To see the other types of publications on this topic, follow the link: Protection des IP.

Journal articles on the topic 'Protection des IP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Protection des IP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

McKenna, Brian. "Smart IP protection." Infosecurity Today 1, no. 3 (May 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mujtaba, G., and М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries." Kutafin Law Review 11, no. 1 (April 10, 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.

Full text
Abstract:
This is a research study of available options of Intellectual Property (IP) protections for software in the present IP systems, in most of the countries including copyright and patent protection. Each type of IP protection has its own advantages and limitations like enablement of subject matter for registration requirements, scope of rights conferred and period of protection etc. The trends and demands of software industry for the grant of patents protection for Computer Implemented Inventions (CIIs) were also discussed. The present research paper discusses a best mode of technical disclosure, more than an algorithm, of software patents and additional recommendations are also given as a solution to the technical problem of a suitable IP protection for software. A sui generis IP protection was suggested as a best option for a composite IP protection covering all aspects of advanced software inventions.
APA, Harvard, Vancouver, ISO, and other styles
3

Metz, C. "IP protection and restoration." IEEE Internet Computing 4, no. 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion." Lecture Notes in Education Psychology and Public Media 24, no. 1 (November 20, 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.

Full text
Abstract:
This thesis aims to explore the intellectual property protection of virtual IP in the era of the digital economy and its jurisprudential discussion. With the continuous development of science and technology and the rise of the digital economy, virtual IP (virtual image and digital person) presents diverse connotations and expressions as an essential part of the digital economy. However, the intellectual property protection of virtual IP faces many dilemmas and challenges. This paper conducts an in-depth study on the protection of virtual IP through the legal perspective and puts forward some methods and strategies to crack the dilemma of virtual IP legal rights and interests. By improving the legal framework, clarifying the definition standard of virtual IP, and determining the scope of protected rights and interests of virtual IP, the legal protection of virtual IP can be effectively enhanced, and the legitimacy and stability of the property rights and interests of virtual IP can be maintained. This study has important theoretical and practical significance for promoting the development of the digital economy and protecting the intellectual property rights of virtual IP.
APA, Harvard, Vancouver, ISO, and other styles
5

CORREIA, N. S. C., and M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection." Fiber and Integrated Optics 24, no. 3-4 (May 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Saha, Debasri, and Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection." VLSI Design 2011 (April 5, 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.

Full text
Abstract:
Increased design complexity, shrinking design cycle, and low cost—this three-dimensional demand mandates advent of system-on-chip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and summarization to focus on the inherent tradeoff, existing security holes, and new research directions. This paper discusses the IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries, categorizes these infringements, and applies strategic analysis on the effectiveness of the existing IPP techniques for these categories of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
APA, Harvard, Vancouver, ISO, and other styles
7

Newbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez, and W. T. Holman. "Watermarking ICs for IP protection." Electronics Letters 38, no. 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bolos, Mihaela Daciana. "IP Protection and International Trade." Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shi, Guanming, Carl Pray, and Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China." Agricultural and Resource Economics Review 41, no. 3 (December 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.

Full text
Abstract:
This paper examines Chinese pesticide firms’ use and perceptions of various means of intellectual property (IP) protection in protecting their innovations, using a unique dataset from 97 pesticide firms surveyed in 2008. These firms rate Chinese patents as quite effective in protecting their IP from infringement, although 70 percent of them state that improved enforcement is needed. Those firms that have been granted patents and those that claim their patents have been infringed upon both give lower ratings to the perceived effectiveness of patents. Trademarks are rated as less effective than patents, but firms that have had experience with patenting and infringement of patents tend to rate trademarks as more effective than those firms that do not have direct experience with the patent system. General government policies to encourage increased privatization, more private R&D, and higher education are associated with more faith in IP, but policies to strengthen IP by promoting mandatory IP training and the development of specialized IP divisions in the firms do not influence perceptions of IP effectiveness. We conclude that if the Chinese government wants to encourage innovation using IP protection, it must focus on improving the enforcement of patents.
APA, Harvard, Vancouver, ISO, and other styles
10

Correia, N. S. C., and M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection." Photonic Network Communications 10, no. 1 (July 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Jecker, Nancy S., and Caesar A. Atuire. "What’s yours is ours: waiving intellectual property protections for COVID-19 vaccines." Journal of Medical Ethics 47, no. 9 (July 7, 2021): 595–98. http://dx.doi.org/10.1136/medethics-2021-107555.

Full text
Abstract:
This paper gives an ethical argument for temporarily waiving intellectual property (IP) protections for COVID-19 vaccines. It examines two proposals under discussion at the World Trade Organization (WTO): the India/South Africa proposal and the WTO Director General proposal. Section I explains the background leading up to the WTO debate. Section II rebuts ethical arguments for retaining current IP protections, which appeal to benefiting society by spurring innovation and protecting rightful ownership. It sets forth positive ethical arguments for a temporary waiver that appeal to standing in solidarity and holding companies accountable. After examining built-in exceptions to existing agreements and finding them inadequate, the paper replies to objections to a temporary waiver and concludes, in section III, that the ethical argument for temporarily waiving IP protection for COVID-19 vaccines is strong.
APA, Harvard, Vancouver, ISO, and other styles
12

Donner, I. H. "Will your IP protection provide the protection you expect." Computer 29, no. 7 (July 1996): 98. http://dx.doi.org/10.1109/2.511975.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Koshy, Nisha Elma, and Binu K. Mathew. "IP PROTECTION USING WATERMARKING WITH OBFUSCATION." ICTACT Journal on Microelectronics 3, no. 1 (April 1, 2017): 359–64. http://dx.doi.org/10.21917/ijme.2017.0063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Maguire, J. "Protect and survive [management IP protection]." Engineering & Technology 4, no. 11 (June 20, 2009): 74–75. http://dx.doi.org/10.1049/et.2009.1119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Colombier, Brice, Lilian Bossuet, and David Hély. "From secured logic to IP protection." Microprocessors and Microsystems 47 (November 2016): 44–54. http://dx.doi.org/10.1016/j.micpro.2016.02.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Khan, Saiful. "The Case for Robust IP Protection." New Electronics 52, no. 15 (August 13, 2019): 10. http://dx.doi.org/10.12968/s0047-9624(22)61405-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jiang, Qinhan. "An Empirical Analysis on the Effect of IP Protection on Economic Growth in Shenzhen." Highlights in Business, Economics and Management 24 (January 22, 2024): 2336–41. http://dx.doi.org/10.54097/699d5879.

Full text
Abstract:
This research paper examines the relationship between intellectual property (IP) protection and economic growth, with a specific focus on Shenzhen from 2014 to 2020. The study investigates the effect of IP protection measures, the combined effect of IP protection and investment, and the combined effect of IP protection and workforce on the total output. Previous literature has highlighted the positive influence of IP protection on economic growth in developed regions, but its impact in transitioning economies, like Shenzhen, remains less explored. Using a linear regression model, this research aims to provide insights into the interplay between IP protection, fixed investment, workforce size, and trade openness in the context of Shenzhen's economic development during the period under study. This will further clarify the connection of IPR to economic growth in a transitioning economy.
APA, Harvard, Vancouver, ISO, and other styles
18

Tumalavičius, Vladas, Nataliia Prykhodkina, Mariia Vovk, Serhiy Mytych, and Oksana Kustovska. "Legal impacts of digitization on intellectual property." Revista Amazonia Investiga 13, no. 74 (February 29, 2024): 214–26. http://dx.doi.org/10.34069/ai/2024.74.02.18.

Full text
Abstract:
The digital age has revolutionized the way intellectual property is created, shared, and protected. This article explores the legal aspects of IP protection in the digital age, focusing on the challenges and opportunities posed by digital technologies. The objective of this study is to analyze the evolving landscape of IP protection in the digital age, examining the impact of digitalization on traditional IP laws and regulations. This study employs a qualitative research methodology, conducting a comprehensive review of existing literature, laws, and regulations related to IP protection in the digital age. Content analysis and synthesis are used to illustrate key concepts and trends. The results of the study highlight the need for updated and harmonized IP laws to address the challenges posed by digital technologies. The study also identifies the importance of technological solutions, such as blockchain and digital rights management, in enhancing IP protection in the digital age. In conclusion, the study emphasizes the importance of adapting IP laws and regulations to the digital age to ensure effective protection of IP rights. It also underscores the need for collaboration between governments, industries, and technology companies to develop innovative solutions for IP protection in the digital era.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Yuanjia, Maisoun Sulfab, and Dennis Fernandez. "Intellectual property protection strategies for nanotechnology." Nanotechnology Reviews 2, no. 6 (December 1, 2013): 725–42. http://dx.doi.org/10.1515/ntrev-2012-0089.

Full text
Abstract:
AbstractThe field of nanotechnology has been widely recognized as comparable to biotechnology and digital information revolutions. As a general-purpose technology, nanotechnology is expected to have widespread applications across many critical industrial sectors. The growing market and competition require careful attention to intellectual property (IP) rights and strategies. The American patent system is currently going through the biggest reform since the passage of Patent Act of 1952, and many changes apply directly to the field of nanotechnology. This review discusses basic IP definitions, recent IP developments, and advanced protection strategies to better understand the status quo of IP specifically in nanotechnology. The potential impact from the patent system reform is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
20

Hampton, Craig R., Akira Shimamoto, Christine L. Rothnie, Jeaneatte Griscavage-Ennis, Albert Chong, David J. Dix, Edward D. Verrier, and Timothy H. Pohlman. "HSP70.1 and -70.3 are required for late-phase protection induced by ischemic preconditioning of mouse hearts." American Journal of Physiology-Heart and Circulatory Physiology 285, no. 2 (August 2003): H866—H874. http://dx.doi.org/10.1152/ajpheart.00596.2002.

Full text
Abstract:
We investigated the role of inducible heat shock proteins 70.1 and 70.3 (HSP70.1 and HSP70.3, respectively) in myocardial ischemic preconditioning (IP) in mice. Wild-type (WT) mice and HSP70.1- and HSP70.3-null [HSP70.1/3(–/–)] mice were subjected to IP and examined 24 h later during the late phase of protection. IP significantly increased steady-state levels of HSP70.1 and HSP70.3 mRNA and expression of inducible HSP70 protein in WT myocardium. To assess protection against tissue injury, mice were subjected to 30 min of regional ischemia and 3 h of reperfusion. In WT mice, IP reduced infarct size by 43% compared with sham IP-treated mice. In contrast, IP did not reduce infarct size in HSP70.1/3(–/–) mice. Absence of inducible HSP70.1 and HSP70.3 had no effect, however, on classical or early-phase protection produced by IP, which significantly reduced infarct size in HSP70.1/3(–/–) mice. We conclude that inducible HSP70.1 and HSP70.3 are required for late-phase protection against infarction following IP in mice.
APA, Harvard, Vancouver, ISO, and other styles
21

Ishola, Abdullahi Saliu, Isa Olawale Solahudeen, and Ibrahim Akangbe. "Intellectual Property Rights for Innovations on the Internet: The Islamic Law Requisites." Arab Law Quarterly 32, no. 4 (November 9, 2018): 517–30. http://dx.doi.org/10.1163/15730255-12324046.

Full text
Abstract:
Abstract Intellectual property (IP) protection has attracted diverse views among Islamic law researchers, leading to its eventual acceptance on the premise of indirect legal authority by most Muslim scholars. This paper explores the preconditions that any innovation on the internet must meet to enjoy IP protection under Islamic law. It provides working tools for Muslims on the principles to be observed in seeking IP protection for any of their innovations. It also urges governments of Muslim countries which have hitherto refused to accord legal protection to IP on religious grounds to change their position.
APA, Harvard, Vancouver, ISO, and other styles
22

Schulz, Rainer, Martin K. Walz, Matthias Behrends, Till Neumann, Guido Gerken, and Gerd Heusch. "Minimal protection of the liver by ischemic preconditioning in pigs." American Journal of Physiology-Heart and Circulatory Physiology 280, no. 1 (January 1, 2001): H198—H207. http://dx.doi.org/10.1152/ajpheart.2001.280.1.h198.

