Network Game’s IPR Infringement and Unfair Competition Problems — Discussing from “Kai Xin Xiao Xiao Le” Case
نویسندگان
چکیده
منابع مشابه
Speaker 1: Xiao-Jing Wang, China
I will first introduce the concept of “cognitive-type” cortical microcircuit exemplified by the prefrontal cortex. Since mental disorders primarily implicate cognitive-type brain systems such as the prefrontal cortex, rather than early sensory systems, progress in this area holds the promise for a new approach to psychiatric diagnosis and treatment. I will review experimental and computational ...
متن کاملStudies on Anti-Hepatoma Effect of Gan-Ai-Xiao Decoction
Purpose: To explore the anti-hepatoma effect of Gan-Ai-Xiao Decoction (GAXD), a folk remedy. Methods: High performance liquid chromatography (HPLC) was used to identify the major chemical components of GAXD ethanol extract (EE). The cytotoxic effect of GAXD EE against HepG2 cells was measured by methyl thiazolyl tetrazolium (MTT) assay. Flow cytometry and Western blot were used to study the eff...
متن کاملA Note on a Theorem of Xiao Gang
In 1985 Xiao Gang proved that the bicanonical system of a complex surface S of general type with p2(S) > 2 is not composed of a pencil ([X1]). In this note a new proof of this theorem is presented.
متن کاملREADING 1 HAN XIAO 1 . Review of Convex Analysis
Definition 1.1. Let C be a subset of R. We say C is convex if αx+ (1− α)y ∈ C, ∀x, y ∈ C, ∀α ∈ [0, 1]. Definition 1.2. Let C be a convex subset of R. A function f : C 7→ R is called convex if f(αx+ (1− α)y) ≤ αf(x) + (1− α)f(y), ∀x, y ∈ C, ∀α ∈ [0, 1]. The function f is called concave if −f is convex. The function f is called strictly convex if the above inequality is strict for all x, y ∈ C wi...
متن کاملCryptanalysis of the Xiao - Lai White-Box AES Implementation
In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. prese...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Knowledge Engineering
سال: 2017
ISSN: 2382-6185
DOI: 10.18178/ijke.2017.3.2.088