Thèses sur le sujet « Protection des IP »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Protection des IP.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 44 meilleures thèses pour votre recherche sur le sujet « Protection des IP ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Marolia, Pratik M. « Watermarking FPGA bitstream for IP protection ». Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Texte intégral
Résumé :
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lubasi, Mampi Nakutoma. « Real-time bandwidth encapsulation for IP/MPLS Protection Switching ». Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Texte intégral
Résumé :
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Boni, Giacomo <1996&gt. « Legal Regulation and IP Rights Protection of Online games in China ». Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Texte intégral
Résumé :
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the main companies and what trends are they following, regarding both hardware and software. In the latter part of the chapter, a brief confrontation of how said main countries view this industry from an IP (intellectual property) point of view. In the second one, the core, the author shifts the focus to the PRC, and researches the historic reasons for the current videogame publication regulation, from 2004 to 2018. Aiming to explain phenomenon such as the “console ban” and “licensing freeze” which deeply impacted the local industry. After this introduction the Author follows to analyze the main IP laws in china and their relevance to the videogaming market as well as providing example of how such law impact their economic environment. Finally, in the conclusion, the case study of the Digital Bros company is provided, analyzing the reasons and practices that allowed them successfully enter the Chinese videogame publishing market as well as some prediction for the future evolution of Chinese IP laws in the sector based on the content of the previous chapters .
Styles APA, Harvard, Vancouver, ISO, etc.
4

Buffet, Julien. « Techniques de protection contre les erreurs pour le streaming audio sur IP ». Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Texte intégral
Résumé :
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection contre les erreurs adaptée au codage MPEG-4 Audio combinant une adaptation au débit, un entrelacement de paquets et une récupération d'erreurs s'appuyant sur la FEC a été développée. Pour l'adaptation de débit et la récupération d'erreur, les propriétés de granularité et de "scalabilité" du flux MPEG-4 Audio sont utilisées. Un mécanisme d'entrelacement s'adaptant au processus de perte est mis en oeuvre. La combinaison de ces mécanismes donne lieu à un protocole "TCP fiendly" pour transferer en temps réel des données MPEG-4 au-dessus d'IP. Il a été impléménté pour l" streaming unicast. La plupart des technique FEC indépendantes du codage sont des adaptations de la théorie générale du codage au cas particulier des erreurs de streaming. Les codes correcteurs tel que les codes Hamming ou les codes Reed-Solomon peuvent détecter et corriger une ou plusieurs erreurs apparaissant sporadiquement dans un canal. Mais dans le streaming Internet qui nous concerne, les erreurs ont déjà été détectées par les protocoles bas niveau, le seul problème est la correctio. C'est un problème bien plus facile que celui de la détection-correction et nous n'avons pas besoin d'utiliser la théorie des codes correcteurs pour y répondre. Une nouvelle méthode dédiée aux problèmes de streaming a été développée en utilisant la théorie des systèmes linéaires sur des corps ou des anneaux finis.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hallbäck, Erik. « Digital Rights Management on an IP-based set-top box ». Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Texte intégral
Résumé :

Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.

This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.

Styles APA, Harvard, Vancouver, ISO, etc.
6

Simpson, Eric. « Runtime Intellectual Property Protection on Programmable Platforms ». Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Texte intégral
Résumé :
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provides mutual assurances for the end-user and the intellectual-property developer. Further, this work demonstrates the use of SAM in a secure video messaging device on top of a Virtex-II Pro development system
Master of Science
Styles APA, Harvard, Vancouver, ISO, etc.
7

Colombier, Brice. « Methods for protecting intellectual property of IP cores designers ». Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Texte intégral
Résumé :
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettre au point un système complet d'activation à distance de composants virtuels, permettant au concepteur de savoir exactement combien de composants virtuels sont effectivement utilisés. Pour cela, les deux premières contributions de cette thèse portent sur la modification de la logique combinatoire d'un composant virtuel afin de le rendre activable. La première méthode permet de forcer les sorties à une valeur fixe de manière contrôlée. La seconde est une technique efficace de sélection de nœuds à altérer, encore une fois de manière contrôlée, afin de rendre le composant virtuel temporairement inutilisable. La troisième contribution de cette thèse est une méthode légère de correction d'erreurs à appliquer aux réponses issues des fonctions physiques non-clonables, qui constituent un identifiant intrinsèque des instances du composant virtuel. Réutilisant un protocole de correction d'erreurs issu de l'échange quantique de dés, cette méthode est beaucoup plus légère que les codes correcteurs d'erreurs classiquement utilisés pour cette application
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Styles APA, Harvard, Vancouver, ISO, etc.
8

Fan, Dian. « Scalable Video Transport over IP Networks ». Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Texte intégral
Résumé :
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the available bandwidth and heterogeneous terminals. This work aims at improving the efficacy of scalable video transport over IP networks. In this work, we first propose an optimal interleaving scheme combined with motion-compensated fine granularity scalability video source coding and unequal loss protection schemes, under an imposed delay constraint. The network is modeled as a packet-loss channel with random delays. The motion compensation prediction, ULP allocation and the depth of the interleaver are jointly optimized based on the network status and the delay constraint. We then proceed to investigate the multiple path transport technique. A unified approach which incorporates adaptive motion compensation prediction, multiple description coding and unequal multiple path allocation, is proposed to improve both the robustness and error resilience property of the video coding and transmission system, while the delivered video quality is improved simultaneously. To analytically investigate the efficacy of error resilient transport schemes for progressively encoded sources, including unequal loss protection, best-effort and FEC transport schemes, we develop evaluation and optimization approaches for these transport schemes. In this part of the work, the network is modeled as an M/D/1/K queue, and then a comprehensive queueing analysis is provided. Armed with these results, the efficacy of these transport schemes for progressively encoded sources are investigated and compared.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Müller, Karen E. « MPLS-based recovery ». Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Texte intégral
Résumé :
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Ekrt, Ondřej. « Trademark and Design Protection of Applied Art ». Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Texte intégral
Résumé :
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community designs.   Further, the scope of protection conferred by both instruments is analysed and evaluated and it should be determined which type of protection confers a wider protection on its owner. The thesis also aims to respond a question “which of the analysed intellectual property law instruments is more suitable and favourable for protecting an appearance of products.” Therefore, based on this thesis, users of trademarks and designs should be able to decide which of these two types of protection they should use in order to protect their products or products of their clients.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Kan, Daniel Dao-Jun 1979. « Design of survivable IP-over-WDM networks : providing protection and restoration at the electronic layer ». Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87353.

Texte intégral
Résumé :
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.
Includes bibliographical references (leaves 107-109).
by Daniel Dao-Jun Kan.
S.M.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Martirosyan, Nelli. « Protecting IP at the Border : A Study of Customs Enforcement Mechanism for Protection of Intellectual Property Rights in the Eurasian Economic Union ». Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412925.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Johansson, Elena. « Protection of Intellectual Property in the Russian Federation : Institutions and Organizations ». Thesis, Södertörns högskola, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-33803.

Texte intégral
Résumé :
Infringement in fields of Intellectual Property Rights is a global problem causing repeated and sustained attention at national and international levels. A number of different organizations and commissions are constantly control and counteract the growth of these infringements, but despite the taken measures counterfeit and piracy goods continue to be manufactured and sold around the world. The Russian Federation (RF) is a country that has close commercial ties with many foreign states, including Sweden. However the RF is one of the countries, included on the Special 301 Priority Watch List due to the continuing and large - scale of Property Rights and Intellectual Property Rights violations. In this connection, a study was conducted with the participation of collaborating Swedish - Russian enterprises, whose activities could be subjected to counterfeiting and IP piracy. The aim of the study is to determine how collaborating Swedish – Russian enterprises with branches in the Russian Federation perceive the situation in the country and assess the activities of Russian institutions that play an important role in controlling and combating violations against counterfeiting and IP piracy. Moreover the aim includes identifying the most vulnerable class of actors in the general mechanism of counterfeiting and IP piracy. The research based on elements of the New Institutional Economics Theory and conducted by using a combination of a literature review and semi- structured interview with representatives of Swedish - Russian enterprises. The study found that organizations are the most vulnerable class of actors in general mechanism of counterfeiting and IP piracy. International firms and companies are in a more difficult situation because they provide own activities simultaneously in several legal and political systems. Representatives of interviewed companies argue that activities of analyzed Russian institutions are insufficiently effective and the state should take a set of measures so the foreign collaborative organizations could feel confident in territory of the RF and Russian market would become more attractive for foreign business.
Styles APA, Harvard, Vancouver, ISO, etc.
14

SZABAS, CLAUDIO ALEJANDRO. « FOUNTAIN CODES AND OTHER CHANNEL CODING SCHEMES FOR PROTECTION OF TRANSPORT STREAMS OVER IP NETWORKS WITH PACKET ERASURE ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17792@1.

Texte intégral
Résumé :
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Há, nos dias atuais, uma crescente demanda pelo transporte de video sobre IP, i.e., para distribuição de conteúdo pela Internet, por serviços de IPTV em definição padrão e em alta definição e, mesmo para uso interno nas redes de emissoras tradicionais de televisão, que transportam contribuições de elevada qualidade para seus programas. Em tais aplicações, o conteúdo dos programas é transportado usando MPEG-2 ou MPEG-4, sob a forma de MPEG-2 Transport Streams, encapsulados com protocolos tais como RTP, UDP e IP. As redes IP, que são modelizadas como Redes com Apagamento de Pacotes (PEC) não foram, no entanto, concebidas para o transporte de mídias em tempo real, esbarra portanto em problemas comuns como perdas de pacotes e jitter, gerando perturbações que se refletem na recepção do conteúdo. Os métodos tradicionais para superar estas dificuldades, como por exemplo, os que se baseiam em retransmissões usando protocolos ARQ (Automatic Repeat on Request), não são uma solução eficiente para proteger a transmissão de multimídia em tempo real. A proteção de multimídia transmitida em tempo real via IP recorre, neste caso, aos códigos para canal. Há códigos para canal recomendados em RFC s e Padrões, usados amplamente pelos fabricantes de equipamento. Os modernos Códigos Fontanais, possuem características atraentes para o transporte de conteúdos multimídia em tempo real. Neste trabalho, simulações são realizadas, onde o conteúdo encapsulado em Transport Stream, é protegido com Códigos Fontanais antes do encapsulamento para o envio através da rede. A título de comparação, o experimento é realizado também usando outros códigos para canal recomendados. Para realizar a comparação são usadas medições padronizadas do Transport Stream, medições objetivas como artefatos de blocagem e finalmente uma análise subjetiva do conteúdo recebido é usada. O trabalho conclui com a proposta de um Codificador de canal adaptável para Transport Stream.
There is a growing demand for the transport of video over IP today, i.e., for content distribution over the Internet, IPTV services in Standard and High Definition, or even inside traditional broadcasters networks, transporting broadcast quality contributions to the main program. In such applications, the source encoded MPEG-2 or -4 content is transported in the form of MPEG-2 Transport Streams, encapsulated over network protocols. However, IP networks, which can be modeled as Packet Erasure Networks (PEC), were not originally designed for the transport of real time media. There are problems, such as packet drops and jitter, which generate severe impairments in the content that is decoded at the reception. Traditional methods for overcoming these problems, as for example retransmissions performed by Automatic Repeat Request (ARQ) protocols, are not suitable for real-time multimedia protection. Channel coding is the solution of choice for protecting real-time multimedia over IP. There are channel coding schemes specified in open recommendations and Standards, widely adopted by equipment vendors today. Fountain Codes present very attractive characteristics for the transport of real-time multimedia. In the present work, simulations with a Fountain code, protecting Transport Stream contents prior to network encapsulation, are presented. The experiment if repeated with other channel coding techniques commonly employed today. In order to analyze the decoded contents and obtain comparative results, standardized Transport Stream measurements, objective Blocking Artifacts measurements and subjective analysis of the decoded samples are employed. This work is concluded with the proposal of a Transport Stream Adaptive channel encoder, that is explained in Appendix-B.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Criqui-Barthalais, Géraldine. « La protection des libertés individuelles sur le réseau internet ». Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020076/document.

Texte intégral
Résumé :
Cette étude envisage le réseau internet comme un nouvel espace invitant à réinterpréter les libertés de la personne physique. Au titre de celles-ci, sont protégées la liberté individuelle, entendue comme le fait de ne pouvoir être arbitrairement détenu et la liberté d’aller et venir. Il doit en aller de même sur le réseau. Etablissant une analogie avec ces libertés, la première partie de la thèse consacre deux libertés : la liberté d’accès au réseau et la liberté de naviguer sur le web. La première implique de définir le contenu d’un service public de l’accès. De plus, il faut affirmer que la coupure d’accès au réseau doit être envisagée comme une mesure privative de liberté ; elle ne peut donc être décidée que par le juge judiciaire. L’affirmation de la liberté de naviguer sur le web conduit à envisager le régime du blocage des sites, une mesure qui ne peut intervenir que dans le cadre d’une police administrative spéciale. Dans la seconde partie il apparaît que ces deux libertés n’ont toutefois de sens que si l’individu a accès au réseau anonymement et n’est pas surveillé arbitrairement quand il navigue sur le web. Cette étude cherche ainsi à préciser le régime devant encadrer le mécanisme d’adressage du réseau. Sont définies les conditions du contrôle de l’identité de l’internaute à partir de son adresse IP. Enfin, il est soutenu qu’un principe général d’effacement des données révélant les sites visités doit être affirmé, principe qui s’applique aux différents acteurs du réseau, notamment les moteurs de recherche. L’interception de ces données ne peut procéder que d’un pouvoir sécuritaire ou hiérarchique sur l’internaute
This study considers the internet as a new territory where rights guaranteed to each individual in physical space can be promoted; not only free speech and privacy, but also the Habeas Corpus prerogative writ, which protects against unlawful imprisonment, and the right to freedom of movement. Thus, processing by analogy, the dissertation intends to promote two specific digital rights: the freedom to connect to the internet and the freedom to surf on the web. The freedom to connect should be part of a public service which promotes this access through public policies. Moreover, barring someone from using the internet can only be decided by a judge. The freedom to surf should protect the web users against unreasonable restrictions. Thus, measures blocking illegal websites should not come through self-regulation but through a legal framework which defines how administrative authorities are entitled to decide such restrictions. The protection of these two rights entails further obligations. Individuals must access the internet anonymously and they must be aware of how the government monitors their actions on the web. This study tries to outline the content of measures aiming to frame network addressing mechanisms. Identity checks based on the IP address should be subject to a strict legal regime. The study concludes that individuals have to be protected from surveillance when data reveal their choices among websites while they are connected. Internet access providers, but also search engines and browsers, must delete this data. Only special measures taken by a public entity or someone entitled to control the web users may lead to this kind of data retention
Styles APA, Harvard, Vancouver, ISO, etc.
16

LEME, CLAUDIA BARUCKE MARCONDES PAES. « PROTECTION AND RESTORATION, TOGETHER WITH NODE ADDRESSING AND TMN MANAGEMENT FOR IP OVER DWDM OPTICAL NETWORKS BY USING PHYSICAL LAYER ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2000. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7495@1.

Texte intégral
Résumé :
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
Esta dissertação tem como objetivo explorar as possibilidades de introdução de inteligência na camada física de uma Rede Óptica de Telecomunicações, visando a sua aplicação futura. A utilização de subportadoras de RF - introduzidas no domínio óptico através de moduladores Mach-Zehnder -, associada a tecnologias de múltiplo acesso óptico, permite a construção de mecanismos de proteção, restauração, endereçamento, qualidade de serviço e gerenciamento TMN, na camada física. A vantagem da solução proposta reside no aumento de velocidade de operação da rede, bem como na redução do custo e da complexidade de seu gerenciamento, uma vez que nesta configuração os pacotes de informação são abertos somente ao atingirem seu nó destino. Os resultados obtidos sugerem que esta configuração pode ser utilizada para a operação e o gerenciamento de toda uma rede óptica de altíssima velocidade.
The objective of this work is to explore the possibilities of built-in intelligence embedded in the physical layer of an Optical Telecommunications Network, aiming at its future applications. The use of RF subcarriers - introduce above the optical payload through Mach-Zehnder modulators -, associated with multiple acess technologies, allows for protection, restoration, addressing, Quality of Service and TMN management network complexity and cost, while increasing its operational speed, since this approach allows data packages to be opened only when they reach their destination node. The results obtained suggest that this arrangement could be used for networking and management of ultra-high-speed optical systems.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Lücking, Thomas [Verfasser], et Marcus [Gutachter] Wagner. « Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection / Thomas Lücking. Gutachter : Marcus Wagner ». Würzburg : Universität Würzburg, 2013. http://d-nb.info/110282254X/34.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Kalysch, Anatoli [Verfasser], Felix [Akademischer Betreuer] Freiling, Felix [Gutachter] Freiling et André Ricardo Abed [Gutachter] Grégio. « Android Application Hardening : Attack Surface Reduction and IP Protection Mechanisms / Anatoli Kalysch ; Gutachter : Felix Freiling, André Ricardo Abed Grégio ; Betreuer : Felix Freiling ». Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2020. http://d-nb.info/1214888453/34.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Karlsson, Hanna. « Trademark Protection for the Chinese Market - A study on Swedish retail companies established in China ». Thesis, Umeå universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-171035.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Blaise, Agathe. « Novel anomaly detection and classification algorithms for IP and mobile networks ». Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS257.

Texte intégral
Résumé :
Ces dernières années ont été marquées par une nette augmentation de la fréquence et de la diversité des attaques réseau, qui apparaissent toujours plus sophistiquées et conçues pour être indétectables. En parallèle, des techniques sont développées pour les détecter et prendre des contre-mesures rapidement. Récemment, l’essor des techniques statistiques et d’apprentissage machine ("machine learning") ont permis un développement rapide de techniques innovantes visant à détecter de telles attaques. Ces techniques ont des applications dans de nombreux domaines qui gagneraient à être davantage automatisés. Dans le domaine des réseaux, elles s’appliquent par exemple au routage et à la classifcation de trafic et à la sécurité des réseaux. Cette thèse propose de nouveaux algorithmes de détection d’anomalies et de classification appliqués aux réseaux IP et mobiles. Au niveau IP, celle-ci présente une solution Split-and-Merge qui détecte des botnets qui se propagent lentement sur Internet en exploitant des vulnérabilités émergentes. Cette méthode analyse l’évolution à long-terme de l’usage des ports applicatifs. Ensuite, celle-ci aborde la détection d’hôtes infectés par un botnet, cette fois en utilisant des techniques de classification au niveau de l’hôte, dans une solution nommée BotFP. Enfin, cette thèse présente notre algorithme ASTECH qui permet la détection d’anomalies brutes dans les séries temporelles dans les réseaux mobiles, les regroupe en enveloppes convexes spatio-temporelles, et finalement induit plusieurs classes d’événements
Last years have witnessed an increase in the diversity and frequency of network attacks, that appear more sophisticated than ever and devised to be undetectable. At the same time, customized techniques have been designed to detect them and to take rapid countermeasures. The recent surge in statistical and machine learning techniques largely contributed to provide novel and sophisticated techniques to allow the detection of such attacks. These techniques have multiple applications to enable automation in various fields. Within the networking area, they can serve traffic routing, traffic classification, and network security, to name a few. This thesis presents novel anomaly detection and classification techniques in IP and mobile networks. At IP level, it presents our solution Split-and-Merge which detects botnets slowly spreading on the Internet exploiting emerging vulnerabilities. This technique monitors the long-term evolutions of the usages of application ports. Then, our thesis tackles the detection of botnet’s infected hosts, this time at the host-level, using classification techniques, in our solution BotFP. Finally, it presents our ASTECH (for Anomaly SpatioTEmporal Convex Hull) methodology for group anomaly detection in mobile networks based on mobile app usages
Styles APA, Harvard, Vancouver, ISO, etc.
21

Díaz, Rizo Alán Rodrigo. « Security and Trust for Wireless Integrated Circuits ». Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.

Texte intégral
Résumé :
Les menaces pour la sécurité matérielle trouvent leur origine dans la chaîne d'approvisionnement en circuits intégrés (IC) massivement mondialisée et basée sur l'externalisation que nous connaissons aujourd'hui. Le coût prohibitif de la possession d'une fonderie de semi-conducteurs de haut niveau oblige les sociétés de conception de circuits intégrés à opter pour la sous-traitance de la fabrication, l'assemblage et le test de leurs circuits. L'externalisation de ces tâches intensifie le risque d'attaques de piratage de IC et d'insertion de chevaux de Troie matériels (HT), et ces deux menaces se traduisent par des pertes de savoir-faire et des pertes financières pour le propriétaire du IC. En outre, les systèmes sur puce (SoC) complexes sont construits en intégrant des noyaux de propriété intellectuelle (IP) de tiers provenant de plusieurs fournisseurs de IP. Cependant, les intégrateurs de SoC et les fournisseurs de IP ont une relation de confiance déséquilibrée. Alors que les fournisseurs de IP sont vulnérables à la surutilisation de la IP, au clonage de la IP et à la surproduction de IC, les intégrateurs de SoC craignent d'intégrer des IP infectées par des HT dans leurs systèmes. Nous proposons une méthodologie de conception pour la sécurité basée sur le verrouillage. Nous développons une méthodologie de verrouillage spécifique aux émetteurs-récepteurs RF. Pour évaluer la sécurité des circuits intégrés sans fil, nous proposons une attaque HT qui fait fuir des informations sensibles de l'émetteur au cours d'une transmission légitime
The origin of the hardware security threats is the massively globalized and outsourcing-based Integrated Circuit (IC) supply chain that we see today. The prohibitively cost of owning a first-rate semiconductor foundry forces IC design houses to go fabless and outsource their IC fabrication, assembly, and testing. Outsourcing these tasks intensifies the risk of IC piracy attacks and Hardware Trojan (HT) insertion, and both threats translate into know-how and financial losses for the IC owner. Moreover, complex Systems-on-Chip (SoCs) are built by integrating third-party Intellectual Property (IP) cores from multiple IP providers. However, SoC integrators and IP providers have an imbalanced trust relationship. While IP providers are vulnerable to IP overuse, IP cloning, and IC overproduction, SoC integrators fear integrating HT-infected IPs into their systems. We propose a locking-based design-for-security methodology. In addition, we develop an RF transceiver-specific locking methodology that consists in two spatially separated mechanisms. inserting a locking mechanism into the circuit that unlocks with a single secret key in the form of a digital word. To assess the security of wireless ICs, we propose an HT attack that leaks sensitive information from the transmitter within a legitimate transmission
Styles APA, Harvard, Vancouver, ISO, etc.
22

Hauser, Christian. « Protecting virtual identities in mobile IP-based communication / ». Stuttgart : Inst. für Kommunikationsnetze und Rechnersysteme, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016534457&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Ben, Hadj Mohamed Asma. « Réseau de capteurs sans fil comportementaux pour l'aide au maintien à domicile par la surveillance en habitat intelligent ». Thesis, Toulouse 2, 2015. http://www.theses.fr/2015TOU20077/document.

Texte intégral
Résumé :
Ces dernières années, les réseaux de capteurs sans fil ont vu leurs champs d'applications s'élargir pour toucher plusieurs domaines dont celui de surveillance. En parallèle, le domaine à vocation médicale pour l'assistance aux personnes n’a pas manqué de s'intéresser lui aussi à cette technologie émergente face aux nombreux attraits qu'elle représente. C'est dans ce contexte que se situe notre travail de thèse. Nous nous intéressons à l'utilisation des réseaux de capteurs de type vidéo non intrusif pour la surveillance continue de personnes âgées évoluant dans leur environnement naturel. L’objectif est la proposition d’un système associant capteur vidéo et analyse intelligente locale, à un système de communication sans fil permettant la surveillance de personnes dans son habitat ou en milieu spécialisé. Nous désirons avant tout être capable d’identifier la personne surveillée et détecter son comportement, ses actions, ses mouvements afin d’agir sur son environnement via un système de communication sans fil et domotique, détecter une chute et émettre une alerte à travers le réseau. Une telle proposition, représente une solution avantageuse pour plusieurs raisons. Sur le plan économique, surveiller une personne âgée tout en la gardant dans son environnement normal permettrait de diminuer les charges d'assistance aux personnes en les traitant par un personnel spécialisé à l'hôpital ou à une maison de retraite. Un apport non négligeable est celui lié aux aspects psychiques et sociaux de la personne âgée, à qui cette surveillance discrète et imperceptible lui assure à la fois le sentiment de sécurité, de respect de la vie privée et d'autonomie
In recent years, wireless sensor networks have seen their fields of application expand to affect several areas, including monitoring. In parallel, the field medical projects to assist people did not fail to be interested in this emerging technology thanks to the attractions it represents. It is in this context that our thesis is subscribed. We are interested in the use of a non-intrusive video sensors network to monitor elderly people continuously in their natural environment. The objective is the proposal of a video sensor system combining local and intelligent analysis, a wireless communication system for monitoring people in their habitat or specialized environment. We want above all, to be able to identify and detect the monitored person's behavior as well as his actions and his movements to act on his environment via a wireless communication system and home automation. Then we aim to detect a fall and communicate an alert through the network. This proposal represents an advantageous solution for several reasons. Economically, monitor an elderly person while keeping it in his normal environment would reduce the charges of assistance to people by treating them with specialized staff at the hospital or a nursing home. A significant contribution is the one related to the psychological and social aspects of the elderly, to whom this discreet and invisible monitoring ensures both the feeling of security, respect for privacy and autonomy
Styles APA, Harvard, Vancouver, ISO, etc.
24

Benešová, Jana. « Systém ochrany práv duševního vlastnictví v Číně : problémy a ekonomické dopady ». Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193619.

Texte intégral
Résumé :
The diploma thesis deals with the issues and economic impacts of the system of Intellectual Property Rights protection in China. The work is divided into three main chapters. The theoretical framework of the system of Intellectual Property Rights is explained in the first part of the diploma thesis. It is focused on the detailed analysis of the most important types of Intellectual Property Rights, that can be found in People's Republic of China. Different ways how to protect our rights in this area are also covered in this section. The second part describes the current situation in China and compares it with some developed countries. The third part at the beginning try to find the connections between IPR system and economic growth. Then it describes the process of the implications of IPR system on the Growth of Chinese Economy and in conclusion explains the strategic importance of Intellectual Property Rights system in chinese economic growth.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Polido, Fabrício Bertini Pasquot. « Contribuições ao estudo do direito internacional da propriedade intelectual na era Pós-Organização Mundial do Comércio : fronteiras da proteção, composição do equilíbrio e expansão do domínio público ». Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/2/2135/tde-29082011-115009/.

Texte intégral
Résumé :
Após 15 anos de sua adoção pelos Membros da Organização Mundial do Comércio, o Acordo sobre os Aspectos da Propriedade Intelectual Relacionados ao Comércio (TRIPS) ainda permanece como um dos pilares das modernas instituições do sistema internacional da propriedade intelectual e merece contínua análise de seus efeitos sobre países em desenvolvimento. Nesse sentido, tendências expansionistas e níveis mais elevados de proteção dos direitos de propriedade intelectual, nas distintas esferas do multilareralismo, bilateralismo e regionalismo, são, no entanto, confrontadas com as necessidades reais dos países em desenvolvimento, que ainda devem explorar as flexibilidades existentes no Direito Internacional da Propriedade Intelectual. Isso parece ser evidente após a fase de transição do Acordo TRIPS. A implementação de obrigações relacionadas à proteção substantiva e procedimentos de aplicação efetiva da proteção (observância) dá lugar para controvérsias resultantes das demandas pelo acesso aos bens do conhecimento - bens da tecnologia e informação na ordem internacional. O presente trabalho oferece contribuição para o estudo do Direito Internacional da Propriedade Intelectual na Era Pós-OMC e propõe uma análise e reavaliação de seus elementos, princípios e objetivos. Enfatiza a tarefa imperativa de redefinição do equilíbrio intrínseco da propriedade intelectual e a manutenção e expansão do domínio público, concebidos como valores de ordem pública internacional. Nesse contexto, o trabalho propõe analisar os objetivos futuros de um regime internacional da propriedade intelectual, em parte consolidados pelos proponentes da Declaração de Doha sobre TRIPS e Saúde Pública e a Agenda da OMPI para o Desenvolvimento. Em sua estrutura, o trabalho divide-se em três partes. A primeira parte (Status Quo: O Presente e o Passado dos Direitos de Propriedade Intelectual na Ordem Internacional) analisa as políticas e objetivos justificam o regime internacional da propriedade intelectual, seus fundamentos no Pós-OMC/TRIPS e convergência das competências relacionadas à propriedade intelectual na ordem internacional. A segunda parte (O Passado Revisitado rumo ao Futuro dos Direitos de Propriedade Intelectual) aborda as implicações das tendências expansionistas e fortalecimento dos padrões de proteção da propriedade intelectual, concentrando-se em dois casos principais: a harmonização substantiva e os sistemas globais de proteção e observância dos direitos de propriedade intelectual. A terceira parte (Futuro dos Direitos de Propriedade Intelectual na Ordem Internacional) propõe a redefinição dos princípios e objetivos centrais do Direito Internacional da Propriedade Intelectual no Pós-OMC (equilíbrio, transparência, cooperação internacional e transferência de tecnologia) e a manutenção e expansão do domínio público, flexibilidades e opções para acesso aos bens da tecnologia e informação.
After 15 years from its adoption by the Member States of World Trade Organization, the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) still remains as one of the main pillars of the modern institutions of international intellectual property system and deserves a continuous assessment analysis of its overall impacts on developing countries, their innovation systems and developmental concerns. In this sense, expansionist trends and higher levels of protection of intellectual property rights (IPRs) in multilateral, regional and bilateral levels - are nevertheless confronted with the actual needs of developing countries in exploring existing and pending flexibilities within the international intellectual property legal regime. This appears to be true particularly after the post-transitional phase of TRIPS Agreement, where implementation of the multilateral obligations related to substantive protection and enforcement procedures gave rise to considerable contentious issues emerging from demands for access to global public goods, knowledge goods. This Doctoral Thesis offers a contribution to the current debate on International Intellectual Property Law in Post-WTO Era and proposes an analysis and reappraisal of its elements, principles and objectives. The work aims at focusing the imperative task of redefining the intrinsic balance of intellectual property and maintenance and expansion of the public domain as values of an international ordre public. In this context, we analyze the systemic objectives of a prospective international intellectual property regime, which were in part consolidated by the proponents of Doha Declaration on TRIPS and Public Health of 2001 and WIPO Development Agenda. In the first part (Status Quo: Past and Present of Intellectual Property in International Order) we analyze the main development of the current international intellectual property regime, its foundations in Post WTO/TRIPS, and convergent intellectual property related competences in international legal order. The second part (Present revisited towards the future of intellectual property rights) approaches the implications of expansionist trends and strengthening of standards of IP protection. In this case, our work focuses on two particular cases: the substantive harmonization and global protection systems and enforcement of intellectual property rights. The third part (Future of Intellectual Property Rights in International Legal System) further analyses core objectives and principles of International Intellectual Property Law in Post-WTO (balance, transparency, international cooperation and transfer of technology) and proposals for the maintenance and expansion of public domain, flexibilities and options for the access to the knowledge goods.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Kvasnička, Karel. « Mobilní zdroje elektrické energie ». Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413211.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Wei, shongyang, et 魏崇晏. « IP-in-IP tunnelling mechanism for multihop protection in IP network based on shortest path criteria ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29127908817766282676.

Texte intégral
Résumé :
碩士
國立中正大學
通訊工程研究所
100
The IP network is the core foundation of the Internet routing protocol for transmission of IP packets will affect the efficiency in the use of the entire network and communications quality. A good IP network will have several characteristics:simplicity, packet-switched, connectionless, memoryless, best-effort. Therefore, Internet protocol has several advantages: flexible, robust, lower cost, provide the advantages of generalized service can be executed on any platform. Solve mechanism in IP network, network equipment damage can be divided into two types: network restoration and network protection. Network restoration is to quickly re-calculate a new path, but to re-calculate the new path will have many problems, one of which is the convergence is too slow. When the failure to the equipment and re-convergence often requires hundreds of milliseconds or even tens of seconds of time, the immediate need to deal with service users is not acceptable. In time to re-calculate a new path, the first packet-oriented prior computed backup path, not only can greatly shortest the inconvenience caused by service interruptions, but also can reduce the packet loss, improve service quality. We proposed IP-in-IP tunnel is to belong to network. When the detection of a node to pass the packet to the next node is failure, whether it is the node adjacent to the link between the failure or the node itself is failure, the first packet is encapsulated and then directed to the intended target node, this node may nearby, there may be very far away. Wait until the destination node receives the packet is encapsulated, and began to decapsulation, according to their own routing information packets will be passed to the destination, complete the entire network protection procedures.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Wu, Chun-Rong, et 吳俊融. « Watermarking HDL Codes for Soft IP Protection ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/32s4zq.

Texte intégral
Résumé :
碩士
崑山科技大學
電子工程研究所
96
Reuse-based Intellectual property (IP) design is one of the most promising techniques to take the SoC design quickly into market. However, soft IPs has higher protection requirements than hard IPs and most existing IP protection techniques are not applicable to soft IPs. In this paper, we proposed two practical schemes for HDL code protection by hiding author’s signature which is also called as watermark and similar to the idea for hard IP and multimedia data protection. We proposed how to embed watermark into HDL source codes by LUT (ROM) units and distributed SRAM. For combinational logic system, the LUT (ROM) components are very suitable for hiding watermarking. For sequential logic system, we use RAM-based FSM technique to embed the personal watermarking messages. We have modified some opencore design module with our watermarking technique, and have proved that without changing the original algorithm in the reused device and increasing additional HDL modules, the proposed watermarking technique is suitable for HDL-based reused IP.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Chen, Shi-Wei, et 陳仕偉. « An information hiding technique for Soft-IP protection ». Thesis, 2005. http://ndltd.ncl.edu.tw/handle/53816265570816373368.

Texte intégral
Résumé :
碩士
國立交通大學
資訊工程系所
93
As the progress of EDA tools and manufacturing technologies, we get shorter and shorter time-to-market. In order to catch up with the decreasing time-to-market, reuse pre-defined and pre-verified components is inevitable. This creates a new market of selling reusable pre-defined components ( i.e. Intellectual Property ). But the IP must be protected by some techniques from malicious duplication. In this thesis, we propose a new method to protect Soft-IP by hiding information in FSMs. We re-encode the state coding in the way that the difference of two states of selected edge in a specific path is equal to the information we want to hide. Through analysis, we found our method has the property of hard to be observed, hard to be removed, and hard to be faked. Using scan-chain, we can detect whether a specific FSM hides our information or not. We hide eight 8-bit information data in a UART receiver using our method. The result shows that the UART receiver works correctly and we can hide the eight 8-bit information in it without adding new states.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Hu, Hung-ta, et 胡宏達. « The Protection of IP Rights for the Drugs during Registration Process ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/96996452618593371370.

Texte intégral
Résumé :
碩士
東吳大學
法律學系
97
This essay attempts to discuss the protection of IP rights for the drugs during registration process, and analyze the main issues concerning the objections of "Data Exclusivity", "the copyright of drug product package insert" and "Patent Linkage". Taking references to the comparative study of the related laws of U.S. and TRIPS, the author would conclude the opinions as following statement: 1. The legal property of drug registration data would be belong to “the Information Commissioner” 2. The TRIPs §39.3 use “trade secret” to protect the data submitted to the Government. It's different with the law of US. Taking references to the laws of U.S., the “Data Exclusivity” would be given the right of market exclusivity; the other company has not got a right of reference or usage on these investigations. The government would disclosure information of drug safety and effectiveness to protect the public health. However, Taiwan's "Data Exclusivity" undisclosed information of drug safety and effectiveness. The author advice that drug registration data would be belong to “the Information Commissioner, "Data Exclusivity" should adopt the U.S. model legislation. In addition, the Government would restrict to disclosure the trade secret of drug registration data by “the Freedom of Government Information Law”, and refer to the law of European, American and Japan to disclosure information of drug safety and effectiveness. 3. The author thought that the package insert of original drug is a creativity work in scientific scope, and it would not become “the official document” even after the Government's review and amendment, so the package insert of original drug has the copyright. However, the expression of the generic drug's package insert was limited by legal and fact description, and the package insert of generic drug was requested to the same content as the package insert of the original drug. The generic applicants who based on trusting laws and regulations would have no illegal intentionally. Therefore the package insert of generic drugs do not infringe the package insert copyright of original drug products. The author advice the principle of “ the same as” package insert to be amended into the Pharmaceutical Affairs Act, and allow the generic drugs to put their clinical trial data on the package insert of generic drugs. At the same time, the package insert of generic drug refer or use the content of original drug's package insert, they should label the provenance of original drug's package insert. 4. Whether the “Patent Linkage” would limit the right of the generic drug’s registration because that it violate the private right of original drug, and allow the patent holder to claim its private rights in procedure of Public law. The author thought that the “Patent Linkage” is considered from the equality of the drug registration process, the prevention of unfair competition and humanity; it allows the patent holder to claim its private rights in the registration procedure, and excuse generic applicants from carrying on the clinical trial data. Under preventing the unfair competition in drug market, “Patent Linkage” still has the rationality and the validity.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Sue, Huang-Wen, et 蘇皇文. « A Study of Cross Layers Protection Scheme in IP over WDM Networks ». Thesis, 2005. http://ndltd.ncl.edu.tw/handle/02124946900787793740.

Texte intégral
Résumé :
碩士
國立中央大學
通訊工程研究所
93
Abstract Due to the explosive growth of user traffic driven by the Internet technology, network survivability has become one of the important issues of internet.deployment. In this thesis, we investigate various kinds of protection approaches in IP/MPLS-over-WDM networks. In GMPLS (Generalized Multi-Protocol Label Switching), an LSP (Label Switch Path) can be protected at either the sequential-routing approach or the integrated-routing approach. In sequential-routing approach, an LSP (LSR) can be protected at either the IP/MPLS layer protection or the optical layer. In IP/MPLS layer protection, an LSP is protected by providing a link-disjoint backup LSP between its end nodes. In optical layer protection, an LSP is protected by the backup lightpath between its end nodes. In integrated-routing approach, an LSP is protected by presenting a multilayer protection scheme for multiclass traffic in IP/MPLS over WDM networks. In order to optimize the network resources and to reduce the number of optical –electrical –optical (o-e-o) conversions, we present an integrated routing algorithm : hop-based and bandwidth-based routing algorithm (HB-IRA). In addition to considering SRLG (Shared Risk Link Group) concept, we indicate that using the load balance and o-e-o parameter can improve network utilization and decrease path cost.. The connection blocking probability and number optical-electrical-optical conversions are used as performance metrics for simulations. Simulation results show that our approach surpass to that of other lightpath protection schemes. Keyword : WDM, Integrated-routing, SRLG, LSP
Styles APA, Harvard, Vancouver, ISO, etc.
32

Chang, Chi-Chien, et 張綺倩. « Non-Weighted Load Balanced Fast Local Protection Schemes for IP Survivable Networks ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/15489552026876297817.

Texte intégral
Résumé :
碩士
國立中正大學
通訊工程學系
98
Long packet delay and service interruption are unacceptable for applications with high QoS requirement in IP networks. When a failure occurs, the total recovery time for current link state routing protocols (such as OSPF) may take up to tens of seconds to re-converge. To mitigate the impact of failures, many IP fast local recovery schemes have been proposed. However, some of them did not consider load balancing. Since the rerouted traffic must follow shortest path routing governed by link weight, it would result in congestion or overload on some heavy loaded links. In this thesis, we propose a non-weighted load balanced fast local protection scheme for IP survivable networks. Unlike conventional shortest path based routing, we relax shortest path constraints in computing working and backup routes to achieve load balancing purposes. We formulate this problem as a mixed integer linear programming (MILP) problem to minimize the traffic load on the most congested link. In the constraint set, we guarantee 100% survivability under the considered failure events. It is worth mentioning that the proposed scheme can be used to handle various kinds of scenarios including single link, single node or even shared risk link group (SRLG) failure. Since this problem is not tractable by its NP-hard property, it could not be solved by commercial optimization software directly. We propose three algorithms to decrease numbers of variables and further decompose it into several sub-problems. Each sub-problem is solved optimally and the original problem is approximated by combining the solutions of those sub-problems. We perform experiments on benchmark networks and compare the proposed scheme to well-known schemes on survivability, path lengths and link load distribution for normal and rerouted states. Through numerical results and comparisons, we delineate that the proposed approach achieves a sub-optimal solution, which is profoundly to its high survivability and load balancing at the expense of slightly longer average path hop count.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Huang, Yan-Han, et 黃彥涵. « A SAT-Based FSM Watermarking Scheme for IP Protection of Sequential Circuit Design ». Thesis, 2016. http://ndltd.ncl.edu.tw/handle/20728943387835797611.

Texte intégral
Résumé :
碩士
元智大學
資訊工程學系
104
System on Chip (SoC) is an integrated circuit which integrates computer components or other electronic systems into a single chip for combining multiple functions. With the advance of SoC technology, circuit design becomes more and more complicated, and therefore the use of ready-made Intellectual Property (IP) as the basic circuit units for a whole system design becomes a general development trend. For IP providers, how to protect their IPs from unauthorized use or plagiarized is an important issue. In addition to protecting IPs with laws or copyrights, embedding designers’ information into IPs by adding digital watermarks could be an effective way. Watermarking is a technique which embeds secret information (e.g., strings describing the information of designers) into an IP without changing the functionality. The IP providers then can use the secret information to prove their ownership for achieving IP protection. This work explores the watermarking approach of embedding a string into a sequential circuit by using the unspecified transitions and states. We transform the watermarking problem into Boolean satisfiability (SAT) problems and provide a SAT-based watermarking approach. The proposed approach is composed of two stages. Given a sequential circuit and a watermark (i.e., a string), the first stage finds the minimum number of newly added states needed for embedding the string. The second stage then finds the minimum number of required newly added transitions for embedding the string to decrease the hardware overhead. Experimental results show that, for two sets of watermarks with different features, the proposed complete method can further reduce hardware overhead for embedding the watermarks, compared to the results obtained by using the first stage. For the first set of watermarks, the results show that up to 47% of hardware cost can be reduced and for the second set of watermarks, up to 22% of hardware cost can be reduced.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Yu-Cheng, Fan. « Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication ». 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200522465300.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
35

Fan, Yu-Cheng, et 范育成. « Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication ». Thesis, 2005. http://ndltd.ncl.edu.tw/handle/60881005838219294714.

Texte intégral
Résumé :
博士
國立臺灣大學
電機工程學研究所
93
In this dissertation, the algorithm and architecture design and implementation of digital watermarking coding system are presented. The research focuses on three watermarking system: SoC IP watermarking for IP identification and digital right management framework, wavelet-based visible watermarking and fragile watermarking. Advances in semiconductor processing technology have led to rapid increases in integrated circuit (IC) design complexity. Intellectual property (IP)-based design methodologies have become a major concern in IC industries. Design reuse leads to the development of intellectual property identification techniques. A novel testing-based watermarking scheme for intellectual property (IP) identification is proposed. The principles are established for development of new watermarking IP identification procedures that depend on current IP-based design flow. Then, the digital right management framework for IP release is developed according IP identification technology. IP vendor or designer can protect and manage IPs adopting this method. The proposed scheme provides IP identification and digital right management complete solution. Visible watermarking schemes are important intellectual property right protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Efficient hardware architecture of wavelet-based adaptive visible watermarking is presented that adopts approximate technique, numerical reduction and resource sharing technique to reduce hardware complexity. Luminance characteristics are calculated to estimating the effect of background luminance. Local spatial characteristics are analyzed to characterize the activity level of pixels. The watermark image is embedding by modifying the coefficients of the host image according to scaling factor. According to experimental results, our method reduces the hardware complexity and holds high image quality. The experimental results have proven the proposed architecture is indeed hardware-effective. A fragile watermark is useful in image authentication applications. A novel wavelet-based fragile watermarking scheme is designed according to the wavelet coefficients of the host image. This fragile watermark records the characteristics of the original image and is extracted without original image. After the fragile watermark is extracted, the approximate host image can be reconstructed. Then a modified image can be detected according to the fragile watermark and the reconstructed image. Afterward, an artificial neural network is used to analyze the tampering of the host image, locate where the tampering has occurred, and identify what kind of alteration has occurred. The fragile watermark provides sufficient authentication evidence. This method is novel and efficient. In this dissertation, a testing-based IP watermarking, wavelet-based visible watermarking and fragile watermarking are designed and implemented. Solving remaining open problems related to digital watermarking and DRM developments are future research direction of the author.
Styles APA, Harvard, Vancouver, ISO, etc.
36

XIAO, BO-XIAN, et 蕭博先. « A Monitoring Cycle-based Fast Link Failure Protection Scheme for Fibbing Controlled IP Networks ». Thesis, 2019. http://ndltd.ncl.edu.tw/handle/83fvyc.

Texte intégral
Résumé :
碩士
國立中正大學
通訊工程研究所
107
Fibbing is a new network technology which enables flexible routing in IP networks. In a Fibbing network, the network controller cleverly broadcasts OSPF Link State Advertisements (LSAs) into the network to generate some fake nodes. Those fake nodes change the topology viewed by the routers so as to steer traffic in the network. As a result, the shortest path routing constraint in IP networks is relaxed. Although Fibbing networks own the capability of flexible routing, how to achieve fast failure recovery is not well addressed. Conventionally an IP network running OSPF takes a long time to converge after a failure occurs. To speed up failover, IETF has proposed Loop-Free Alternative (LFA) IP fast reroute (IPFRR). However, we discover that LFA is not compatible with Fibbing. Directly applying LFA would result in traffic loops in a Fibbing network. In this work, we propose a novel monitoring cycle-based approach for fast failure recovery. By examining the liveness of the monitoring cycles, the system controller can promptly identify the failure link followed by performing traffic reroute. Due to the routing constraint, any monitoring cycle in an IP network has to be a simple cycle. We prove that any Fibbing network with connectivity degree larger than or equal to 2-vertex and 3-edge (2V-3E) connectivity is eligible for deploying monitoring cycles to detect any single link failure. An algorithm for placing those monitoring cycles is proposed in this work. To evaluate the performance of the proposed approach, we have carried out a physical testbed network. The experimental results show that the proposed system can recover from any single link failure within 50 msec. The simulation uses GNS3 to simulate a larger topology to test whether the system can detect the fault link in a larger topology.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Chen, Yueh-Chun, et 陳岳駿. « A Study on IP Protection of Computer Program and Business Method - Focusing on Patent Law ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14148908603171229753.

Texte intégral
Résumé :
碩士
國立高雄第一科技大學
科技法律研究所
98
The subject to be explored in this thesis is inspired by the experiences of information technology. This study began by seeking ways to provide truly effective and adequate legal protection for works of computer software developers after going through an exhausting, painstaking process, particularly in modern days when the importance of intellectual property has been widely recognized, and the awareness of legal protection of various intellectual property rights is rising. In regard to computer program and business method inventions, the Copyright Law, Trade Secrets Law, Patent Law and other intellectual property-related laws are the fields that have stimulated most discussions when it comes to intellectual property protection. However, from the angle of software workers, it is natural to pursue the most extensive and effective protection in laws for the results of their efforts. Aiming to determine which legal protection is adequate for such intellectual property, this study first analyzed the provisions of the Copyright Law, Trade Secrets Law and Patent Law, as well as the characteristics of the aforementioned laws when being applied to computer programs and business methods. With a primary focus on the nature of the Patent Law and relevant regulations for an in-depth investigation, this study discussed how to adequately and appropriately provide a certain level of legal protection for inventions related to computer programs and business methods, while maintaining the objective and meaning of the Patent Law and fulfilling the purposes of technological enhancement and industrial advancement without downgrading patent rights into a mere tool for certain opportunists, in order to achieve the optimal balance between legal effects and industrial demand. Using the In re Bilski case, which has drawn most attention among the current patent cases pertaining to computer program and business method inventions, as the major example, this study elaborated on the reasoning behind the conclusion made by the United States Court of Appeals for the Federal Circuit and the final judgment of the Supreme Court of the United States announced recently. This study also combined the opinions of several scholars and experts in an attempt to provide suggestions regarding modification of the protection that Patent Law offer to computer program and business method inventions, and in the hope of establishing an integral system and standard for this subject in the future.
Styles APA, Harvard, Vancouver, ISO, etc.
38

« Defending against low-rate TCP attack : dynamic detection and protection ». 2005. http://library.cuhk.edu.hk/record=b5892579.

Texte intégral
Résumé :
Sun Haibin.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 89-96).
Abstracts in English and Chinese.
Abstract --- p.i
Chinese Abstract --- p.iii
Acknowledgement --- p.iv
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Background Study and Related Work --- p.5
Chapter 2.1 --- Victim Exhaustion DoS/DDoS Attacks --- p.6
Chapter 2.1.1 --- Direct DoS/DDoS Attacks --- p.7
Chapter 2.1.2 --- Reflector DoS/DDoS Attacks --- p.8
Chapter 2.1.3 --- Spoofed Packet Filtering --- p.9
Chapter 2.1.4 --- IP Traceback --- p.13
Chapter 2.1.5 --- Location Hiding --- p.20
Chapter 2.2 --- QoS Based DoS Attacks --- p.22
Chapter 2.2.1 --- Introduction to the QoS Based DoS Attacks --- p.22
Chapter 2.2.2 --- Countermeasures to the QoS Based DoS Attacks --- p.22
Chapter 2.3 --- Worm based DoS Attacks --- p.24
Chapter 2.3.1 --- Introduction to the Worm based DoS Attacks --- p.24
Chapter 2.3.2 --- Countermeasures to the Worm Based DoS Attacks --- p.24
Chapter 2.4 --- Low-rate TCP Attack and RoQ Attacks --- p.26
Chapter 2.4.1 --- General Introduction of Low-rate Attack --- p.26
Chapter 2.4.2 --- Introduction of RoQ Attack --- p.27
Chapter 3 --- Formal Description of Low-rate TCP Attacks --- p.28
Chapter 3.1 --- Mathematical Model of Low-rate TCP Attacks --- p.28
Chapter 3 2 --- Other forms of Low-rate TCP Attacks --- p.31
Chapter 4 --- Distributed Detection Mechanism --- p.34
Chapter 4.1 --- General Consideration of Distributed Detection . --- p.34
Chapter 4.2 --- Design of Low-rate Attack Detection Algorithm . --- p.36
Chapter 4.3 --- Statistical Sampling of Incoming Traffic --- p.37
Chapter 4.4 --- Noise Filtering --- p.38
Chapter 4.5 --- Feature Extraction --- p.39
Chapter 4.6 --- Pattern Matching via the Dynamic Time Warping (DTW) Method --- p.41
Chapter 4.7 --- Robustness and Accuracy of DTW --- p.45
Chapter 4.7.1 --- DTW values for low-rate attack: --- p.46
Chapter 4.7.2 --- DTW values for legitimate traffic (Gaussian): --- p.47
Chapter 4.7.3 --- DTW values for legitimate traffic (Self-similar): --- p.48
Chapter 5 --- Low-Rate Attack Defense Mechanism --- p.52
Chapter 5.1 --- Design of Defense Mechanism --- p.52
Chapter 5.2 --- Analysis of Deficit Round Robin Algorithm --- p.54
Chapter 6 --- Fluid Model of TCP Flows --- p.56
Chapter 6.1 --- Fluid Math. Model of TCP under DRR --- p.56
Chapter 6.1.1 --- Model of TCP on a Droptail Router --- p.56
Chapter 6.1.2 --- Model of TCP on a DRR Router --- p.60
Chapter 6.2 --- Simulation of TCP Fluid Model --- p.62
Chapter 6.2.1 --- Simulation of Attack with Single TCP Flow --- p.62
Chapter 6.2.2 --- Simulation of Attack with Multiple TCP flows --- p.64
Chapter 7 --- Experiments --- p.69
Chapter 7.1 --- Experiment 1 (Single TCP flow vs. single source attack) --- p.69
Chapter 7.2 --- Experiment 2 (Multiple TCP flows vs. single source attack) --- p.72
Chapter 7.3 --- Experiment 3 (Multiple TCP flows vs. synchro- nized distributed low-rate attack) --- p.74
Chapter 7.4 --- Experiment 4 (Network model of low-rate attack vs. Multiple TCP flows) --- p.77
Chapter 8 --- Conclusion --- p.83
Chapter A --- Lemmas and Theorem Derivation --- p.85
Bibliography --- p.89
Styles APA, Harvard, Vancouver, ISO, etc.
39

Lücking, Thomas. « Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection ». Doctoral thesis, 2013. https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-85065.

Texte intégral
Résumé :
Frequent acquisition activities in high-technology industries are due to the intense competition, driven by short product life cycles, more complex products/services and prevalent network effects. This dissertation theoretically analyzes the circumstances leading to technology-driven acquisitions and empirically tests these within a clearly defined market scenario
Die zahlreichen Unternehmensakquisitionen in Hochtechnologiebranchen sind einem intensiven Wettbewerb geschuldet, der durch immer kürzere Produktlebenszyklen, komplexere Produktdesigns und extreme Netzwerkeffekte geprägt ist. Die vorliegende Forschungsarbeit hat zum Ziel, die genauen Umstände, die zu technologiegetriebenen Akquisitionen führen, in Form von relevanten erklärenden Einflussfaktoren theoretisch herzuleiten und empirisch zu untersuchen
Styles APA, Harvard, Vancouver, ISO, etc.
40

Sung, Houng-Shiang, et 宋宏祥. « The Application of IP-Camera on Water Protection Using Gore-Tex Film and The Moisture Coagulation Problem Solution Analysis ». Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29730514936603298627.

Texte intégral
Résumé :
碩士
國立交通大學
工學院精密與自動化工程學程
100
This study describes the future application and development of IP camera and compares IP camera with conventional surveillance camera CCTV to explain characteristic differences between the two. In the study, IP camera was applied for analyzing the foggy phenomenon produced by breathable Gore-Tex film. The goal is to examine the appropriateness of currently available methods for preventing fogginess as well as to offer more effective strategies for resolving this phenomenon. Considering the manufacturing method of Gore-Tex breathable film and characteristics of ePTFE, a main ingredient of Gore-Tex breathable film, the breathable film of model number GAW324 was selected and applied in this study. This type of film is specifically used on microphone’s sound receiving holes to achieve the water resistant requirement. The airflow rate can be as much as 5 , while the water resistant level of the film can be as high as IP67. That is why this type of film is often used on products that need to be not only water resistant but also air permeable. Yet according to the diameter of the microfiber of ePTFE and characteristics of GAW324 film, GAW324’s water vapors permeability can be greater than 100 . In other words, the microfiber diameter of the film is still larger than either gas-phase or vapor-phase water molecules, and thus it cannot block environmental moisture from crossing the film. As a result, this study adopted the strategy of water vapor blocking (Test 1 and Test 2) for verification and explanation. In Test 3 and Test 4, experiments were conducted to collect temperature data at the occurrence of foggy phenomenon on IP camera when the water blocking strategy was not applied. By deriving the ideal gas equations as well as referring to the empirical equation of relative humidity from the hand book of American Society of Heating, Refrigeration, and Air-Conditioning Engineers (ASHRAE), relative humidity of the temperature of each channel point measured in Test 3 and Test 4 was computed. The authors also discussed the relationship between temperature distribution and relative humidity distribution inside the IP camera when fogginess happens. The ultimate objective is to resolve the foggy phenomenon observed on products using breathable film through analyzing the phenomenon and discussing the experimental results.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Hunko, M. A., et V. M. Tkachov. « Development of a module for sorting the ip-addresses of user nodes in cloud firewall protection of web resourсes ». Thesis, 2019. http://openarchive.nure.ua/handle/document/13993.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Zulhasnine, Mohammad. « Availability-Aware Spare Capacity Allocation with Partially Protected Rings ». Thesis, 2008. http://hdl.handle.net/10012/3584.

Texte intégral
Résumé :
This thesis work focuses on designing a survivable IP-core network with the minimal investment of spare capacity. A span-oriented spare capacity allocation (SCA) scheme is proposed to satisfy customers' availability requirements in the end-to-end (E2E) sense. The novelty of the proposed SCA scheme is that it meets the E2E availability requirements despite the lack of knowledge of E2E bandwidth by employing protection rings covering all links in the network. Different ring selection methods are presented and also compared from the aspect of network redundancy and LP feasibility which provide more flexibility to the design. The proposed SCA algorithm further minimizes total cost of spare capacity by incorporating partial protection within the proposed architecture. The simulation results show that it can significantly reduce the spare capacity consumption depending on the availability. The proposed SCA scheme also performs better in terms of redundancy than that of two other dominant methods available these days.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Malik, Shweta. « Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering ». 2015. https://scholarworks.umass.edu/masters_theses_2/238.

Texte intégral
Résumé :
Reverse engineering of hardware IP block is a common practice for competitive purposes in the semiconductor industry. What is done with the information gathered is the deciding legal factor. Once this information gets into the hands of an attacker, it can be used to manufacture exact clones of the hardware device. In an attempt to prevent the illegal copies of the IP block from flooding the market, layout-level obfuscation based on switchable dopant is suggested for the hardware design. This approach can be integrated into the design and manufacturing flow using an obfuscation tool (ObfusTool) to obfuscate the functionality of the IP core. The ObfusTool is developed in a way to be flexible and adapt to different standard cell libraries and designs. It enables easy and accurate evaluation of the area, power and delay v/s obfuscation trades-offs across different design approaches for hardware obfuscation. The ObfusTool is linked to an obfuscation standard cell library which is based on a prototype design created with Obfuscells and 4-input NAND gate. The Obfuscell is a standard cell which is created with switchable functionality based on the assigned dopant configurations. The Obfuscell is combined with other logic gates to form a standard cell library, which can replace any number of existing gates in the IP block without altering it's functionality. A total of 160 different gates are realized using permutated combinations starting with 26 unique gate functions. This design library provide a high level of obfuscation in terms of the number of combinations an adversary has to go through increase to 2 2000 approximately based on the design under consideration. The connectivity of the design has been ignored by previous approaches, which we have addressed in this thesis. The connectivity of a design leaks important information related to inputs and outputs of a gate. We extend the basic idea of dopant-based hardware obfuscation by introducing "dummy wires". The addition of dummy wires not only obfuscates the functionality of the design but also it's connectivity. This greatly reduces the information leakage and complexity of the design increases. To an attacker the whole design appears as one big 'blob'.This also curbs the attempts of brute force attacks. The introduced obfuscation comes at a cost of area and power overhead on an average 5x, which varies across different design libraries.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Ajigini, Olusegun Ademolu. « A framework to manage sensitive information during its migration between software platforms ». Thesis, 2016. http://hdl.handle.net/10500/21118.

Texte intégral
Résumé :
Software migrations are mostly performed by organisations using migration teams. Such migration teams need to be aware of how sensitive information ought to be handled and protected during the implementation of the migration projects. There is a need to ensure that sensitive information is identified, classified and protected during the migration process. This thesis suggests how sensitive information in organisations can be handled and protected during migrations by using the migration from proprietary software to open source software to develop a management framework that can be used to manage such a migration process.A rudimentary management framework on information sensitivity during software migrations and a model on the security challenges during open source migrations are utilised to propose a preliminary management framework using a sequential explanatory mixed methods case study. The preliminary management framework resulting from the quantitative data analysis is enhanced and validated to conceptualise the final management framework on information sensitivity during software migrations at the end of the qualitative data analysis. The final management framework is validated and found to be significant, valid and reliable by using statistical techniques like Exploratory Factor Analysis, reliability analysis and multivariate analysis as well as a qualitative coding process.
Information Science
D. Litt. et Phil. (Information Systems)
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie