Spelling suggestions: "subject:"intellectual eroperty."" "subject:"intellectual aproperty.""
521 |
ParaGraph - Parameterprüfung für Intellectual PropertiesJerinic, Vasco 07 June 2005 (has links) (PDF)
Beim Austausch von Intellectual Properties (IP) entsteht das Problem, daß der Anwender oftmals nicht sicher feststellen kann, ob die gewünschte Parameterkombination unterstützt wird bzw. ob die IP mit den gewünschten Einstellungen korrekt arbeitet. Ziel dieser Arbeit ist es, eine mögliche Lösung zur Parameterprüfung bereitzustellen. Im Rahmen des vom Bundesministerium für Bildung und Forschung (BMBF) geförderten Projekts Intellectual Property Qualifikation für effizientes Systemdesign [IPQ] wurde dazu das Entwurfswerkzeug entwickelt.
Anhand einer durch den Entwerfer vorgegebenen formalen Beschreibung der Parameter und ihrer Abhängigkeiten untereinander prüft eine vom Werkzeug automatisch generierte Testbenchkomponente, ob alle Bedingungen eingehalten werden. Des weiteren berechnet diese Komponente auf der Basis vorgegebener Gleichungen verschiedene Systemeigenschaften, wie beispielsweise die maximale Taktfrequenzabweichung zwischen Sender und Empfänger einer seriellen Übertragungsstrecke. Diese können dann vom Anwender mit der ihm vorliegenden Spezifikation verglichen werden. ist außerdem in der Lage, anhand der Parameterabhängigkeiten die verschiedenen Kombinationen von Einstellungen zu berechnen, die nötig sind, um den kompletten Parameterraum abzudecken, und diese in Form eines Parameter-Domänen-Graphen darzustellen. Mit Hilfe dieses Graphen ist der Anwender in der Lage, Kombinationen gezielt so auszuwählen, daß ein möglichst hoher Verifikationsgrad der IP erreicht wird, ohne unnötig viele Simulationen durchführen zu müssen.
|
522 |
Fikri mülkiyet hakları bağlamında korsan yayıncılığın ekonomi politiği /Gemrik, Sevil. Aytemiz, Levent. January 2008 (has links) (PDF)
Tez (Yüksek Lisans) - Süleyman Demirel Üniversitesi, Sosyal Bilimler Enstitüsü, Maliye Anabilim Dalı, 2008. / Kaynakça var.
|
523 |
Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /Ahmad, Saghir. January 2008 (has links) (PDF)
Master's thesis. / Format: PDF. Bibl.
|
524 |
Fundamentals of software patent protection at a universityEverett, Christopher E. January 2003 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science. / Title from title screen. Includes bibliographical references.
|
525 |
Making Borders : Engaging the threat of Chinese textiles in GhanaAxelsson, Linn January 2012 (has links)
The borders of the twenty-first century come in many forms and are performed by an increasing number of actors in a broad variety of places, both within and beyond the territories of nation-states. This thesis sets out a detailed political geography of how borders operate to reconcile the often conflicting demands of open markets and security. Focusing on Ghana, where there is a widespread fear that the inflow of Chinese versions of African prints will lead to the collapse of the local textile industry, the study explores where and when borders are enforced, who performs them and what kinds of borders are enacted in order to maintain and protect the Ghanaian nation and market without compromising the country’s status as a liberal economy. It combines interviews and documentary sources with analysis drawn from border, security and migration studies to explore three sets of spatial strategies that have defined the Ghanaian approach to the perceived threat of Chinese African prints. They are the institution of a single corridor for African print imports, the anti-counterfeiting raids carried out in Ghana’s marketplaces, and the promotion of garments made from locally produced textiles as office wear through the National Friday Wear and Everyday Wear programmes. These strategies stretch, disperse and embody the borders of the state or nation to control trade in ways that resolve the fears of both open flows and closed borders. This thesis thus seeks to show how a geographical analysis can clarify the specificities of how borders now work to control mobility. In doing so, it not only unsettles conventional assumptions about what borders are and where they are supposed to be located, but also the idea that borders primarily are used to constrain the mobility of certain people while facilitating economic flows. Furthermore, this thesis adds to the understanding of the variety of responses to the inflow of Chinese consumer products to the African continent.
|
526 |
Genetically Modified Food and Crops : Risks and Intellectual Property RightsKarampaxoglou, Thaleia January 2015 (has links)
This paper attempts to present and analyze problems that may arise from the use of Genetically Modified (GM) products and issues raised by the Intellectual Property (IP) rights that Genetic Engineering (GE) companies have on their products. Arguments in favor and against the existence of health risks and environmental risks of GM products are presented. The European policy of the socioeconomic effects of the GM products is discussed and is proposed the application of the precautionary principle for the prevention of unintended consequences from the GM products to other than health and environmental domains. The need of IP rights is supported, but is also suggested an IP rights flexibility. Do IP rights violate the rights of all people to a nourishing life, natural resources, the right to decide about what they eat and the right to live in a viable ecosystem? Finally, I provide an analysis of the effects on the farmers due to the IP rights on GM crop for cultivation and state dependency issues that may occur.
|
527 |
A Philosophical Analysis of Intellectual Property: In Defense of InstrumentalismKanning, Michael A. 01 January 2012 (has links)
This thesis argues in favor of an instrumental approach to Intellectual Property (IP). I begin by reviewing justifications for IP that have been offered in recent literature, including Lockean labor theory, Hegelian personality theory, Kantian property theory and utilitarianism. Upon a close and careful analysis, I argue that none of these justifications suffice to ground contemporary IP practice. I review some recent works that offer `pluralist' justifications for IP, which draw from multiple theories in order to account for the diverse field of IP-related laws and practices in existence. I argue that these pluralist theories are also insufficient, because there is no principled reason why one theory is adopted over another in any particular case. In conclusion, I show that an instrumentalist attitude can best explain and justify IP laws and practices.
|
528 |
A Novel Method For Watermarking Sequential CircuitsLewandowski, Matthew 01 January 2013 (has links)
We present an Intellectual Property (IP) protection technique for sequential circuits driven by embedding a decomposed signature into a Finite State Machine (FSM) through the manipulation of the arbitrary state encoding of the unprotected FSM. This technique is composed of three steps: (a) transforming the signature into a watermark graph, (b) embedding watermark graphs into the original FSM's State Transition Graph (STG) and (c) generating models for verification and extraction. In the watermark construction process watermark graphs are generated from signatures. The proposed methods for watermark construction are: (1) BSD, (2) FSD, and (3) HSD. The HSD method is shown to be advantageous for all signatures while providing sparse watermark FSMs with complexity O(n^2). The embedding process is related to the sub-graph matching problem. Due to the computational complexity of the matching problem, attempts to reverse engineer or remove the constructed watermark from the protected FSM, with only finite resources and time, are shown to be infeasible. The proposed embedding solutions are: (1) Brute Force and (2) Greedy Heuristic. The greedy heuristic has a computational complexity of O(n log n), where n is the number of states in the watermark graph. The greedy heuristic showed improvements for three of the six encoding schemes used in experimental results. Model generation and verification utilizes design automation techniques for generating multiple representations of the original, watermark, and watermarked FSMs. Analysis of the security provided by this method shows that a variety of attacks on the watermark and system including: (1) data-mining hidden functionality, (2) preimage, (3) secondary preimage, and (4) collision, can be shown to be computationally infeasible. Experimental results for the ten largest IWLS 93 benchmarks that the proposed watermarking technique is a secure, yet flexible, technique for protecting sequential circuit based IP cores.
|
529 |
Approximate Sub-Graph Isomorphism For Watermarking Finite State Machine HardwareMeana, Richard William Piper 01 January 2013 (has links)
We present a method of mitigating theft of sequential circuit Intellectual Property hardware designs through means of watermarking. Hardware watermarking can be performed by selectively embedding a watermark in the state encoding of the Finite State Machine. This form of watermarking can be achieved by matching a directed graph representation of the watermark with a sub-graph in state transition graph representation of the FSM. We experiment with three approaches: a brute force method that provides a proof of concept, a greedy algorithm that provides excellent runtime with a drawback of sub-optimal results, and finally a simulated annealing method that provides near optimal solutions with runtimes that meet our performance goals. The simulated annealing approach when applied on a ten benchmarks chosen from IWLS 93 benchmark suite, provides watermarking results with edge overhead of less than 6% on average with runtimes not exceeding five minutes.
|
530 |
China’s standardization & intellectual property policies : in light of WTO regime and membershipSozumert, Sait 05 August 2011 (has links)
China's policy makers see international standards as a barrier to their country's economic development, more importantly, as an offence to the country's national pride. This belief has been reinforced by the view that multi-national companies have used international standards to force developing countries to deprive them of the ability to enter the international markets by forcing them to pay high royalty rates, due to the patents incorporated in these standards. Moreover, these standards, as they believe, have been created at international standards setting platforms dominated by multi-national companies and developed countries. In return, China has launched several initiatives to create home-made Chinese standards free from patent claims of these companies. China's home-madestandards, some of which differ significantly from international standards, also reportedly serve to protection of its domestic market. China's accession to the WTO was formally approved in November 2001 and China became the WTO's 143rd member on December 11, 2001. WTO membership opened a new era for China. In spite of the international expectations for removal of all trade protection mechanisms which are incompatible with the international trade regime, China is reported to have sought to reform its policies by employing new strategies concerning IPR and standards. The thesis of this report is that China has not diverged significantly from developing home-made Chinese standards after the country’s entry into the WTO, but Chinese authorities have adopted more flexible strategies to implement this policy. Accordingly, this report is about change in policy strategies. I argue that China has continued to enforce its own will upon foreign companies with a strong self-confidence stemming from its ability to negotiate on unequal terms with foreign companies, owing to its sheer market size. However, China's new strategies have been shaped by weak coordination and disagreement among government agencies and institutions. To illustrate the potential explanatory power of this account, I have examined two important home-made standards initiatives by China; Wireless Authentication and Privacy Infrastructure (WAPI) and Audio Video Coding Standards (AVS). From the examination of the WAPI and AVS cases, I conclude that China's strategies have continued to evolve through disagreements and negotiations between Chinese government institutions within policy boundaries set by China's WTO membership and increasing international criticism. / text
|
Page generated in 0.0633 seconds