Journal articles on the topic 'Protection des IP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Protection des IP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
McKenna, Brian. "Smart IP protection." Infosecurity Today 1, no. 3 (May 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.
Full textMujtaba, G., and М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries." Kutafin Law Review 11, no. 1 (April 10, 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.
Full textMetz, C. "IP protection and restoration." IEEE Internet Computing 4, no. 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.
Full textShi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion." Lecture Notes in Education Psychology and Public Media 24, no. 1 (November 20, 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.
Full textCORREIA, N. S. C., and M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection." Fiber and Integrated Optics 24, no. 3-4 (May 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.
Full textSaha, Debasri, and Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection." VLSI Design 2011 (April 5, 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.
Full textNewbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez, and W. T. Holman. "Watermarking ICs for IP protection." Electronics Letters 38, no. 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.
Full textBolos, Mihaela Daciana. "IP Protection and International Trade." Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.
Full textShi, Guanming, Carl Pray, and Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China." Agricultural and Resource Economics Review 41, no. 3 (December 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.
Full textCorreia, N. S. C., and M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection." Photonic Network Communications 10, no. 1 (July 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.
Full textJecker, Nancy S., and Caesar A. Atuire. "What’s yours is ours: waiving intellectual property protections for COVID-19 vaccines." Journal of Medical Ethics 47, no. 9 (July 7, 2021): 595–98. http://dx.doi.org/10.1136/medethics-2021-107555.
Full textDonner, I. H. "Will your IP protection provide the protection you expect." Computer 29, no. 7 (July 1996): 98. http://dx.doi.org/10.1109/2.511975.
Full textKoshy, Nisha Elma, and Binu K. Mathew. "IP PROTECTION USING WATERMARKING WITH OBFUSCATION." ICTACT Journal on Microelectronics 3, no. 1 (April 1, 2017): 359–64. http://dx.doi.org/10.21917/ijme.2017.0063.
Full textMaguire, J. "Protect and survive [management IP protection]." Engineering & Technology 4, no. 11 (June 20, 2009): 74–75. http://dx.doi.org/10.1049/et.2009.1119.
Full textColombier, Brice, Lilian Bossuet, and David Hély. "From secured logic to IP protection." Microprocessors and Microsystems 47 (November 2016): 44–54. http://dx.doi.org/10.1016/j.micpro.2016.02.010.
Full textKhan, Saiful. "The Case for Robust IP Protection." New Electronics 52, no. 15 (August 13, 2019): 10. http://dx.doi.org/10.12968/s0047-9624(22)61405-6.
Full textJiang, Qinhan. "An Empirical Analysis on the Effect of IP Protection on Economic Growth in Shenzhen." Highlights in Business, Economics and Management 24 (January 22, 2024): 2336–41. http://dx.doi.org/10.54097/699d5879.
Full textTumalavičius, Vladas, Nataliia Prykhodkina, Mariia Vovk, Serhiy Mytych, and Oksana Kustovska. "Legal impacts of digitization on intellectual property." Revista Amazonia Investiga 13, no. 74 (February 29, 2024): 214–26. http://dx.doi.org/10.34069/ai/2024.74.02.18.
Full textZhang, Yuanjia, Maisoun Sulfab, and Dennis Fernandez. "Intellectual property protection strategies for nanotechnology." Nanotechnology Reviews 2, no. 6 (December 1, 2013): 725–42. http://dx.doi.org/10.1515/ntrev-2012-0089.
Full textHampton, Craig R., Akira Shimamoto, Christine L. Rothnie, Jeaneatte Griscavage-Ennis, Albert Chong, David J. Dix, Edward D. Verrier, and Timothy H. Pohlman. "HSP70.1 and -70.3 are required for late-phase protection induced by ischemic preconditioning of mouse hearts." American Journal of Physiology-Heart and Circulatory Physiology 285, no. 2 (August 2003): H866—H874. http://dx.doi.org/10.1152/ajpheart.00596.2002.
Full textIshola, Abdullahi Saliu, Isa Olawale Solahudeen, and Ibrahim Akangbe. "Intellectual Property Rights for Innovations on the Internet: The Islamic Law Requisites." Arab Law Quarterly 32, no. 4 (November 9, 2018): 517–30. http://dx.doi.org/10.1163/15730255-12324046.
Full textSchulz, Rainer, Martin K. Walz, Matthias Behrends, Till Neumann, Guido Gerken, and Gerd Heusch. "Minimal protection of the liver by ischemic preconditioning in pigs." American Journal of Physiology-Heart and Circulatory Physiology 280, no. 1 (January 1, 2001): H198—H207. http://dx.doi.org/10.1152/ajpheart.2001.280.1.h198.
Full textSahasrabuddhe, L., S. Ramamurthy, and B. Mukherjee. "Fault management in IP-over-WDM networks: WDM protection versus IP restoration." IEEE Journal on Selected Areas in Communications 20, no. 1 (2002): 21–33. http://dx.doi.org/10.1109/49.974659.
Full textBin, Xu, and Tan Kay Chuan. "The Effect of Business Characteristics on the Methods of Knowledge Protections." International Journal of Social Ecology and Sustainable Development 2, no. 3 (July 2011): 34–60. http://dx.doi.org/10.4018/jsesd.2011070103.
Full textLin, Maria C. H. "IP ISSUES IN BIOTECHNOLOGY." Asia-Pacific Biotech News 08, no. 10 (May 30, 2004): 527–38. http://dx.doi.org/10.1142/s0219030304000850.
Full textAntonova, Veronika M., Elena E. Malikova, and Mikhail S. Stepanov. "WAYS OF THE ASTERISK SOFTWARE PBX PROTECTION." T-Comm 17, no. 10 (2023): 52–58. http://dx.doi.org/10.36724/2072-8735-2023-17-10-52-58.
Full textNewbould, Rexford D., David L. Irby, Jo Dale Carothers, Jeffrey J. Rodriguez, and W. Timothy Holman. "Mixed signal design watermarking for IP protection." Integrated Computer-Aided Engineering 10, no. 3 (June 27, 2003): 249–65. http://dx.doi.org/10.3233/ica-2003-10303.
Full textNie, Tingyuan, Lijian Zhou, and Yansheng Li. "Hierarchical Watermarking Method for FPGA IP Protection." IETE Technical Review 30, no. 5 (2013): 367. http://dx.doi.org/10.4103/0256-4602.123116.
Full textVollenberg, Charlotte. "International Conference – IP Protection for Plant Innovation." GRUR International 69, no. 7 (April 17, 2020): 735–42. http://dx.doi.org/10.1093/grurint/ikaa044.
Full textJia, Hepeng. "China tightens IP protection, but concerns linger." Nature Biotechnology 27, no. 9 (September 2009): 787–88. http://dx.doi.org/10.1038/nbt0909-787.
Full textLiu, Xinmin, Yue Zheng, and Wencheng Yu. "The Nonlinear Relationship between Intellectual Property Protection and Farmers’ Entrepreneurship: An Empirical Analysis Based on CHFS Data." Sustainability 15, no. 7 (March 31, 2023): 6071. http://dx.doi.org/10.3390/su15076071.
Full textGupta, Rajorshi Sen. "Risk Management and Intellectual Property Protection in Outsourcing." Global Business Review 19, no. 2 (November 8, 2017): 393–406. http://dx.doi.org/10.1177/0972150917713536.
Full textGrenz, Almut, Tobias Eckle, Hua Zhang, Dan Yang Huang, Manfred Wehrmann, Christoph Köhle, Klaus Unertl, Hartmut Osswald, and Holger K. Eltzschig. "Use of a hanging-weight system for isolated renal artery occlusion during ischemic preconditioning in mice." American Journal of Physiology-Renal Physiology 292, no. 1 (January 2007): F475—F485. http://dx.doi.org/10.1152/ajprenal.00275.2006.
Full textMylly, Ulla-Maija. "Preserving the Public Domain: Limits on Overlapping Copyright and Trade Secret Protection of Software." IIC - International Review of Intellectual Property and Competition Law 52, no. 10 (October 20, 2021): 1314–37. http://dx.doi.org/10.1007/s40319-021-01120-3.
Full textDamjan, Matija. "The Protection of Privacy of the IP Address in Slovenia." Law, Identity and Values 2, no. 2 (2022): 25–43. http://dx.doi.org/10.55073/2022.2.25-43.
Full textArunnima, B. Senakumari, Dharmaseelan Bijulal, and R. Sudhir Kumar. "Open Innovation Intellectual Property Risk Maturity Model: An Approach to Measure Intellectual Property Risks of Software Firms Engaged in Open Innovation." Sustainability 15, no. 14 (July 14, 2023): 11036. http://dx.doi.org/10.3390/su151411036.
Full textLopert, Ruth, and Deborah Gleeson. "The High Price of “Free” Trade: U.S. Trade Agreements and Access to Medicines." Journal of Law, Medicine & Ethics 41, no. 1 (2013): 199–223. http://dx.doi.org/10.1111/jlme.12014.
Full textMarkan, Suchita. "Strategic Intellectual Property Management and spin offs during Medical Device Innovation and commercialisation." International Journal of Drug Regulatory Affairs 9, no. 2 (June 17, 2021): 43–51. http://dx.doi.org/10.22270/ijdra.v9i2.469.
Full textBarqawi, Laila, and Sarah Al-Arasi. "Intellectual Property Protection through University Innovation Centres: Jordan’s Approach to Sustainable Development." International Journal of Religion 5, no. 5 (April 18, 2024): 542–48. http://dx.doi.org/10.61707/swv1pp26.
Full textMu, Xin, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, and Yue Yu. "EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (March 24, 2024): 21438–45. http://dx.doi.org/10.1609/aaai.v38i19.30140.
Full textFlank, Sharon. "Legal Issues in IP Protection for Additive Manufacturing." Texas A&M Journal of Property Law 4, no. 1 (October 2017): 1–14. http://dx.doi.org/10.37419/jpl.v4.i1.1.
Full textNie, Tingyuan, Jie Sun, Aiguo Ji, and Zhe-Ming Lu. "Circuit partitioning based fingerprinting method for IP protection." IEICE Electronics Express 10, no. 7 (2013): 20130138. http://dx.doi.org/10.1587/elex.10.20130138.
Full textXiao, Lijun, Weihong Huang, Yong Xie, Weidong Xiao, and Kuan-Ching Li. "A Blockchain-Based Traceable IP Copyright Protection Algorithm." IEEE Access 8 (2020): 49532–42. http://dx.doi.org/10.1109/access.2020.2969990.
Full textBurgess, Paul, Peter Barton Hutt, Omid C. Farokhzad, Robert Langer, Scott Minick, and Stephen Zale. "On firm ground: IP protection of therapeutic nanoparticles." Nature Biotechnology 28, no. 12 (December 2010): 1267–70. http://dx.doi.org/10.1038/nbt.1725.
Full textKahng, A. B., J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe. "Constraint-based watermarking techniques for design IP protection." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 20, no. 10 (2001): 1236–52. http://dx.doi.org/10.1109/43.952740.
Full textArmour, Kenneth J., and Peter S. Harrison. "Poisons and politics – Indigenous rights and IP protection." World Patent Information 29, no. 3 (September 2007): 255–61. http://dx.doi.org/10.1016/j.wpi.2007.02.001.
Full textBerry, Heather. "Managing valuable knowledge in weak IP protection countries." Journal of International Business Studies 48, no. 7 (March 20, 2017): 787–807. http://dx.doi.org/10.1057/s41267-017-0072-1.
Full textIorio, Marco, Massimo Reineri, Fulvio Risso, Riccardo Sisto, and Fulvio Valenza. "Securing SOME/IP for In-Vehicle Service Protection." IEEE Transactions on Vehicular Technology 69, no. 11 (November 2020): 13450–66. http://dx.doi.org/10.1109/tvt.2020.3028880.
Full textMeade, Travis, Shaojie Zhang, and Yier Jin. "IP protection through gate-level netlist security enhancement." Integration 58 (June 2017): 563–70. http://dx.doi.org/10.1016/j.vlsi.2016.10.014.
Full textJianping Wang, V. M. Vokkarane, R. Jothi, Xiangtong Qi, B. Raghavachari, and J. P. Jue. "Dual-homing protection in IP-over-WDM networks." Journal of Lightwave Technology 23, no. 10 (October 2005): 3111–24. http://dx.doi.org/10.1109/jlt.2005.856321.
Full text