Network Game’s IPR Infringement and Unfair Competition Problems — Discussing from “Kai Xin Xiao Xiao Le” Case

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Speaker 1: Xiao-Jing Wang, China

I will first introduce the concept of “cognitive-type” cortical microcircuit exemplified by the prefrontal cortex. Since mental disorders primarily implicate cognitive-type brain systems such as the prefrontal cortex, rather than early sensory systems, progress in this area holds the promise for a new approach to psychiatric diagnosis and treatment. I will review experimental and computational ...

متن کامل

Studies on Anti-Hepatoma Effect of Gan-Ai-Xiao Decoction

Purpose: To explore the anti-hepatoma effect of Gan-Ai-Xiao Decoction (GAXD), a folk remedy. Methods: High performance liquid chromatography (HPLC) was used to identify the major chemical components of GAXD ethanol extract (EE). The cytotoxic effect of GAXD EE against HepG2 cells was measured by methyl thiazolyl tetrazolium (MTT) assay. Flow cytometry and Western blot were used to study the eff...

متن کامل

A Note on a Theorem of Xiao Gang

In 1985 Xiao Gang proved that the bicanonical system of a complex surface S of general type with p2(S) > 2 is not composed of a pencil ([X1]). In this note a new proof of this theorem is presented.

متن کامل

READING 1 HAN XIAO 1 . Review of Convex Analysis

Definition 1.1. Let C be a subset of R. We say C is convex if αx+ (1− α)y ∈ C, ∀x, y ∈ C, ∀α ∈ [0, 1]. Definition 1.2. Let C be a convex subset of R. A function f : C 7→ R is called convex if f(αx+ (1− α)y) ≤ αf(x) + (1− α)f(y), ∀x, y ∈ C, ∀α ∈ [0, 1]. The function f is called concave if −f is convex. The function f is called strictly convex if the above inequality is strict for all x, y ∈ C wi...

متن کامل

Cryptanalysis of the Xiao - Lai White-Box AES Implementation

In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. prese...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Knowledge Engineering

سال: 2017

ISSN: 2382-6185

DOI: 10.18178/ijke.2017.3.2.088