Literatura científica selecionada sobre o tema "Protection des IP"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Índice
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protection des IP".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Artigos de revistas sobre o assunto "Protection des IP"
McKenna, Brian. "Smart IP protection". Infosecurity Today 1, n.º 3 (maio de 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.
Texto completo da fonteMujtaba, G., e М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries". Kutafin Law Review 11, n.º 1 (10 de abril de 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.
Texto completo da fonteMetz, C. "IP protection and restoration". IEEE Internet Computing 4, n.º 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.
Texto completo da fonteShi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion". Lecture Notes in Education Psychology and Public Media 24, n.º 1 (20 de novembro de 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.
Texto completo da fonteCORREIA, N. S. C., e M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection". Fiber and Integrated Optics 24, n.º 3-4 (maio de 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.
Texto completo da fonteSaha, Debasri, e Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection". VLSI Design 2011 (5 de abril de 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.
Texto completo da fonteNewbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez e W. T. Holman. "Watermarking ICs for IP protection". Electronics Letters 38, n.º 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.
Texto completo da fonteBolos, Mihaela Daciana. "IP Protection and International Trade". Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.
Texto completo da fonteShi, Guanming, Carl Pray e Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China". Agricultural and Resource Economics Review 41, n.º 3 (dezembro de 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.
Texto completo da fonteCorreia, N. S. C., e M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection". Photonic Network Communications 10, n.º 1 (julho de 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.
Texto completo da fonteTeses / dissertações sobre o assunto "Protection des IP"
Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection". Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.
Texto completo da fonteCommittee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching". Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.
Texto completo da fonteBoni, Giacomo <1996>. "Legal Regulation and IP Rights Protection of Online games in China". Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.
Texto completo da fonteBuffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP". Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.
Texto completo da fonteHallbäck, Erik. "Digital Rights Management on an IP-based set-top box". Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.
Texto completo da fonteDigital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.
This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms". Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.
Texto completo da fonteMaster of Science
Colombier, Brice. "Methods for protecting intellectual property of IP cores designers". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Texto completo da fonteDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Fan, Dian. "Scalable Video Transport over IP Networks". Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.
Texto completo da fonteMüller, Karen E. "MPLS-based recovery". Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.
Texto completo da fonteENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Ekrt, Ondřej. "Trademark and Design Protection of Applied Art". Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.
Texto completo da fonteLivros sobre o assunto "Protection des IP"
American Bar Association. Section of Intellectual Property Law, ed. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.
Encontre o texto completo da fonteEditorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.
Encontre o texto completo da fonteBossuet, Lilian, e Lionel Torres, eds. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.
Texto completo da fonteM, Hyland Mark LL, Carey Louise e Law Society of Ireland, eds. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.
Encontre o texto completo da fonteLi, Meng, e David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.
Texto completo da fonteVasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.
Encontre o texto completo da fonteKëllezi, Pranvera, Bruce Kilpatrick e Pierre Kobel, eds. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.
Texto completo da fonteMario, Pickavet, e Demeester Piet, eds. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.
Encontre o texto completo da fonteWolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4a ed. Upper Saddle River, NJ: Prentice Hall, 2008.
Encontre o texto completo da fonteZeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.
Encontre o texto completo da fonteCapítulos de livros sobre o assunto "Protection des IP"
Gassmann, Oliver, Angela Beckenbauer e Sascha Friesike. "The IP Protection Star". In Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.
Texto completo da fonteMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty e Ramesh Karri. "Obfuscation for IP Protection". In Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.
Texto completo da fonteMohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty e Ramesh Karri. "Watermarking for IP Protection". In Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.
Texto completo da fonteHeim, Irina. "The Protection of IP". In Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.
Texto completo da fonteJung, Edward, e Lilian Bossuet. "IP FSM Watermarking". In Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.
Texto completo da fonteJayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu e J. Rajendran. "Analog IP Protection and Evaluation". In Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.
Texto completo da fonteZamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi e Mark Tehranipoor. "IP Protection: A Historical View". In Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.
Texto completo da fonteTorres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol e Lilian Bossuet. "Digital Right Management for IP Protection". In Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.
Texto completo da fonteCambou, Bertrand. "Enhancing Secure Elements—Technology and Architecture". In Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.
Texto completo da fonteColombier, Brice, Lilian Bossuet e David Hély. "Turning Electronic Circuits Features into On-Chip Locks". In Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.
Texto completo da fonteTrabalhos de conferências sobre o assunto "Protection des IP"
Dalpasso, Marcello, Alessandro Bogliolo e Luca Benini. "Hardware/software IP protection". In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.
Texto completo da fonteSu, Hui-Kai, Cheng-Shong Wu e Yuan-Sun Chu. "IP Local Node Protection". In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.
Texto completo da fonteCammarota, Rosario, Indranil Banerjee e Ofer Rosenberg. "Machine learning IP protection". In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.
Texto completo da fonteWang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain e Ning Zhang. "IP Protection in TinyML". In 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.
Texto completo da fonteLiu, Qiang, e Haie Li. "A hierarchical IP protection approach for hard IP cores". In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.
Texto completo da fonteRampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale e Mario Barbareschi. "Digital Right Management for IP Protection". In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.
Texto completo da fonteLi, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu e Patrick P. C. Lee. "Achieving Unified Protection for IP Routing". In 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.
Texto completo da fonteWood, Steve, e Gordon W. Romney. "Protection methods against IP packet attacks". In the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.
Texto completo da fonteKepa, Krzysztof, Fearghal Morgan e Krzysztof Kosciuszkiewicz. "IP protection in Partially Reconfigurable FPGAs". In 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.
Texto completo da fonteCollini, Luca, Benjamin Tan, Christian Pilato e Ramesh Karri. "Reconfigurable Logic for Hardware IP Protection". In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.
Texto completo da fonteRelatórios de organizações sobre o assunto "Protection des IP"
Hanlon, Walker, e Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, novembro de 2019. http://dx.doi.org/10.3386/w26490.
Texto completo da fonteMinero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.
Texto completo da fonteDe León, Ignacio L., e Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, setembro de 2016. http://dx.doi.org/10.18235/0007023.
Texto completo da fonteThe Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, setembro de 2022. http://dx.doi.org/10.53892/gzum7792.
Texto completo da fonte