Full text
Abstract:
Ischemic preconditioning (IP) protects the rat liver. In pigs, in which hepatic tolerance to ischemia is similar to that in humans, information on IP is lacking. Therefore, in enflurane-anesthetized pigs, hepatic vessels were occluded for 120 min ( protocol 1) or 200 min ( protocol 2) without (control) and with IP (3 times 10 min ischemia-reperfusion each). In protocol 1, cumulative bile flow (CBF) during reperfusion was greater in IP (47.3 ± 5.2 ml/8 h) than in control (17.1 ± 7.8 ml/8 h, P < 0.05). ATP content tended to recover toward normal during reperfusion in IP, whereas it remained at ischemic levels in control. Serum enzyme concentrations increased similarly during reperfusion, and <1% hepatocytes were necrotic or stained terminal deosynucleotidyl transferase-mediated dUTP nick-end labeling-positive in control and IP groups. In protocol 2, no differences in CBF, ATP, or serum enzyme concentrations during reperfusion were measured between control and IP groups, except for a somewhat reduced lactate dehydrogenase in IP. The number of necrotic or terminal deosynucleotidyl transferase-mediated dUTP nick-end labeling-positive hepatocytes tended to be greater in the IP than the control group. Thus IP provides some functional protection against reversible ischemia but no protection during prolonged ischemia in pigs.
APA, Harvard, Vancouver, ISO, and other styles
23

Sahasrabuddhe, L., S. Ramamurthy, and B. Mukherjee. "Fault management in IP-over-WDM networks: WDM protection versus IP restoration." IEEE Journal on Selected Areas in Communications 20, no. 1 (2002): 21–33. http://dx.doi.org/10.1109/49.974659.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bin, Xu, and Tan Kay Chuan. "The Effect of Business Characteristics on the Methods of Knowledge Protections." International Journal of Social Ecology and Sustainable Development 2, no. 3 (July 2011): 34–60. http://dx.doi.org/10.4018/jsesd.2011070103.

Full text
Abstract:
Intellectual property (IP) protection has been suggested to be essential in protecting innovation in product-dominant companies. However, with the development of service industries, the ineffectiveness in IP protection becomes manifest. Meanwhile, other knowledge protecting methods enable companies to maintain their competency without formal protection. This study examines the effectiveness of different means of knowledge protection. Specifically, business is classified according to companies’ offering nature, serving mode and consider about their business hardware. The effectiveness of protection methods is analyzed among these business types. Interviews were conducted with senior managers of 39 companies in China and Singapore. It is demonstrated that the choice of knowledge protecting method does not depend mainly on whether a company provides products or services, but on how the company produces and provides its offerings. It is found that the core competency of companies largely affects their attitude on whether to protect their offerings. It is found that in weak appropriability regimes, companies apply for patents not for their knowledge protection function, but for other benefits, such as getting awards or tax reductions, and improving reputation among customers.
APA, Harvard, Vancouver, ISO, and other styles
25

Lin, Maria C. H. "IP ISSUES IN BIOTECHNOLOGY." Asia-Pacific Biotech News 08, no. 10 (May 30, 2004): 527–38. http://dx.doi.org/10.1142/s0219030304000850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Antonova, Veronika M., Elena E. Malikova, and Mikhail S. Stepanov. "WAYS OF THE ASTERISK SOFTWARE PBX PROTECTION." T-Comm 17, no. 10 (2023): 52–58. http://dx.doi.org/10.36724/2072-8735-2023-17-10-52-58.

Full text
Abstract:
Network protection of the Asterisk software PBX widely used in modern info-communication networks is considered. This particular telephone exchange is used to set up telephone communications at the Moscow Technical University of Communications and Informatics. When connecting this software telephone exchange to IP networks, it is necessary to provide its protection to prevent it from being attacked by intruders. The Asterisk IP PBX has powerful protection tools. If properly applied, they can make the protection more reliable than that of some hardware IP PBXs. The protection system can be built in different ways. The most popular ones are the following types of protection: the iptables utility, the development of a proper network design involving the use of VLAN and VPN technologies, the utilization of Fail2Ban log file analyzer. Protection can also be implemented by means of DialPlan and developing a proper configuration of the Asterisk IP PBX.
APA, Harvard, Vancouver, ISO, and other styles
27

Newbould, Rexford D., David L. Irby, Jo Dale Carothers, Jeffrey J. Rodriguez, and W. Timothy Holman. "Mixed signal design watermarking for IP protection." Integrated Computer-Aided Engineering 10, no. 3 (June 27, 2003): 249–65. http://dx.doi.org/10.3233/ica-2003-10303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nie, Tingyuan, Lijian Zhou, and Yansheng Li. "Hierarchical Watermarking Method for FPGA IP Protection." IETE Technical Review 30, no. 5 (2013): 367. http://dx.doi.org/10.4103/0256-4602.123116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Vollenberg, Charlotte. "International Conference – IP Protection for Plant Innovation." GRUR International 69, no. 7 (April 17, 2020): 735–42. http://dx.doi.org/10.1093/grurint/ikaa044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jia, Hepeng. "China tightens IP protection, but concerns linger." Nature Biotechnology 27, no. 9 (September 2009): 787–88. http://dx.doi.org/10.1038/nbt0909-787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Xinmin, Yue Zheng, and Wencheng Yu. "The Nonlinear Relationship between Intellectual Property Protection and Farmers’ Entrepreneurship: An Empirical Analysis Based on CHFS Data." Sustainability 15, no. 7 (March 31, 2023): 6071. http://dx.doi.org/10.3390/su15076071.

Full text
Abstract:
Using data from three rounds of the China Household Finance Survey (CHFS) in 2015, 2017 and 2019, this paper analyzes the impact and mechanism of the action of intellectual property protection on farm household entrepreneurship, based on institutional theory. It is found that: an inverted U-shaped relationship is shown between IPR protection and farm household entrepreneurship, but combined with the results of further research on farm household entrepreneurship performance, there is a positive effect of IPR protection and entrepreneurship performance. This indicates that excessive IPR protection, although limiting the number of entrepreneurship, boosts high-quality entrepreneurship; regional investment plays a mediating role between IPR protection and farm household entrepreneurship; and the results for IP protection and farmer opportunity entrepreneurship are the same as the baseline regression but have no significant effect on farmer initiative entrepreneurship, suggesting that IP protection more often increases farmers’ access to entrepreneurship. The above findings expand the application of “protecting intellectual property is protecting innovation” in farmers’ entrepreneurship and provide ideas for the implementation of intellectual property to promote, enrich and strengthen agriculture.
APA, Harvard, Vancouver, ISO, and other styles
32

Gupta, Rajorshi Sen. "Risk Management and Intellectual Property Protection in Outsourcing." Global Business Review 19, no. 2 (November 8, 2017): 393–406. http://dx.doi.org/10.1177/0972150917713536.

Full text
Abstract:
Firms organize business activities either in-house or outsource them to independent service providers. When making their organizational choice, firms face a trade-off between efficiency and loss of intellectual property (IP) when outsourcing. It is found that companies may gain from outsourcing even if there is possibility of IP misappropriation and moral hazard due to shirking. It is recommended that firms use a variable payment scheme linked to project outcome that would incentivize service providers to exert optimal effort in outsourcing projects. Moreover, when a task is outsourced in a weak IP regime, the optimal contract must implement a carrot and stick strategy comprising of limited IP sharing in conjunction with adequate incentive payments to the service provider.
APA, Harvard, Vancouver, ISO, and other styles
33

Grenz, Almut, Tobias Eckle, Hua Zhang, Dan Yang Huang, Manfred Wehrmann, Christoph Köhle, Klaus Unertl, Hartmut Osswald, and Holger K. Eltzschig. "Use of a hanging-weight system for isolated renal artery occlusion during ischemic preconditioning in mice." American Journal of Physiology-Renal Physiology 292, no. 1 (January 2007): F475—F485. http://dx.doi.org/10.1152/ajprenal.00275.2006.

Full text
Abstract:
Renal failure from ischemia contributes to morbidity and mortality. Ischemic preconditioning (IP) represents a powerful strategy for kidney protection, and recent advances in transgenic mice may help elucidate its molecular mechanisms. However, murine IP is technically challenging and experimental details significantly influence results. Thus we developed a novel model for renal IP using a hanging-weight system for isolated renal artery occlusion. In contrast to previous models, this technique eliminates the need for clamping the vascular pedicle (artery/vein). In fact, assessment of renal injury after different time periods of ischemia (10–60 min) revealed highly reproducible increases in plasma creatinine and potassium levels, while creatinine clearance, urinary flow and potassium/sodium excretion were significantly attenuated. Using different numbers of IP cycles, we found maximal protection with four cycles of 4 min of ischemia-reperfusion. In contrast, no significant renal protection was observed with IP of the vascular pedicle. To assess transcriptional responses in this model, we isolated RNA from preconditioned kidneys and found time-dependent induction of erythropoietin mRNA and plasma levels with IP. Taken together, this model provides highly reproducible renal injury and protection by IP, thus minimizing variability associated with previous techniques based on clamping of the renal pedicle. Further studies on renal ischemia/IP in mice may consider this technique.
APA, Harvard, Vancouver, ISO, and other styles
34

Mylly, Ulla-Maija. "Preserving the Public Domain: Limits on Overlapping Copyright and Trade Secret Protection of Software." IIC - International Review of Intellectual Property and Competition Law 52, no. 10 (October 20, 2021): 1314–37. http://dx.doi.org/10.1007/s40319-021-01120-3.

Full text
Abstract:
AbstractThe traditional understanding of intellectual property (IP) suggests that each IP category has a discrete subject matter of its own and exceptions thereto. Based on such an understanding of IP law, one would assume that there would not be overlapping IP protection for the same subject matter or product features. However, this understanding does not hold water. It has been argued that the development of overlapping IP rights has intensified as the subject matter that can be protected has expanded through the introduction of new rights and as the scope of protection for existing rights has increased. What may be particularly problematic is that, when policymakers focus on one IP regime at time, any issues arising from IP overlaps may remain undetected. For quite some time, there has been a policy tendency towards broadening the scope of intellectual property protection, which has led to a decrease in scope for the public domain. This tendency shows that the value of the public domain has not been appropriately identified or at the least not appreciated. One way to define the public domain is as the sphere that is not protected by any form of IP. This article will focus on the overlaps created by the Software Copyright and Trade Secrets Directives with regard to the protection of software. The ultimate aim of the article is to query whether the combined effects of these two Directives could be interpreted in a way that limits the undesirable expansion of protection.
APA, Harvard, Vancouver, ISO, and other styles
35

Damjan, Matija. "The Protection of Privacy of the IP Address in Slovenia." Law, Identity and Values 2, no. 2 (2022): 25–43. http://dx.doi.org/10.55073/2022.2.25-43.

Full text
Abstract:
The protection of communication privacy covers not only the content of the conversation, but also other information related to the communication (metadata). The most prominent type of metadata in online communication is IP address, which defines the location of a computer or other connected device in the network. As a purely technical information, an IP address does not refer directly to any individual and is not in itself personal information. Yet, it can also be used to identify individuals online, track their location and online activity. An IP address is never strictly private, since any internet user’s IP address is visible to other participants in regular online interactions, which differentiates it from typical private information. The paper examines the conditions, developed in case law of the European Court of Human Rights and Court of Justice of the European Union as well as the Slovenian courts, under which an IP address can be considered personal data and when it is protected as a part of one’s communication privacy. The paper then focuses on the issue of whether an individual should be considered to have waived the privacy protection of their IP address if they have taken no measures to hide it. The relevance of the distinction between static and dynamic IP addresses from the perspective of privacy protection is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
36

Arunnima, B. Senakumari, Dharmaseelan Bijulal, and R. Sudhir Kumar. "Open Innovation Intellectual Property Risk Maturity Model: An Approach to Measure Intellectual Property Risks of Software Firms Engaged in Open Innovation." Sustainability 15, no. 14 (July 14, 2023): 11036. http://dx.doi.org/10.3390/su151411036.

Full text
Abstract:
Open innovation (OI) is key to sustainable product development and is increasingly gaining significance as the preferred model of innovation across industries. When compared to closed innovation, the protection of intellectual property (IP) that is created in open innovation is complex. For organisations engaging in OI, a sound IP management policy focusing on IP risk reduction plays a significant role in ensuring their sustained growth. Assessing the risks that are involved in IP management will enable firms to devise appropriate IP management strategies, which would ensure sufficient protection of an IP that is created in an OI model. Studies indicate that the risks which are associated with IP and risk management processes also vary with company segments that range from start-ups to micro, small, medium, and large organisations. This paper proposes an open innovation IP risk assessment model to compute the open innovation intellectual property risk score (OIIPRS) by employing an analytic hierarchy process. The OIIPRS indicates the IP risk levels of an organisation when it engages in open innovation with other organisations. The factors contributing to IP risk are identified and further classified as configurable IP risk factors, and the impact of these factors for the various company segments is also factored in when computing the OIIPRS. Further, an OI IP risk maturity model (OIIPRMM) is proposed. This model depicts the IP risk maturity of organisations based on the computed OIIPRS on an IP risk continuum, which categorises firms into five levels of IP risk maturity. The software firms can make use of the OIIPRMM to assess the level of IP risk and adopt proactive IP protection mechanisms while collaborating with other organisations.
APA, Harvard, Vancouver, ISO, and other styles
37

Lopert, Ruth, and Deborah Gleeson. "The High Price of “Free” Trade: U.S. Trade Agreements and Access to Medicines." Journal of Law, Medicine & Ethics 41, no. 1 (2013): 199–223. http://dx.doi.org/10.1111/jlme.12014.

Full text
Abstract:
The United States’ pursuit of increasingly TRIPS-Plus levels of intellectual property protection for medicines in bilateral and regional trade agreements is well recognized. Less so, however, are U.S. efforts through these agreements, to directly influence and constrain the pharmaceutical coverage programs of its trading partners. The pursuit of increasing levels of intellectual property (IP) protection in successive bilateral and regional trade agreements has been driven, at least in part, by a U.S. desire to achieve standards of protection it anticipated from the TRIPS Agreement, but failed to secure. Despite the conclusion of a global agreement on IP standards that would establish significant protections in countries that had hitherto declined them, the U.S. pharmaceutical industry viewed TRIPS as falling well short of its objectives — particularly in light of the delayed introduction of patent protection in countries that are key suppliers of generic medicines, such as India.
APA, Harvard, Vancouver, ISO, and other styles
38

Markan, Suchita. "Strategic Intellectual Property Management and spin offs during Medical Device Innovation and commercialisation." International Journal of Drug Regulatory Affairs 9, no. 2 (June 17, 2021): 43–51. http://dx.doi.org/10.22270/ijdra.v9i2.469.

Full text
Abstract:
Intellectual Property (IP) protection for medical technology innovations is a milestone, generally undermined by Start-ups. Effective and timely IP protection acts as a lifeline for entrepreneurs/start-ups as it not only helps them attract investments and get competitive advantage but also enables marketing tie-ups and potential acquisition by larger companies. This article delineates the strategies for effective IP protection during different phases of technology development to enable medical technology innovators unlock IP potential of their innovations thereby gain competitive edge as well as reap financial rewards. Some interesting case studies and experience sharing by entrepreneurs have also been included for empirical understanding and to serve as practical tools for innovators working in medical device innovation space.
APA, Harvard, Vancouver, ISO, and other styles
39

Barqawi, Laila, and Sarah Al-Arasi. "Intellectual Property Protection through University Innovation Centres: Jordan’s Approach to Sustainable Development." International Journal of Religion 5, no. 5 (April 18, 2024): 542–48. http://dx.doi.org/10.61707/swv1pp26.

Full text
Abstract:
Jordan's dedication to reinforcing its Intellectual Property (IP) protection framework is becoming increasingly apparent, particularly within its higher education sphere. Universities in Jordan have made commendable progress by initiating innovation and entrepreneurship centres. These establishments act as incubators, promoting a culture where creativity and innovation can thrive in academia. This discussion highlights the crucial role of IP in Jordan, advocating that bolstering IP protections is achievable through university-based centres. By embedding them into the educational fabric, Jordan not only safeguards intellectual works but also strives to meet the targets set by the United Nations' Sustainable Development Goals, thereby investing in its future leaders. The inception of these centres within Jordanian universities marks a strategic, forward-thinking step to stimulate the inventive spirit and endorse entrepreneurial endeavours. It illustrates Jordan's resolve to create a conducive atmosphere where IP is esteemed and safeguarded, thus contributing to sustainable development in line with the UN's vision.
APA, Harvard, Vancouver, ISO, and other styles
40

Mu, Xin, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, and Yue Yu. "EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection." Proceedings of the AAAI Conference on Artificial Intelligence 38, no. 19 (March 24, 2024): 21438–45. http://dx.doi.org/10.1609/aaai.v38i19.30140.

Full text
Abstract:
In the rapidly growing digital economy, protecting intellectual property (IP) associated with digital products has become increasingly important. Within this context, machine learning (ML) models, being highly valuable digital assets, have gained significant attention for IP protection. This paper introduces a practical encryption-based framework called EncryIP, which seamlessly integrates a public-key encryption scheme into the model learning process. This approach enables the protected model to generate randomized and confused labels, ensuring that only individuals with accurate secret keys, signifying authorized users, can decrypt and reveal authentic labels. Importantly, the proposed framework not only facilitates the protected model to multiple authorized users without requiring repetitive training of the original ML model with IP protection methods but also maintains the model's performance without compromising its accuracy. Compared to existing methods like watermark-based, trigger-based, and passport-based approaches, EncryIP demonstrates superior effectiveness in both training protected models and efficiently detecting the unauthorized spread of ML models.
APA, Harvard, Vancouver, ISO, and other styles
41

Flank, Sharon. "Legal Issues in IP Protection for Additive Manufacturing." Texas A&M Journal of Property Law 4, no. 1 (October 2017): 1–14. http://dx.doi.org/10.37419/jpl.v4.i1.1.

Full text
Abstract:
Additive manufacturing (“AM”) offers the power to design and create in new ways but also brings challenges in intellectual property protection and unauthorized copying, along with potential liability issues. One growing problem is counterfeiting, which is recognized as part of a worldwide industry estimated at over $1 trillion. “There are two basic paths to creating counterfeits with 3D printing.” First, the print instructions, in the form of a software design file, can be stolen, shared, or mocked up. Alternatively, an existing object “(including a genuine branded or licensed product)” can be 3D scanned to create a design file to print a copy. “Hybrids of the two paths also exist, for example, a 3D scan version that is then altered in one or more characteristics.”
APA, Harvard, Vancouver, ISO, and other styles
42

Nie, Tingyuan, Jie Sun, Aiguo Ji, and Zhe-Ming Lu. "Circuit partitioning based fingerprinting method for IP protection." IEICE Electronics Express 10, no. 7 (2013): 20130138. http://dx.doi.org/10.1587/elex.10.20130138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Xiao, Lijun, Weihong Huang, Yong Xie, Weidong Xiao, and Kuan-Ching Li. "A Blockchain-Based Traceable IP Copyright Protection Algorithm." IEEE Access 8 (2020): 49532–42. http://dx.doi.org/10.1109/access.2020.2969990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Burgess, Paul, Peter Barton Hutt, Omid C. Farokhzad, Robert Langer, Scott Minick, and Stephen Zale. "On firm ground: IP protection of therapeutic nanoparticles." Nature Biotechnology 28, no. 12 (December 2010): 1267–70. http://dx.doi.org/10.1038/nbt.1725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kahng, A. B., J. Lach, W. H. Mangione-Smith, S. Mantik, I. L. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe. "Constraint-based watermarking techniques for design IP protection." IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 20, no. 10 (2001): 1236–52. http://dx.doi.org/10.1109/43.952740.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Armour, Kenneth J., and Peter S. Harrison. "Poisons and politics – Indigenous rights and IP protection." World Patent Information 29, no. 3 (September 2007): 255–61. http://dx.doi.org/10.1016/j.wpi.2007.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Berry, Heather. "Managing valuable knowledge in weak IP protection countries." Journal of International Business Studies 48, no. 7 (March 20, 2017): 787–807. http://dx.doi.org/10.1057/s41267-017-0072-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Iorio, Marco, Massimo Reineri, Fulvio Risso, Riccardo Sisto, and Fulvio Valenza. "Securing SOME/IP for In-Vehicle Service Protection." IEEE Transactions on Vehicular Technology 69, no. 11 (November 2020): 13450–66. http://dx.doi.org/10.1109/tvt.2020.3028880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Meade, Travis, Shaojie Zhang, and Yier Jin. "IP protection through gate-level netlist security enhancement." Integration 58 (June 2017): 563–70. http://dx.doi.org/10.1016/j.vlsi.2016.10.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Jianping Wang, V. M. Vokkarane, R. Jothi, Xiangtong Qi, B. Raghavachari, and J. P. Jue. "Dual-homing protection in IP-over-WDM networks." Journal of Lightwave Technology 23, no. 10 (October 2005): 3111–24. http://dx.doi.org/10.1109/jlt.2005.856321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography