• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 502
  • 214
  • 126
  • 63
  • 61
  • 55
  • 55
  • 26
  • 17
  • 16
  • 15
  • 14
  • 13
  • 13
  • 13
  • Tagged with
  • 1324
  • 1324
  • 434
  • 281
  • 210
  • 207
  • 204
  • 167
  • 150
  • 133
  • 133
  • 124
  • 120
  • 104
  • 100
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Fikri mülkiyet hakları bağlamında korsan yayıncılığın ekonomi politiği /

Gemrik, Sevil. Aytemiz, Levent. January 2008 (has links) (PDF)
Tez (Yüksek Lisans) - Süleyman Demirel Üniversitesi, Sosyal Bilimler Enstitüsü, Maliye Anabilim Dalı, 2008. / Kaynakça var.
522

Legal protection for computer programmes in EU, US and Pakistan : software piracy as a challenge in Pakistan /

Ahmad, Saghir. January 2008 (has links) (PDF)
Master's thesis. / Format: PDF. Bibl.
523

Fundamentals of software patent protection at a university

Everett, Christopher E. January 2003 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science. / Title from title screen. Includes bibliographical references.
524

Making Borders : Engaging the threat of Chinese textiles in Ghana

Axelsson, Linn January 2012 (has links)
The borders of the twenty-first century come in many forms and are performed by an increasing number of actors in a broad variety of places, both within and beyond the territories of nation-states. This thesis sets out a detailed political geography of how borders operate to reconcile the often conflicting demands of open markets and security. Focusing on Ghana, where there is a widespread fear that the inflow of Chinese versions of African prints will lead to the collapse of the local textile industry, the study explores where and when borders are enforced, who performs them and what kinds of borders are enacted in order to maintain and protect the Ghanaian nation and market without compromising the country’s status as a liberal economy. It combines interviews and documentary sources with analysis drawn from border, security and migration studies to explore three sets of spatial strategies that have defined the Ghanaian approach to the perceived threat of Chinese African prints. They are the institution of a single corridor for African print imports, the anti-counterfeiting raids carried out in Ghana’s marketplaces, and the promotion of garments made from locally produced textiles as office wear through the National Friday Wear and Everyday Wear programmes. These strategies stretch, disperse and embody the borders of the state or nation to control trade in ways that resolve the fears of both open flows and closed borders. This thesis thus seeks to show how a geographical analysis can clarify the specificities of how borders now work to control mobility. In doing so, it not only unsettles conventional assumptions about what borders are and where they are supposed to be located, but also the idea that borders primarily are used to constrain the mobility of certain people while facilitating economic flows. Furthermore, this thesis adds to the understanding of the variety of responses to the inflow of Chinese consumer products to the African continent.
525

Genetically Modified Food and Crops : Risks and Intellectual Property Rights

Karampaxoglou, Thaleia January 2015 (has links)
This paper attempts to present and analyze problems that may arise from the use of Genetically Modified (GM) products and issues raised by the Intellectual Property (IP) rights that Genetic Engineering (GE) companies have on their products. Arguments in favor and against the existence of health risks and environmental risks of GM products are presented. The European policy of the socioeconomic effects of the GM products is discussed and is proposed the application of the precautionary principle for the prevention of unintended consequences from the GM products to other than health and environmental domains. The need of IP rights is supported, but is also suggested an IP rights flexibility. Do IP rights violate the rights of all people to a nourishing life, natural resources, the right to decide about what they eat and the right to live in a viable ecosystem? Finally, I provide an analysis of the effects on the farmers due to the IP rights on GM crop for cultivation and state dependency issues that may occur.
526

A Philosophical Analysis of Intellectual Property: In Defense of Instrumentalism

Kanning, Michael A. 01 January 2012 (has links)
This thesis argues in favor of an instrumental approach to Intellectual Property (IP). I begin by reviewing justifications for IP that have been offered in recent literature, including Lockean labor theory, Hegelian personality theory, Kantian property theory and utilitarianism. Upon a close and careful analysis, I argue that none of these justifications suffice to ground contemporary IP practice. I review some recent works that offer `pluralist' justifications for IP, which draw from multiple theories in order to account for the diverse field of IP-related laws and practices in existence. I argue that these pluralist theories are also insufficient, because there is no principled reason why one theory is adopted over another in any particular case. In conclusion, I show that an instrumentalist attitude can best explain and justify IP laws and practices.
527

A Novel Method For Watermarking Sequential Circuits

Lewandowski, Matthew 01 January 2013 (has links)
We present an Intellectual Property (IP) protection technique for sequential circuits driven by embedding a decomposed signature into a Finite State Machine (FSM) through the manipulation of the arbitrary state encoding of the unprotected FSM. This technique is composed of three steps: (a) transforming the signature into a watermark graph, (b) embedding watermark graphs into the original FSM's State Transition Graph (STG) and (c) generating models for verification and extraction. In the watermark construction process watermark graphs are generated from signatures. The proposed methods for watermark construction are: (1) BSD, (2) FSD, and (3) HSD. The HSD method is shown to be advantageous for all signatures while providing sparse watermark FSMs with complexity O(n^2). The embedding process is related to the sub-graph matching problem. Due to the computational complexity of the matching problem, attempts to reverse engineer or remove the constructed watermark from the protected FSM, with only finite resources and time, are shown to be infeasible. The proposed embedding solutions are: (1) Brute Force and (2) Greedy Heuristic. The greedy heuristic has a computational complexity of O(n log n), where n is the number of states in the watermark graph. The greedy heuristic showed improvements for three of the six encoding schemes used in experimental results. Model generation and verification utilizes design automation techniques for generating multiple representations of the original, watermark, and watermarked FSMs. Analysis of the security provided by this method shows that a variety of attacks on the watermark and system including: (1) data-mining hidden functionality, (2) preimage, (3) secondary preimage, and (4) collision, can be shown to be computationally infeasible. Experimental results for the ten largest IWLS 93 benchmarks that the proposed watermarking technique is a secure, yet flexible, technique for protecting sequential circuit based IP cores.
528

Approximate Sub-Graph Isomorphism For Watermarking Finite State Machine Hardware

Meana, Richard William Piper 01 January 2013 (has links)
We present a method of mitigating theft of sequential circuit Intellectual Property hardware designs through means of watermarking. Hardware watermarking can be performed by selectively embedding a watermark in the state encoding of the Finite State Machine. This form of watermarking can be achieved by matching a directed graph representation of the watermark with a sub-graph in state transition graph representation of the FSM. We experiment with three approaches: a brute force method that provides a proof of concept, a greedy algorithm that provides excellent runtime with a drawback of sub-optimal results, and finally a simulated annealing method that provides near optimal solutions with runtimes that meet our performance goals. The simulated annealing approach when applied on a ten benchmarks chosen from IWLS 93 benchmark suite, provides watermarking results with edge overhead of less than 6% on average with runtimes not exceeding five minutes.
529

China’s standardization & intellectual property policies : in light of WTO regime and membership

Sozumert, Sait 05 August 2011 (has links)
China's policy makers see international standards as a barrier to their country's economic development, more importantly, as an offence to the country's national pride. This belief has been reinforced by the view that multi-national companies have used international standards to force developing countries to deprive them of the ability to enter the international markets by forcing them to pay high royalty rates, due to the patents incorporated in these standards. Moreover, these standards, as they believe, have been created at international standards setting platforms dominated by multi-national companies and developed countries. In return, China has launched several initiatives to create home-made Chinese standards free from patent claims of these companies. China's home-madestandards, some of which differ significantly from international standards, also reportedly serve to protection of its domestic market. China's accession to the WTO was formally approved in November 2001 and China became the WTO's 143rd member on December 11, 2001. WTO membership opened a new era for China. In spite of the international expectations for removal of all trade protection mechanisms which are incompatible with the international trade regime, China is reported to have sought to reform its policies by employing new strategies concerning IPR and standards. The thesis of this report is that China has not diverged significantly from developing home-made Chinese standards after the country’s entry into the WTO, but Chinese authorities have adopted more flexible strategies to implement this policy. Accordingly, this report is about change in policy strategies. I argue that China has continued to enforce its own will upon foreign companies with a strong self-confidence stemming from its ability to negotiate on unequal terms with foreign companies, owing to its sheer market size. However, China's new strategies have been shaped by weak coordination and disagreement among government agencies and institutions. To illustrate the potential explanatory power of this account, I have examined two important home-made standards initiatives by China; Wireless Authentication and Privacy Infrastructure (WAPI) and Audio Video Coding Standards (AVS). From the examination of the WAPI and AVS cases, I conclude that China's strategies have continued to evolve through disagreements and negotiations between Chinese government institutions within policy boundaries set by China's WTO membership and increasing international criticism. / text
530

Μέθοδοι απόκρυψης πληροφορίας και υδατογράφηση ως τεχνικές προστασίας πνευματικών δικαιωμάτων και πιστοποίησης της αυθεντικότητας / Data hiding methods and watermarking as techniques protecting intellectual property rights and authentication

Αρμένη, Σπυριδούλα 22 June 2007 (has links)
Η προστασία των πνευματικών δικαιωμάτων και η απόδειξη γνησιότητας του κατόχου, επομένως και η πιστοποίηση της αυθεντικότητας των ψηφιακών αντικειμένων είναι ένα πολύ καυτό ζήτημα και για την επίλυσή του επιστρατεύονται μέθοδοι απόκρυψης πληροφορίας και τεχνικές υδατογράφησης. Εκτός από τη φιλοσοφική αντιμετώπιση του θέματος, προτείνονται μια μέθοδος απόκρυψης πληροφορίας και δύο τεχνικές υδατογράφησης, με σκοπό την προστασία των πνευματικών δικαιωμάτων και την πιστοποίηση της αυθεντικότητας των ψηφιακών αντικειμένων. Η μέθοδος απόκρυψης πληροφορίας δανείζεται έννοιες από την κρυπτογραφία εισάγοντας σε μεγάλες εικόνες ένα δύσκολο στιγμιότυπο, δηλαδή έναν τρία χρωματίσιμο γράφο. Ο γράφος μαζί με το χρωματισμό του αποτελεί το κλειδί. Για να μην αποκαλυφθεί όλος ο χρωματισμός του γράφου σε μια πιθανή διαμάχη, εφαρμόζεται το πρωτόκολλο των διαντιδραστικών αποδείξεων μηδενικής γνώσης (ZKIP) για δύσκολα υπολογιστικά προβλήματα. Η διαδικασία της ένθεσης γίνεται με χρήση του μετασχηματισμού wavelets, παρέχοντας καλή ποιότητα των παραγόμενων εικόνων και ανθεκτικότητα σε περιπτώσεις επιθέσεων. Οι δύο τεχνικές υδατογράφησης εφαρμόζονται στο χωρικό πεδίο και στο πεδίο συχνοτήτων, αντίστοιχα. Η τεχνική που εφαρμόστηκε στο χωρικό πεδίο εκμεταλλεύεται τυχόν ομοιότητες του υδατογραφήματος με τις αρχικές εικόνες για να επιλεγούν οι θέσεις ένθεσης. Αντίθετα στην τεχνική υδατογράφησης που εφαρμόστηκε στο πεδίο συχνοτήτων γίνεται χρήση του μετασχηματισμού wavelet. Σε όλες τις τεχνικές παρατηρήθηκαν ικανοποιητικά αποτελέσματα μετά την ένθεση της εισαγόμενης πληροφορίας έτσι ώστε να μη είναι οπτικά αντιληπτή. Επίσης εξετάστηκε και η ανθεκτικότητα της εισαγόμενης πληροφορίας στις εικόνες ύστερα από πιθανές επιθέσεις και επιβεβαιώθηκε ότι επιζεί ένα αρκετά μεγάλο ποσοστό της εισαγόμενης πληροφορίας, γεγονός που καταξιώνει τις προτεινόμενες μεθόδους. / The copyright protection and the authentication is a very hot topic and for its solution are called up data hiding methods and watermarking techniques. Αpart from the philosophical confrontation of the subject, there are proposed a data hiding method and two watermarking techniques that aim to copyright protect and the authenticate digital objects. The data hiding technique combines concepts from cryptography and it can be applied to large images by inserting a hard instance, i.e. a 3-colorable graph. The graph itself with its coloring compose the key. In order not to reveal all its coloring in a possible conflict, the Zero Knowledge Interactive Proof Protocol (ZKIP) is applied. The insertion process has been done using wavelets transformation, offering good quality of the produced images and robustness against possible attacks. The two watermarking techniques are applied in spatial domain and in frequency domain, respectively. The technique that was applied in spatial domain is exploiting any similarity between the watermark and the initial images so that to select at best the insertion positions. On the contrary, in the watermarking technique that is applied in the frequency domain, wavelets transformation has been used and the watermark was inserted in the differential coefficients of the image, in order to be imperceptible. To all the above techniques, it has been observed sufficient results after the insertion of the redundant information, so that it turned to be visible imperceptibly. Moreover, the robustness of the redundant information was each time after possible attacks examined, and it was confirmed that a rather big percentage of the redundant information is survived, making more reliable the proposed techniques.

Page generated in 0.076 seconds