

Full text
Abstract:
This paper examines Chinese pesticide firms’ use and perceptions of various means of intellectual property (IP) protection in protecting their innovations, using a unique dataset from 97 pesticide firms surveyed in 2008. These firms rate Chinese patents as quite effective in protecting their IP from infringement, although 70 percent of them state that improved enforcement is needed. Those firms that have been granted patents and those that claim their patents have been infringed upon both give lower ratings to the perceived effectiveness of patents. Trademarks are rated as less effective than patents, but firms that have had experience with patenting and infringement of patents tend to rate trademarks as more effective than those firms that do not have direct experience with the patent system. General government policies to encourage increased privatization, more private R&D, and higher education are associated with more faith in IP, but policies to strengthen IP by promoting mandatory IP training and the development of specialized IP divisions in the firms do not influence perceptions of IP effectiveness. We conclude that if the Chinese government wants to encourage innovation using IP protection, it must focus on improving the enforcement of patents.
APA, Harvard, Vancouver, ISO, and other styles
10

Correia, N. S. C., and M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection." Photonic Network Communications 10, no. 1 (July 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Protection des IP"

1

Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
APA, Harvard, Vancouver, ISO, and other styles
2

Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Full text
Abstract:
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs.
APA, Harvard, Vancouver, ISO, and other styles
3

Boni, Giacomo <1996&gt. "Legal Regulation and IP Rights Protection of Online games in China." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Full text
Abstract:
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the main companies and what trends are they following, regarding both hardware and software. In the latter part of the chapter, a brief confrontation of how said main countries view this industry from an IP (intellectual property) point of view. In the second one, the core, the author shifts the focus to the PRC, and researches the historic reasons for the current videogame publication regulation, from 2004 to 2018. Aiming to explain phenomenon such as the “console ban” and “licensing freeze” which deeply impacted the local industry. After this introduction the Author follows to analyze the main IP laws in china and their relevance to the videogaming market as well as providing example of how such law impact their economic environment. Finally, in the conclusion, the case study of the Digital Bros company is provided, analyzing the reasons and practices that allowed them successfully enter the Chinese videogame publishing market as well as some prediction for the future evolution of Chinese IP laws in the sector based on the content of the previous chapters .
APA, Harvard, Vancouver, ISO, and other styles
4

Buffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP." Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Full text
Abstract:
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection contre les erreurs adaptée au codage MPEG-4 Audio combinant une adaptation au débit, un entrelacement de paquets et une récupération d'erreurs s'appuyant sur la FEC a été développée. Pour l'adaptation de débit et la récupération d'erreur, les propriétés de granularité et de "scalabilité" du flux MPEG-4 Audio sont utilisées. Un mécanisme d'entrelacement s'adaptant au processus de perte est mis en oeuvre. La combinaison de ces mécanismes donne lieu à un protocole "TCP fiendly" pour transferer en temps réel des données MPEG-4 au-dessus d'IP. Il a été impléménté pour l" streaming unicast. La plupart des technique FEC indépendantes du codage sont des adaptations de la théorie générale du codage au cas particulier des erreurs de streaming. Les codes correcteurs tel que les codes Hamming ou les codes Reed-Solomon peuvent détecter et corriger une ou plusieurs erreurs apparaissant sporadiquement dans un canal. Mais dans le streaming Internet qui nous concerne, les erreurs ont déjà été détectées par les protocoles bas niveau, le seul problème est la correctio. C'est un problème bien plus facile que celui de la détection-correction et nous n'avons pas besoin d'utiliser la théorie des codes correcteurs pour y répondre. Une nouvelle méthode dédiée aux problèmes de streaming a été développée en utilisant la théorie des systèmes linéaires sur des corps ou des anneaux finis.
APA, Harvard, Vancouver, ISO, and other styles
5

Hallbäck, Erik. "Digital Rights Management on an IP-based set-top box." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Full text
Abstract:

Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.

This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.

APA, Harvard, Vancouver, ISO, and other styles
6

Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Full text
Abstract:
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provides mutual assurances for the end-user and the intellectual-property developer. Further, this work demonstrates the use of SAM in a secure video messaging device on top of a Virtex-II Pro development system
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
7

Colombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Full text
Abstract:
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettre au point un système complet d'activation à distance de composants virtuels, permettant au concepteur de savoir exactement combien de composants virtuels sont effectivement utilisés. Pour cela, les deux premières contributions de cette thèse portent sur la modification de la logique combinatoire d'un composant virtuel afin de le rendre activable. La première méthode permet de forcer les sorties à une valeur fixe de manière contrôlée. La seconde est une technique efficace de sélection de nœuds à altérer, encore une fois de manière contrôlée, afin de rendre le composant virtuel temporairement inutilisable. La troisième contribution de cette thèse est une méthode légère de correction d'erreurs à appliquer aux réponses issues des fonctions physiques non-clonables, qui constituent un identifiant intrinsèque des instances du composant virtuel. Réutilisant un protocole de correction d'erreurs issu de l'échange quantique de dés, cette méthode est beaucoup plus légère que les codes correcteurs d'erreurs classiquement utilisés pour cette application
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, Dian. "Scalable Video Transport over IP Networks." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Full text
Abstract:
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the available bandwidth and heterogeneous terminals. This work aims at improving the efficacy of scalable video transport over IP networks. In this work, we first propose an optimal interleaving scheme combined with motion-compensated fine granularity scalability video source coding and unequal loss protection schemes, under an imposed delay constraint. The network is modeled as a packet-loss channel with random delays. The motion compensation prediction, ULP allocation and the depth of the interleaver are jointly optimized based on the network status and the delay constraint. We then proceed to investigate the multiple path transport technique. A unified approach which incorporates adaptive motion compensation prediction, multiple description coding and unequal multiple path allocation, is proposed to improve both the robustness and error resilience property of the video coding and transmission system, while the delivered video quality is improved simultaneously. To analytically investigate the efficacy of error resilient transport schemes for progressively encoded sources, including unequal loss protection, best-effort and FEC transport schemes, we develop evaluation and optimization approaches for these transport schemes. In this part of the work, the network is modeled as an M/D/1/K queue, and then a comprehensive queueing analysis is provided. Armed with these results, the efficacy of these transport schemes for progressively encoded sources are investigated and compared.
APA, Harvard, Vancouver, ISO, and other styles
9

Müller, Karen E. "MPLS-based recovery." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
APA, Harvard, Vancouver, ISO, and other styles
10

Ekrt, Ondřej. "Trademark and Design Protection of Applied Art." Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Full text
Abstract:
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community designs.   Further, the scope of protection conferred by both instruments is analysed and evaluated and it should be determined which type of protection confers a wider protection on its owner. The thesis also aims to respond a question “which of the analysed intellectual property law instruments is more suitable and favourable for protecting an appearance of products.” Therefore, based on this thesis, users of trademarks and designs should be able to decide which of these two types of protection they should use in order to protect their products or products of their clients.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Protection des IP"

1

American Bar Association. Section of Intellectual Property Law, ed. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Editorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bossuet, Lilian, and Lionel Torres, eds. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

M, Hyland Mark LL, Carey Louise, and Law Society of Ireland, eds. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Meng, and David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Këllezi, Pranvera, Bruce Kilpatrick, and Pierre Kobel, eds. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mario, Pickavet, and Demeester Piet, eds. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4th ed. Upper Saddle River, NJ: Prentice Hall, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Protection des IP"

1

Gassmann, Oliver, Angela Beckenbauer, and Sascha Friesike. "The IP Protection Star." In Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, and Ramesh Karri. "Obfuscation for IP Protection." In Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty, and Ramesh Karri. "Watermarking for IP Protection." In Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Heim, Irina. "The Protection of IP." In Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jung, Edward, and Lilian Bossuet. "IP FSM Watermarking." In Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu, and J. Rajendran. "Analog IP Protection and Evaluation." In Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi, and Mark Tehranipoor. "IP Protection: A Historical View." In Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Torres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol, and Lilian Bossuet. "Digital Right Management for IP Protection." In Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cambou, Bertrand. "Enhancing Secure Elements—Technology and Architecture." In Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Colombier, Brice, Lilian Bossuet, and David Hély. "Turning Electronic Circuits Features into On-Chip Locks." In Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection des IP"

1

Dalpasso, Marcello, Alessandro Bogliolo, and Luca Benini. "Hardware/software IP protection." In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Su, Hui-Kai, Cheng-Shong Wu, and Yuan-Sun Chu. "IP Local Node Protection." In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cammarota, Rosario, Indranil Banerjee, and Ofer Rosenberg. "Machine learning IP protection." In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain, and Ning Zhang. "IP Protection in TinyML." In 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Qiang, and Haie Li. "A hierarchical IP protection approach for hard IP cores." In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale, and Mario Barbareschi. "Digital Right Management for IP Protection." In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu, and Patrick P. C. Lee. "Achieving Unified Protection for IP Routing." In 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, Steve, and Gordon W. Romney. "Protection methods against IP packet attacks." In the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kepa, Krzysztof, Fearghal Morgan, and Krzysztof Kosciuszkiewicz. "IP protection in Partially Reconfigurable FPGAs." In 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Collini, Luca, Benjamin Tan, Christian Pilato, and Ramesh Karri. "Reconfigurable Logic for Hardware IP Protection." In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protection des IP"

1

Hanlon, Walker, and Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, November 2019. http://dx.doi.org/10.3386/w26490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Minero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Full text
Abstract:
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern digital economy, data are being dubbed the ‘new oil’ and the sui generis right might be con- sidered a right to control any access to the database, thus having an undeniable relevance. Besides, there are still important inconsistences between IP Law and the GDPR, which must be removed by the European legislator. The genuine and free consent of the data subject for the use of his/her data must remain the first step of the legal analysis.
APA, Harvard, Vancouver, ISO, and other styles
3

De León, Ignacio L., and Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, September 2016. http://dx.doi.org/10.18235/0007023.

Full text
Abstract:
This document analyzes the perceptions of small innovative enterprises (SIE) in Latin America of the effectiveness of the legal protection afforded by intellectual property rights (IPR). To analyze the costs of using IPR, the study surveyed 352 SIEs from Chile, Colombia, Costa Rica, Ecuador, Mexico, and Peru. It found evidence that SIEs do not know how the IP system works, and that most SIEs consider that knowing how it works is not important for business performance. The study finds large differences among countries with respect to the need to hire legal services to apply for IPR. There are also differences in perceptions of the efficiency of the IP system, unrelated to the countries' IPR enforcement (Park, 2008). The study also finds differences in the perception of the disadvantage in protect their IPR when innovations are imitated by a large firm. This difference is related to the countries' IPR enforcement.
APA, Harvard, Vancouver, ISO, and other styles
4

The Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, September 2022. http://dx.doi.org/10.53892/gzum7792.

Full text
Abstract:
This report identifies possible pathways towards the integration of a rights-based approach in the legal conservation frameworks of Colombia and Peru. It does so in the context of tenure rights recognition for Indigenous Peoples (IP) and Afro-descendant Peoples (ADP) as an effective strategy for biodiversity protection in the Amazon. With this in mind, it highlights opportunities for implementing a rights-based approach within current and medium-term conservation frameworks and policies in both countries.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography