Literatura científica selecionada sobre o tema "Protection des IP"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protection des IP".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Protection des IP"

1

McKenna, Brian. "Smart IP protection". Infosecurity Today 1, n.º 3 (maio de 2004): 1. http://dx.doi.org/10.1016/s1742-6847(04)00049-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Mujtaba, G., e М. Zia-Ul-Haq. "The Disclosure Requirements of Software Patents: Suggestions for Developing Countries". Kutafin Law Review 11, n.º 1 (10 de abril de 2024): 96–123. http://dx.doi.org/10.17803/2713-0533.2024.1.27.096-123.

Texto completo da fonte
Resumo:
This is a research study of available options of Intellectual Property (IP) protections for software in the present IP systems, in most of the countries including copyright and patent protection. Each type of IP protection has its own advantages and limitations like enablement of subject matter for registration requirements, scope of rights conferred and period of protection etc. The trends and demands of software industry for the grant of patents protection for Computer Implemented Inventions (CIIs) were also discussed. The present research paper discusses a best mode of technical disclosure, more than an algorithm, of software patents and additional recommendations are also given as a solution to the technical problem of a suitable IP protection for software. A sui generis IP protection was suggested as a best option for a composite IP protection covering all aspects of advanced software inventions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Metz, C. "IP protection and restoration". IEEE Internet Computing 4, n.º 2 (2000): 97–102. http://dx.doi.org/10.1109/4236.832952.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Shi, Dengke. "Intellectual Property Protection of Virtual IP in the Age of Digital Economy and Its Jurisprudence Discussion". Lecture Notes in Education Psychology and Public Media 24, n.º 1 (20 de novembro de 2023): 270–75. http://dx.doi.org/10.54254/2753-7048/24/20230746.

Texto completo da fonte
Resumo:
This thesis aims to explore the intellectual property protection of virtual IP in the era of the digital economy and its jurisprudential discussion. With the continuous development of science and technology and the rise of the digital economy, virtual IP (virtual image and digital person) presents diverse connotations and expressions as an essential part of the digital economy. However, the intellectual property protection of virtual IP faces many dilemmas and challenges. This paper conducts an in-depth study on the protection of virtual IP through the legal perspective and puts forward some methods and strategies to crack the dilemma of virtual IP legal rights and interests. By improving the legal framework, clarifying the definition standard of virtual IP, and determining the scope of protected rights and interests of virtual IP, the legal protection of virtual IP can be effectively enhanced, and the legitimacy and stability of the property rights and interests of virtual IP can be maintained. This study has important theoretical and practical significance for promoting the development of the digital economy and protecting the intellectual property rights of virtual IP.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

CORREIA, N. S. C., e M. C. R. MEDEIROS. "Survivability in IP-over-WDM Networks: WDM Lightpath Protection versus IP LSP Protection". Fiber and Integrated Optics 24, n.º 3-4 (maio de 2005): 353–69. http://dx.doi.org/10.1080/01468030590923046.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Saha, Debasri, e Susmita Sur-Kolay. "SoC: A Real Platform for IP Reuse, IP Infringement, and IP Protection". VLSI Design 2011 (5 de abril de 2011): 1–10. http://dx.doi.org/10.1155/2011/731957.

Texto completo da fonte
Resumo:
Increased design complexity, shrinking design cycle, and low cost—this three-dimensional demand mandates advent of system-on-chip (SoC) methodology in semiconductor industry. The key concept of SoC is reuse of the intellectual property (IP) cores. Reuse of IPs on SoC increases the risk of misappropriation of IPs due to introduction of several new attacks and involvement of various parties as adversaries. Existing literature has huge number of proposals for IP protection (IPP) techniques to be incorporated in the IP design flow as well as in the SoC design methodology. However, these are quite scattered, limited in possibilities in multithreat environment, and sometimes mutually conflicting. Existing works need critical survey, proper categorization, and summarization to focus on the inherent tradeoff, existing security holes, and new research directions. This paper discusses the IP-based SoC design flow to highlight the exact locations and the nature of infringements in the flow, identifies the adversaries, categorizes these infringements, and applies strategic analysis on the effectiveness of the existing IPP techniques for these categories of infringements. It also clearly highlights recent challenges and new opportunities in this emerging field of research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Newbould, R. D., D. L. Irby, J. D. Carothers, J. J. Rodriguez e W. T. Holman. "Watermarking ICs for IP protection". Electronics Letters 38, n.º 6 (2002): 272. http://dx.doi.org/10.1049/el:20020143.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bolos, Mihaela Daciana. "IP Protection and International Trade". Procedia Economics and Finance 3 (2012): 908–13. http://dx.doi.org/10.1016/s2212-5671(12)00249-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Shi, Guanming, Carl Pray e Wenhui Zhang. "Effectiveness of Intellectual Property Protection: Survey Evidence from China". Agricultural and Resource Economics Review 41, n.º 3 (dezembro de 2012): 286–97. http://dx.doi.org/10.1017/s106828050000126x.

Texto completo da fonte
Resumo:
This paper examines Chinese pesticide firms’ use and perceptions of various means of intellectual property (IP) protection in protecting their innovations, using a unique dataset from 97 pesticide firms surveyed in 2008. These firms rate Chinese patents as quite effective in protecting their IP from infringement, although 70 percent of them state that improved enforcement is needed. Those firms that have been granted patents and those that claim their patents have been infringed upon both give lower ratings to the perceived effectiveness of patents. Trademarks are rated as less effective than patents, but firms that have had experience with patenting and infringement of patents tend to rate trademarks as more effective than those firms that do not have direct experience with the patent system. General government policies to encourage increased privatization, more private R&D, and higher education are associated with more faith in IP, but policies to strengthen IP by promoting mandatory IP training and the development of specialized IP divisions in the firms do not influence perceptions of IP effectiveness. We conclude that if the Chinese government wants to encourage innovation using IP protection, it must focus on improving the enforcement of patents.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Correia, N. S. C., e M. C. R. Medeiros. "On the Maximum Protection Problem in IP-over-WDM Networks Using IP LSP Protection". Photonic Network Communications 10, n.º 1 (julho de 2005): 73–85. http://dx.doi.org/10.1007/s11107-004-1696-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Protection des IP"

1

Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection". Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Texto completo da fonte
Resumo:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.
Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching". Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Texto completo da fonte
Resumo:
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. This mechanism must be able to utilise the working bandwidth or bandwidth reserved for lower priority applications and allocate it to the voice traffic when a network failure occurs.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Boni, Giacomo <1996&gt. "Legal Regulation and IP Rights Protection of Online games in China". Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Texto completo da fonte
Resumo:
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the main companies and what trends are they following, regarding both hardware and software. In the latter part of the chapter, a brief confrontation of how said main countries view this industry from an IP (intellectual property) point of view. In the second one, the core, the author shifts the focus to the PRC, and researches the historic reasons for the current videogame publication regulation, from 2004 to 2018. Aiming to explain phenomenon such as the “console ban” and “licensing freeze” which deeply impacted the local industry. After this introduction the Author follows to analyze the main IP laws in china and their relevance to the videogaming market as well as providing example of how such law impact their economic environment. Finally, in the conclusion, the case study of the Digital Bros company is provided, analyzing the reasons and practices that allowed them successfully enter the Chinese videogame publishing market as well as some prediction for the future evolution of Chinese IP laws in the sector based on the content of the previous chapters .
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Buffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP". Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Texto completo da fonte
Resumo:
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection contre les erreurs adaptée au codage MPEG-4 Audio combinant une adaptation au débit, un entrelacement de paquets et une récupération d'erreurs s'appuyant sur la FEC a été développée. Pour l'adaptation de débit et la récupération d'erreur, les propriétés de granularité et de "scalabilité" du flux MPEG-4 Audio sont utilisées. Un mécanisme d'entrelacement s'adaptant au processus de perte est mis en oeuvre. La combinaison de ces mécanismes donne lieu à un protocole "TCP fiendly" pour transferer en temps réel des données MPEG-4 au-dessus d'IP. Il a été impléménté pour l" streaming unicast. La plupart des technique FEC indépendantes du codage sont des adaptations de la théorie générale du codage au cas particulier des erreurs de streaming. Les codes correcteurs tel que les codes Hamming ou les codes Reed-Solomon peuvent détecter et corriger une ou plusieurs erreurs apparaissant sporadiquement dans un canal. Mais dans le streaming Internet qui nous concerne, les erreurs ont déjà été détectées par les protocoles bas niveau, le seul problème est la correctio. C'est un problème bien plus facile que celui de la détection-correction et nous n'avons pas besoin d'utiliser la théorie des codes correcteurs pour y répondre. Une nouvelle méthode dédiée aux problèmes de streaming a été développée en utilisant la théorie des systèmes linéaires sur des corps ou des anneaux finis.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Hallbäck, Erik. "Digital Rights Management on an IP-based set-top box". Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Texto completo da fonte
Resumo:

Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.

This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.

Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms". Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Texto completo da fonte
Resumo:
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provides mutual assurances for the end-user and the intellectual-property developer. Further, this work demonstrates the use of SAM in a secure video messaging device on top of a Virtex-II Pro development system
Master of Science
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Colombier, Brice. "Methods for protecting intellectual property of IP cores designers". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Texto completo da fonte
Resumo:
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettre au point un système complet d'activation à distance de composants virtuels, permettant au concepteur de savoir exactement combien de composants virtuels sont effectivement utilisés. Pour cela, les deux premières contributions de cette thèse portent sur la modification de la logique combinatoire d'un composant virtuel afin de le rendre activable. La première méthode permet de forcer les sorties à une valeur fixe de manière contrôlée. La seconde est une technique efficace de sélection de nœuds à altérer, encore une fois de manière contrôlée, afin de rendre le composant virtuel temporairement inutilisable. La troisième contribution de cette thèse est une méthode légère de correction d'erreurs à appliquer aux réponses issues des fonctions physiques non-clonables, qui constituent un identifiant intrinsèque des instances du composant virtuel. Réutilisant un protocole de correction d'erreurs issu de l'échange quantique de dés, cette méthode est beaucoup plus légère que les codes correcteurs d'erreurs classiquement utilisés pour cette application
Designing integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Fan, Dian. "Scalable Video Transport over IP Networks". Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Texto completo da fonte
Resumo:
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the available bandwidth and heterogeneous terminals. This work aims at improving the efficacy of scalable video transport over IP networks. In this work, we first propose an optimal interleaving scheme combined with motion-compensated fine granularity scalability video source coding and unequal loss protection schemes, under an imposed delay constraint. The network is modeled as a packet-loss channel with random delays. The motion compensation prediction, ULP allocation and the depth of the interleaver are jointly optimized based on the network status and the delay constraint. We then proceed to investigate the multiple path transport technique. A unified approach which incorporates adaptive motion compensation prediction, multiple description coding and unequal multiple path allocation, is proposed to improve both the robustness and error resilience property of the video coding and transmission system, while the delivered video quality is improved simultaneously. To analytically investigate the efficacy of error resilient transport schemes for progressively encoded sources, including unequal loss protection, best-effort and FEC transport schemes, we develop evaluation and optimization approaches for these transport schemes. In this part of the work, the network is modeled as an M/D/1/K queue, and then a comprehensive queueing analysis is provided. Armed with these results, the efficacy of these transport schemes for progressively encoded sources are investigated and compared.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Müller, Karen E. "MPLS-based recovery". Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Texto completo da fonte
Resumo:
Thesis (MSc)--Stellenbosch University, 2003.
ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services where fault recovery takes place at the 100 ms time scale. This thesis presents an overview of various recovery techniques and addresses the problem of how to find an in some sense optimal set of pre-established traffic engineered recovery paths, given a network with link capacities and traffic demands. We present and motivate our choice of a nonlinear objective function and optimization method for finding traffic engineered working and recovery paths. A variant of the flow deviation method is used to find and capacitate a set of optimal label switched paths. We present and evaluate two simple methods for computing a set of pre-established traffic engineered recovery paths by using the flow deviation method.
AFRIKAANSE OPSOMMING: MPLS-gebaseerde herstel is daarop gemik om verkeer wat deur 'n fout in 'n Multiprotokol Etiketwisseling (Multiprotocol Label Switching) (MPLS) netwerk geaffekteer is, vinnig en volledig te herstel. Twee MPLS-gebaseerde herstelmodelle is voorgestel: Internetprotokol-herroetering (lP rerouting) wat herstelpaaie op aanvraag tot stand bring, en beskermingsoorskakeling (protection switching) wat met voorafbeplande herstelpaaie werk. IP-herroetering is robuust en voordelig aangesien geen netwerkbronne vooraf gereserveer word nie, maar dit is inherent stadiger as beskermingsoorskakeling wat veronderstel is om 'n hoë graad van betroubaarheid aan belangrike dienste te bied waar die herstel van foute in die 100 ms tydskaal plaasvind. Hierdie tesis verskaf 'n oorsig oor verskeie hersteltegnieke en ondersoek die probleem hoe om 'n optimale versameling van voorafbeplande herstelpaaie te vind, gegee 'n netwerk met skakelkapasiteite (link capacities) en verwagte netwerkverkeer. Ons stel voor en motiveer ons keuse van 'n nie-lineêre objekfunksie en optimeringsmetode om verkeersontwerpde (traffic engineered) aktiewe en herstelpaaie te vind. 'n Variant van die vloeideviasie (flow deviation)-metode word gebruik om 'n optimale versameling van etiketwisseling (label switched) paaie te vind en om 'n optimale hoeveelheid kapasiteit aan die paaie toe te ken. Ons stel voor en evalueer twee eenvoudige metodes om 'n versameling van optimale voorafbeplande herstelpaaie te bereken deur die vloeideviasie-metode toe te pas.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Ekrt, Ondřej. "Trademark and Design Protection of Applied Art". Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Texto completo da fonte
Resumo:
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community designs.   Further, the scope of protection conferred by both instruments is analysed and evaluated and it should be determined which type of protection confers a wider protection on its owner. The thesis also aims to respond a question “which of the analysed intellectual property law instruments is more suitable and favourable for protecting an appearance of products.” Therefore, based on this thesis, users of trademarks and designs should be able to decide which of these two types of protection they should use in order to protect their products or products of their clients.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Protection des IP"

1

American Bar Association. Section of Intellectual Property Law, ed. IP protection in China. Chicago, Illinois: American Bar Association, Section of Intellectual Property Law, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Editorial Committee of China IP Protection Handbook. China IP protection handbook. Beijing: Intellectual Property Publishing House, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Bossuet, Lilian, e Lionel Torres, eds. Foundations of Hardware IP Protection. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

M, Hyland Mark LL, Carey Louise e Law Society of Ireland, eds. Technology and IP law. Haywards Heath, West Sussex: Tottel Pub., 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Li, Meng, e David Z. Pan. A Synergistic Framework for Hardware IP Privacy and Integrity Protection. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41247-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Vasseur, Jean-Philippe. Network recovery: Protection and restoration of optical, SONET-SDH, IP and MPLS. San Francisco, Calif: Morgan Kaufmann, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Këllezi, Pranvera, Bruce Kilpatrick e Pierre Kobel, eds. Liability for Antitrust Law Infringements & Protection of IP Rights in Distribution. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-17550-4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Mario, Pickavet, e Demeester Piet, eds. Network recovery: Protection and restoration of optical, SONET-SDH, IP, and MPLS. Amsterdam: Elsevier/Morgan Kaufmann, 2004.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Wolf, Wayne Hendrix. Modern VLSI design: IP-based design. 4a ed. Upper Saddle River, NJ: Prentice Hall, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Zeidman, Robert. The software IP detective's handbook: Measurement, comparison, and infringement detection. Upper Saddle River, NJ: Prentice Hall, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Protection des IP"

1

Gassmann, Oliver, Angela Beckenbauer e Sascha Friesike. "The IP Protection Star". In Profiting from Innovation in China, 43–87. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30592-4_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty e Ramesh Karri. "Obfuscation for IP Protection". In Security of Biochip Cyberphysical Systems, 87–109. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Mohammed, Shayan, Sukanta Bhattacharjee, Yong-Ak Song, Krishnendu Chakrabarty e Ramesh Karri. "Watermarking for IP Protection". In Security of Biochip Cyberphysical Systems, 61–85. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-93274-9_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Heim, Irina. "The Protection of IP". In Intellectual Property Management, 37–52. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-26743-7_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jung, Edward, e Lilian Bossuet. "IP FSM Watermarking". In Foundations of Hardware IP Protection, 65–84. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_4.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Jayasankaran, N. G., A. Sanabria-Borbón, E. Sánchez-Sinencio, J. Hu e J. Rajendran. "Analog IP Protection and Evaluation". In Emerging Topics in Hardware Security, 419–69. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64448-2_16.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Zamiri Azar, Kimia, Hadi Mardani Kamali, Farimah Farahmandi e Mark Tehranipoor. "IP Protection: A Historical View". In Understanding Logic Locking, 47–62. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-37989-5_3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Torres, Lionel, Pascal Benoit, Jérome Rampon, Renaud Perillat, Dominic Spring, Gael Paul, Stephane Bonniol e Lilian Bossuet. "Digital Right Management for IP Protection". In Foundations of Hardware IP Protection, 1–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Cambou, Bertrand. "Enhancing Secure Elements—Technology and Architecture". In Foundations of Hardware IP Protection, 205–31. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_10.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Colombier, Brice, Lilian Bossuet e David Hély. "Turning Electronic Circuits Features into On-Chip Locks". In Foundations of Hardware IP Protection, 15–36. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50380-6_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Protection des IP"

1

Dalpasso, Marcello, Alessandro Bogliolo e Luca Benini. "Hardware/software IP protection". In the 37th conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/337292.337588.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Su, Hui-Kai, Cheng-Shong Wu e Yuan-Sun Chu. "IP Local Node Protection". In 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007). IEEE, 2007. http://dx.doi.org/10.1109/icsnc.2007.47.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Cammarota, Rosario, Indranil Banerjee e Ofer Rosenberg. "Machine learning IP protection". In ICCAD '18: IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3240765.3270589.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Wang, Jinwen, Yuhao Wu, Han Liu, Bo Yuan, Roger Chamberlain e Ning Zhang. "IP Protection in TinyML". In 2023 60th ACM/IEEE Design Automation Conference (DAC). IEEE, 2023. http://dx.doi.org/10.1109/dac56929.2023.10247898.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Liu, Qiang, e Haie Li. "A hierarchical IP protection approach for hard IP cores". In 2015 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 2015. http://dx.doi.org/10.1109/iscas.2015.7168946.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Rampon, Jerome, Renaud Perillat, Lionel Torres, Pascal Benoit, Giorgio Di Natale e Mario Barbareschi. "Digital Right Management for IP Protection". In 2015 IEEE Computer Society Annual Symposium on VLSI (ISVLSI). IEEE, 2015. http://dx.doi.org/10.1109/isvlsi.2015.127.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Li, Qi, Mingwei Xu, Jianping Wu, Xingang Shi, Dah Ming Chiu e Patrick P. C. Lee. "Achieving Unified Protection for IP Routing". In 2010 19th International Conference on Computer Communications and Networks ( ICCCN 2010). IEEE, 2010. http://dx.doi.org/10.1109/icccn.2010.5560122.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Wood, Steve, e Gordon W. Romney. "Protection methods against IP packet attacks". In the 5th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1029533.1029609.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Kepa, Krzysztof, Fearghal Morgan e Krzysztof Kosciuszkiewicz. "IP protection in Partially Reconfigurable FPGAs". In 2009 International Conference on Field Programmable Logic and Applications (FPL). IEEE, 2009. http://dx.doi.org/10.1109/fpl.2009.5272250.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Collini, Luca, Benjamin Tan, Christian Pilato e Ramesh Karri. "Reconfigurable Logic for Hardware IP Protection". In ICCAD '22: IEEE/ACM International Conference on Computer-Aided Design. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3508352.3561117.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Protection des IP"

1

Hanlon, Walker, e Taylor Jaworski. Spillover Effects of IP Protection in the Inter-war Aircraft Industry. Cambridge, MA: National Bureau of Economic Research, novembro de 2019. http://dx.doi.org/10.3386/w26490.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Minero Alejandre, Gemma. Ownership of Databases: Personal Data Protection and Intellectual Property Rights on Databases. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64578.

Texto completo da fonte
Resumo:
When we think on initiatives on access to and reuse of data, we must consider both the European Intellectual Property Law and the General Data Protection Regulation (GDPR). The first one provides a special intellectual property (IP) right – the sui generis right – for those makers that made a substantial investment when creating the database, whether it contains personal or non-personal data. That substantial investment can be made by just one person, but, in many cases, it is the result of the activities of many people and/or some undertakings processing and aggregating data. In the modern digital economy, data are being dubbed the ‘new oil’ and the sui generis right might be con- sidered a right to control any access to the database, thus having an undeniable relevance. Besides, there are still important inconsistences between IP Law and the GDPR, which must be removed by the European legislator. The genuine and free consent of the data subject for the use of his/her data must remain the first step of the legal analysis.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

De León, Ignacio L., e Jose Fernandez Donoso. The Costs of Using Formal Intellectual Property Rights: A Survey on Small Innovative Enterprises in Latin America. Inter-American Development Bank, setembro de 2016. http://dx.doi.org/10.18235/0007023.

Texto completo da fonte
Resumo:
This document analyzes the perceptions of small innovative enterprises (SIE) in Latin America of the effectiveness of the legal protection afforded by intellectual property rights (IPR). To analyze the costs of using IPR, the study surveyed 352 SIEs from Chile, Colombia, Costa Rica, Ecuador, Mexico, and Peru. It found evidence that SIEs do not know how the IP system works, and that most SIEs consider that knowing how it works is not important for business performance. The study finds large differences among countries with respect to the need to hire legal services to apply for IPR. There are also differences in perceptions of the efficiency of the IP system, unrelated to the countries' IPR enforcement (Park, 2008). The study also finds differences in the perception of the disadvantage in protect their IPR when innovations are imitated by a large firm. This difference is related to the countries' IPR enforcement.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

The Status and Future of Rights-Based Conservation in the Amazon of Colombia and Peru. Rights and Resources Initiative, setembro de 2022. http://dx.doi.org/10.53892/gzum7792.

Texto completo da fonte
Resumo:
This report identifies possible pathways towards the integration of a rights-based approach in the legal conservation frameworks of Colombia and Peru. It does so in the context of tenure rights recognition for Indigenous Peoples (IP) and Afro-descendant Peoples (ADP) as an effective strategy for biodiversity protection in the Amazon. With this in mind, it highlights opportunities for implementing a rights-based approach within current and medium-term conservation frameworks and policies in both countries.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia