Literatura académica sobre el tema "Protection des IP"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Protection des IP".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Protection des IP"
McKenna, Brian. "Smart IP protection". Infosecurity Today 1, n.º 3 (mayo de 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.
Texto completoMujtaba, G. y М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries". Kutafin Law Review 11, n.º 1 (10 de abril de 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.
Texto completoMetz, C. "IP protection and restoration". IEEE Internet Computing 4, n.º 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.
Texto completoShi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion". Lecture Notes in Education Psychology and Public Media 24, n.º 1 (20 de noviembre de 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.
Texto completoCORREIA, N. S. C. y M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection". Fiber and Integrated Optics 24, n.º 3-4 (mayo de 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.
Texto completoSaha, Debasri y Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection". VLSI Design 2011 (5 de abril de 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.
Texto completoNewbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez y W. T. Holman. "Watermarking ICs for IP protection". Electronics Letters 38, n.º 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.
Texto completoBolos, Mihaela Daciana. "IP Protection and International Trade". Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.
Texto completoShi, Guanming, Carl Pray y Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China". Agricultural and Resource Economics Review 41, n.º 3 (diciembre de 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.
Texto completoCorreia, N. S. C. y M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection". Photonic Network Communications 10, n.º 1 (julio de 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.
Texto completoTesis sobre el tema "Protection des IP"
Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection". Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.
Texto completoCommittee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching". Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.
Texto completoBoni, Giacomo <1996>. "Legal Regulation and IP Rights Protection of Online games in China". Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.
Texto completoBuffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP". Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.
Texto completoHallbäck, Erik. "Digital Rights Management on an IP-based set-top box". Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.
Texto completoDigital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.
This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms". Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.
Texto completoMaster of Science
Colombier, Brice. "Methods for protecting intellectual property of IP cores designers". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Texto completoDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Fan, Dian. "Scalable Video Transport over IP Networks". Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.
Texto completoMüller, Karen E. "MPLS-based recovery". Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.
Texto completoENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Ekrt, Ondřej. "Trademark and Design Protection of Applied Art". Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.
Texto completoLibros sobre el tema "Protection des IP"
American Bar Association. Section of Intellectual Property Law, ed. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.
Buscar texto completoEditorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.
Buscar texto completoBossuet, Lilian y Lionel Torres, eds. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.
Texto completoM, Hyland Mark LL, Carey Louise y Law Society of Ireland, eds. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.
Buscar texto completoLi, Meng y David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.
Texto completoVasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.
Buscar texto completoKëllezi, Pranvera, Bruce Kilpatrick y Pierre Kobel, eds. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.
Texto completoMario, Pickavet y Demeester Piet, eds. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.
Buscar texto completoWolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4a ed. Upper Saddle River, NJ: Prentice Hall, 2008.
Buscar texto completoZeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.
Buscar texto completoCapítulos de libros sobre el tema "Protection des IP"
Gassmann, Oliver, Angela Beckenbauer y Sascha Friesike. "The IP Protection Star". En Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.
Texto completoMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty y Ramesh Karri. "Obfuscation for IP Protection". En Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.
Texto completoMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty y Ramesh Karri. "Watermarking for IP Protection". En Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.
Texto completoHeim, Irina. "The Protection of IP". En Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.
Texto completoJung, Edward y Lilian Bossuet. "IP FSM Watermarking". En Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.
Texto completoJayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu y J. Rajendran. "Analog IP Protection and Evaluation". En Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.
Texto completoZamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi y Mark Tehranipoor. "IP Protection: A Historical View". En Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.
Texto completoTorres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol y Lilian Bossuet. "Digital Right Management for IP Protection". En Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.
Texto completoCambou, Bertrand. "Enhancing Secure Elements—Technology and Architecture". En Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.
Texto completoColombier, Brice, Lilian Bossuet y David Hély. "Turning Electronic Circuits Features into On-Chip Locks". En Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.
Texto completoActas de conferencias sobre el tema "Protection des IP"
Dalpasso, Marcello, Alessandro Bogliolo y Luca Benini. "Hardware/software IP protection". En the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.
Texto completoSu, Hui-Kai, Cheng-Shong Wu y Yuan-Sun Chu. "IP Local Node Protection". En 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.
Texto completoCammarota, Rosario, Indranil Banerjee y Ofer Rosenberg. "Machine learning IP protection". En ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.
Texto completoWang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain y Ning Zhang. "IP Protection in TinyML". En 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.
Texto completoLiu, Qiang y Haie Li. "A hierarchical IP protection approach for hard IP cores". En 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.
Texto completoRampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale y Mario Barbareschi. "Digital Right Management for IP Protection". En 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.
Texto completoLi, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu y Patrick P. C. Lee. "Achieving Unified Protection for IP Routing". En 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.
Texto completoWood, Steve y Gordon W. Romney. "Protection methods against IP packet attacks". En the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.
Texto completoKepa, Krzysztof, Fearghal Morgan y Krzysztof Kosciuszkiewicz. "IP protection in Partially Reconfigurable FPGAs". En 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.
Texto completoCollini, Luca, Benjamin Tan, Christian Pilato y Ramesh Karri. "Reconfigurable Logic for Hardware IP Protection". En ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.
Texto completoInformes sobre el tema "Protection des IP"
Hanlon, Walker y Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, noviembre de 2019. http://dx.doi.org/10.3386/w26490.
Texto completoMinero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.
Texto completoDe León, Ignacio L. y Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, septiembre de 2016. http://dx.doi.org/10.18235/0007023.
Texto completoThe Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, septiembre de 2022. http://dx.doi.org/10.53892/gzum7792.
Texto completo