Littérature scientifique sur le sujet « Protection des IP »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Protection des IP ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Protection des IP"

1

McKenna, Brian. « Smart IP protection ». Infosecurity Today 1, no 3 (mai 2004) : 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Mujtaba, G., et М. Zia-Ul-Haq. « The Disclosure Requirements of Software Patents : Suggestions for Developing Countries ». Kutafin Law Review 11, no 1 (10 avril 2024) : 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.

Texte intégral
Résumé :
This is a research study of available options of Intellectual Property (IP) protections for software in the present IP systems, in most of the countries including copyright and patent protection. Each type of IP protection has its own advantages and limitations like enablement of subject matter for registration requirements, scope of rights conferred and period of protection etc. The trends and demands of software industry for the grant of patents protection for Computer Implemented Inventions (CIIs) were also discussed. The present research paper discusses a best mode of technical disclosure, more than an algorithm, of software patents and additional recommendations are also given as a solution to the technical problem of a suitable IP protection for software. A sui generis IP protection was suggested as a best option for a composite IP protection covering all aspects of advanced software inventions.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Metz, C. « IP protection and restoration ». IEEE Internet Computing 4, no 2 (2000) : 97–102. http://dx.doi.org/10.1109/4236.832952.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Shi, Dengke. « Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion ». Lecture Notes in Education Psychology and Public Media 24, no 1 (20 novembre 2023) : 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.

Texte intégral
Résumé :
This thesis aims to explore the intellectual property protection of virtual IP in the era of the digital economy and its jurisprudential discussion. With the continuous development of science and technology and the rise of the digital economy, virtual IP (virtual image and digital person) presents diverse connotations and expressions as an essential part of the digital economy. However, the intellectual property protection of virtual IP faces many dilemmas and challenges. This paper conducts an in-depth study on the protection of virtual IP through the legal perspective and puts forward some methods and strategies to crack the dilemma of virtual IP legal rights and interests. By improving the legal framework, clarifying the definition standard of virtual IP, and determining the scope of protected rights and interests of virtual IP, the legal protection of virtual IP can be effectively enhanced, and the legitimacy and stability of the property rights and interests of virtual IP can be maintained. This study has important theoretical and practical significance for promoting the development of the digital economy and protecting the intellectual property rights of virtual IP.
Styles APA, Harvard, Vancouver, ISO, etc.
5

CORREIA, N. S. C., et M. C. R. MEDEIROS. « Survivability in IP-over-WDM Networks : WDM Lightpath Protection versus IP LSP Protection ». Fiber and Integrated Optics 24, no 3-4 (mai 2005) : 353–69. http://dx.doi.org/10.1080/01468030590923046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Saha, Debasri, et Susmita Sur-Kolay. « SoC : A Real Platform for IP Reuse, IP Infringement, and IP Protection ». VLSI Design 2011 (5 avril 2011) : 1–10. http://dx.doi.org/10.1155/2011/731957.

Texte intégral
Résumé :
Increased design complexity, shrinking design cycle, and low cost—this three-dimensional demand mandates advent of system-on-chip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and summarization to focus on the inherent tradeoff, existing security holes, and new research directions. This paper discusses the IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries, categorizes these infringements, and applies strategic analysis on the effectiveness of the existing IPP techniques for these categories of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Newbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez et W. T. Holman. « Watermarking ICs for IP protection ». Electronics Letters 38, no 6 (2002) : 272. http://dx.doi.org/10.1049/el:20020143.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bolos, Mihaela Daciana. « IP Protection and International Trade ». Procedia Economics and Finance 3 (2012) : 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Shi, Guanming, Carl Pray et Wenhui Zhang. « Effectiveness of Intellectual Property Protection : Survey Evidence from China ». Agricultural and Resource Economics Review 41, no 3 (décembre 2012) : 286–97. http://dx.doi.org/10.1017/s106828050000126x.

Texte intégral
Résumé :
This paper examines Chinese pesticide firms’ use and perceptions of various means of intellectual property (IP) protection in protecting their innovations, using a unique dataset from 97 pesticide firms surveyed in 2008. These firms rate Chinese patents as quite effective in protecting their IP from infringement, although 70 percent of them state that improved enforcement is needed. Those firms that have been granted patents and those that claim their patents have been infringed upon both give lower ratings to the perceived effectiveness of patents. Trademarks are rated as less effective than patents, but firms that have had experience with patenting and infringement of patents tend to rate trademarks as more effective than those firms that do not have direct experience with the patent system. General government policies to encourage increased privatization, more private R&D, and higher education are associated with more faith in IP, but policies to strengthen IP by promoting mandatory IP training and the development of specialized IP divisions in the firms do not influence perceptions of IP effectiveness. We conclude that if the Chinese government wants to encourage innovation using IP protection, it must focus on improving the enforcement of patents.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Correia, N. S. C., et M. C. R. Medeiros. « On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection ». Photonic Network Communications 10, no 1 (juillet 2005) : 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Protection des IP"

1

Marolia, Pratik M. « Watermarking FPGA bitstream for IP protection ». Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Texte intégral
Résumé :
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lubasi, Mampi Nakutoma. « Real-time bandwidth encapsulation for IP/MPLS Protection Switching ». Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Texte intégral
Résumé :
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Boni, Giacomo <1996&gt. « Legal Regulation and IP Rights Protection of Online games in China ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Texte intégral
Résumé :
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the main companies and what trends are they following, regarding both hardware and software. In the latter part of the chapter, a brief confrontation of how said main countries view this industry from an IP (intellectual property) point of view. In the second one, the core, the author shifts the focus to the PRC, and researches the historic reasons for the current videogame publication regulation, from 2004 to 2018. Aiming to explain phenomenon such as the “console ban” and “licensing freeze” which deeply impacted the local industry. After this introduction the Author follows to analyze the main IP laws in china and their relevance to the videogaming market as well as providing example of how such law impact their economic environment. Finally, in the conclusion, the case study of the Digital Bros company is provided, analyzing the reasons and practices that allowed them successfully enter the Chinese videogame publishing market as well as some prediction for the future evolution of Chinese IP laws in the sector based on the content of the previous chapters .
Styles APA, Harvard, Vancouver, ISO, etc.
4

Buffet, Julien. « Techniques de protection contre les erreurs pour le streaming audio sur IP ». Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Texte intégral
Résumé :
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection contre les erreurs adaptée au codage MPEG-4 Audio combinant une adaptation au débit, un entrelacement de paquets et une récupération d'erreurs s'appuyant sur la FEC a été développée. Pour l'adaptation de débit et la récupération d'erreur, les propriétés de granularité et de "scalabilité" du flux MPEG-4 Audio sont utilisées. Un mécanisme d'entrelacement s'adaptant au processus de perte est mis en oeuvre. La combinaison de ces mécanismes donne lieu à un protocole "TCP fiendly" pour transferer en temps réel des données MPEG-4 au-dessus d'IP. Il a été impléménté pour l" streaming unicast. La plupart des technique FEC indépendantes du codage sont des adaptations de la théorie générale du codage au cas particulier des erreurs de streaming. Les codes correcteurs tel que les codes Hamming ou les codes Reed-Solomon peuvent détecter et corriger une ou plusieurs erreurs apparaissant sporadiquement dans un canal. Mais dans le streaming Internet qui nous concerne, les erreurs ont déjà été détectées par les protocoles bas niveau, le seul problème est la correctio. C'est un problème bien plus facile que celui de la détection-correction et nous n'avons pas besoin d'utiliser la théorie des codes correcteurs pour y répondre. Une nouvelle méthode dédiée aux problèmes de streaming a été développée en utilisant la théorie des systèmes linéaires sur des corps ou des anneaux finis.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hallbäck, Erik. « Digital Rights Management on an IP-based set-top box ». Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Texte intégral
Résumé :

Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.

This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.

Styles APA, Harvard, Vancouver, ISO, etc.
6

Simpson, Eric. « Runtime Intellectual Property Protection on Programmable Platforms ». Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Texte intégral
Résumé :
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provides mutual assurances for the end-user and the intellectual-property developer. Further, this work demonstrates the use of SAM in a secure video messaging device on top of a Virtex-II Pro development system
Master of Science
Styles APA, Harvard, Vancouver, ISO, etc.
7

Colombier, Brice. « Methods for protecting intellectual property of IP cores designers ». Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Texte intégral
Résumé :
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettre au point un système complet d'activation à distance de composants virtuels, permettant au concepteur de savoir exactement combien de composants virtuels sont effectivement utilisés. Pour cela, les deux premières contributions de cette thèse portent sur la modification de la logique combinatoire d'un composant virtuel afin de le rendre activable. La première méthode permet de forcer les sorties à une valeur fixe de manière contrôlée. La seconde est une technique efficace de sélection de nœuds à altérer, encore une fois de manière contrôlée, afin de rendre le composant virtuel temporairement inutilisable. La troisième contribution de cette thèse est une méthode légère de correction d'erreurs à appliquer aux réponses issues des fonctions physiques non-clonables, qui constituent un identifiant intrinsèque des instances du composant virtuel. Réutilisant un protocole de correction d'erreurs issu de l'échange quantique de dés, cette méthode est beaucoup plus légère que les codes correcteurs d'erreurs classiquement utilisés pour cette application
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fan, Dian. « Scalable Video Transport over IP Networks ». Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Texte intégral
Résumé :
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the available bandwidth and heterogeneous terminals. This work aims at improving the efficacy of scalable video transport over IP networks. In this work, we first propose an optimal interleaving scheme combined with motion-compensated fine granularity scalability video source coding and unequal loss protection schemes, under an imposed delay constraint. The network is modeled as a packet-loss channel with random delays. The motion compensation prediction, ULP allocation and the depth of the interleaver are jointly optimized based on the network status and the delay constraint. We then proceed to investigate the multiple path transport technique. A unified approach which incorporates adaptive motion compensation prediction, multiple description coding and unequal multiple path allocation, is proposed to improve both the robustness and error resilience property of the video coding and transmission system, while the delivered video quality is improved simultaneously. To analytically investigate the efficacy of error resilient transport schemes for progressively encoded sources, including unequal loss protection, best-effort and FEC transport schemes, we develop evaluation and optimization approaches for these transport schemes. In this part of the work, the network is modeled as an M/D/1/K queue, and then a comprehensive queueing analysis is provided. Armed with these results, the efficacy of these transport schemes for progressively encoded sources are investigated and compared.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Müller, Karen E. « MPLS-based recovery ». Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Texte intégral
Résumé :
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ekrt, Ondřej. « Trademark and Design Protection of Applied Art ». Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Texte intégral
Résumé :
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community designs.   Further, the scope of protection conferred by both instruments is analysed and evaluated and it should be determined which type of protection confers a wider protection on its owner. The thesis also aims to respond a question “which of the analysed intellectual property law instruments is more suitable and favourable for protecting an appearance of products.” Therefore, based on this thesis, users of trademarks and designs should be able to decide which of these two types of protection they should use in order to protect their products or products of their clients.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Protection des IP"

1

American Bar Association. Section of Intellectual Property Law, dir. IP protection in China. Chicago, Illinois : American Bar Association, Section of Intellectual Property Law, 2015.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Editorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing : Intellectual Property Publishing House, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Bossuet, Lilian, et Lionel Torres, dir. Foundations of Hardware IP Protection. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

M, Hyland Mark LL, Carey Louise et Law Society of Ireland, dir. Technology and IP law. Haywards Heath, West Sussex : Tottel Pub., 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Li, Meng, et David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Vasseur, Jean-Philippe. Network recovery : Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif : Morgan Kaufmann, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Këllezi, Pranvera, Bruce Kilpatrick et Pierre Kobel, dir. Liability for Antitrust Law Infringements & ; Protection of IP Rights in Distribution. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Mario, Pickavet, et Demeester Piet, dir. Network recovery : Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam : Elsevier/Morgan Kaufmann, 2004.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Wolf, Wayne Hendrix. Modern VLSI design : IP-based design. 4e éd. Upper Saddle River, NJ : Prentice Hall, 2008.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Zeidman, Robert. The software IP detective's handbook : Measurement, comparison, and infringement detection. Upper Saddle River, NJ : Prentice Hall, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Protection des IP"

1

Gassmann, Oliver, Angela Beckenbauer et Sascha Friesike. « The IP Protection Star ». Dans Profiting from Innovation in China, 43–87. Berlin, Heidelberg : Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty et Ramesh Karri. « Obfuscation for IP Protection ». Dans Security of Biochip Cyberphysical Systems, 87–109. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty et Ramesh Karri. « Watermarking for IP Protection ». Dans Security of Biochip Cyberphysical Systems, 61–85. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Heim, Irina. « The Protection of IP ». Dans Intellectual Property Management, 37–52. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Jung, Edward, et Lilian Bossuet. « IP FSM Watermarking ». Dans Foundations of Hardware IP Protection, 65–84. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Jayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu et J. Rajendran. « Analog IP Protection and Evaluation ». Dans Emerging Topics in Hardware Security, 419–69. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Zamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi et Mark Tehranipoor. « IP Protection : A Historical View ». Dans Understanding Logic Locking, 47–62. Cham : Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Torres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol et Lilian Bossuet. « Digital Right Management for IP Protection ». Dans Foundations of Hardware IP Protection, 1–13. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Cambou, Bertrand. « Enhancing Secure Elements—Technology and Architecture ». Dans Foundations of Hardware IP Protection, 205–31. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Colombier, Brice, Lilian Bossuet et David Hély. « Turning Electronic Circuits Features into On-Chip Locks ». Dans Foundations of Hardware IP Protection, 15–36. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Protection des IP"

1

Dalpasso, Marcello, Alessandro Bogliolo et Luca Benini. « Hardware/software IP protection ». Dans the 37th conference. New York, New York, USA : ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Su, Hui-Kai, Cheng-Shong Wu et Yuan-Sun Chu. « IP Local Node Protection ». Dans 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Cammarota, Rosario, Indranil Banerjee et Ofer Rosenberg. « Machine learning IP protection ». Dans ICCAD '18 : IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA : ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Wang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain et Ning Zhang. « IP Protection in TinyML ». Dans 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Liu, Qiang, et Haie Li. « A hierarchical IP protection approach for hard IP cores ». Dans 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Rampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale et Mario Barbareschi. « Digital Right Management for IP Protection ». Dans 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Li, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu et Patrick P. C. Lee. « Achieving Unified Protection for IP Routing ». Dans 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Wood, Steve, et Gordon W. Romney. « Protection methods against IP packet attacks ». Dans the 5th conference. New York, New York, USA : ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Kepa, Krzysztof, Fearghal Morgan et Krzysztof Kosciuszkiewicz. « IP protection in Partially Reconfigurable FPGAs ». Dans 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Collini, Luca, Benjamin Tan, Christian Pilato et Ramesh Karri. « Reconfigurable Logic for Hardware IP Protection ». Dans ICCAD '22 : IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Protection des IP"

1

Hanlon, Walker, et Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA : National Bureau of Economic Research, novembre 2019. http://dx.doi.org/10.3386/w26490.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Minero Alejandre, Gemma. Ownership of Databases : Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Texte intégral
Résumé :
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern digital economy, data are being dubbed the ‘new oil’ and the sui generis right might be con- sidered a right to control any access to the database, thus having an undeniable relevance. Besides, there are still important inconsistences between IP Law and the GDPR, which must be removed by the European legislator. The genuine and free consent of the data subject for the use of his/her data must remain the first step of the legal analysis.
Styles APA, Harvard, Vancouver, ISO, etc.
3

De León, Ignacio L., et Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights : A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, septembre 2016. http://dx.doi.org/10.18235/0007023.

Texte intégral
Résumé :
This document analyzes the perceptions of small innovative enterprises (SIE) in Latin America of the effectiveness of the legal protection afforded by intellectual property rights (IPR). To analyze the costs of using IPR, the study surveyed 352 SIEs from Chile, Colombia, Costa Rica, Ecuador, Mexico, and Peru. It found evidence that SIEs do not know how the IP system works, and that most SIEs consider that knowing how it works is not important for business performance. The study finds large differences among countries with respect to the need to hire legal services to apply for IPR. There are also differences in perceptions of the efficiency of the IP system, unrelated to the countries' IPR enforcement (Park, 2008). The study also finds differences in the perception of the disadvantage in protect their IPR when innovations are imitated by a large firm. This difference is related to the countries' IPR enforcement.
Styles APA, Harvard, Vancouver, ISO, etc.
4

The Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, septembre 2022. http://dx.doi.org/10.53892/gzum7792.

Texte intégral
Résumé :
This report identifies possible pathways towards the integration of a rights-based approach in the legal conservation frameworks of Colombia and Peru. It does so in the context of tenure rights recognition for Indigenous Peoples (IP) and Afro-descendant Peoples (ADP) as an effective strategy for biodiversity protection in the Amazon. With this in mind, it highlights opportunities for implementing a rights-based approach within current and medium-term conservation frameworks and policies in both countries.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie