نتایج جستجو برای: ip piracy

تعداد نتایج: 42073  

Journal: :IJIIT 2011
Julian Bahrs Norbert Gronau Gergana Vladova

Product piracy poses an existential threat to many companies. Juristic property rights, which are currently dominantly put to practice, do not suffice to combat this threat. The rise in cases of piracy and the increasing professionalism of the counterfeiter, give grounds for effective methods of prevention. Based on the gap of existing approaches identified we evaluate how knowledge modeling co...

2005
Gilles Saint-Paul

This paper develops a model for analyzing the costs and benefits of intellectual property enforcement in LDCs. The North is more productive than the South and is the only source of innovator. There are two types of goods, and each bloc has a comparative advantage in producing a specific type of good. If comparative advantage is strong enough, even under piracy there are goods that the South wil...

2017
Lorenz Graf-Vlachy Tarun Goyal Yannick Ouardi Andreas König

The factors which lead people to adopt or reject technologies of varying degrees of legality have not been studied extensively in information systems research. To address this gap, we combine literature in information systems and political ideology and theorize on the general influence of the personality traits openness to experience and conscientiousness on online media piracy. Furthermore, we...

Journal: :J. Electronic Testing 2011
Rajat Subhra Chakraborty Swarup Bhunia

Malicious modification of hardware in untrusted fabrication facilities, referred to as hardware Trojan, has emerged as a major security concern. Comprehensive detection of these Trojans during postmanufacturing test has been shown to be extremely difficult. Hence, it is important to develop design techniques that provide effective countermeasures against hardware Trojans by either preventing Tr...

2013
Jeyavijayan Rajendran

Today’s System on Chip (SoC) is being incorporated with digital, analog, radio frequency, photonic and other devices [1]. More recently, sensors, actuators, and biochips are also being integrated into these already powerful SoCs. On one hand, SoC integration has been enabled by advances in mixed system integration and the increase in the wafer sizes (currently about 300 mm and projected to be 4...

Journal: :Lecture Notes in Computer Science 2023

Abstract Logic locking was designed to be a formidable barrier IP piracy: given logic design, modifies the design such that circuit operates correctly only if operated with “correct” secret key. However, strong attacks (like SAT-based attacks) soon exposed weakness of this defense. Stripped functionality (SFLL) recently proposed as variant locking. SFLL resilient against SAT attacks, which bane...

2004
David E. Douglas Timothy Paul Cronan Jafar M. Ali

As part of a broader research project directed toward development of a more comprehensive software piracy model, the authors collected two sets of data from students at the Kuwait University. The software piracy instrument was translated from English to Arabic. Then, both the English version and the Arabic version were administered to college of business undergraduate students at Kuwait Univers...

Journal: :International Journal of Advanced Research in Computer Science and Software Engineering 2018

Journal: :IOP Conference Series: Materials Science and Engineering 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید