To see the other types of publications on this topic, follow the link: And IP protection.

Dissertations / Theses on the topic 'And IP protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 44 dissertations / theses for your research on the topic 'And IP protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Marolia, Pratik M. "Watermarking FPGA bitstream for IP protection." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24804.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2008.<br>Committee Chair: Dr. Lee, Hsien-Hsin S.; Committee Member: Dr. Lim, Sung-Kyu; Committee Member: Dr. Yalamanchili, Sudhakar.
APA, Harvard, Vancouver, ISO, and other styles
2

Lubasi, Mampi Nakutoma. "Real-time bandwidth encapsulation for IP/MPLS Protection Switching." Master's thesis, University of Cape Town, 2011. http://hdl.handle.net/11427/11816.

Full text
Abstract:
Bandwidth reservation and bandwidth allocation are needed to guarantee the protection of voice traffic during network failure. Since voice calls have a time constraint of 50 ms within which the traffic must be recovered, a real-time bandwidth management scheme is required. Such bandwidth allocation scheme that prioritizes voice traffic will ensure that the voice traffic is guaranteed the necessary bandwidth during the network failure. Additionally, a mechanism is also required to provide the bandwidth to voice traffic when the reserved bandwidth is insufficient to accommodate voice traffic. Th
APA, Harvard, Vancouver, ISO, and other styles
3

Boni, Giacomo <1996&gt. "Legal Regulation and IP Rights Protection of Online games in China." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19370.

Full text
Abstract:
Nowadays, the videogame industry is an ever growing sector, which rivaling both the movie and music ones combined, of which China, along with Germany, USA and Japan is one of the few leaders. This thesis is about the analysis of the state of the videogame industry in the PRC, with special focus on the process of publication of videogames by foreign industries. The dissertation is divided into three chapters, the first one giving an exhaustive presentation about the global history of this sector, from the first attempts in 1970s all the way to 2019. This part of the research shows who are the m
APA, Harvard, Vancouver, ISO, and other styles
4

Buffet, Julien. "Techniques de protection contre les erreurs pour le streaming audio sur IP." Châtenay-Malabry, Ecole centrale de Paris, 2002. http://www.theses.fr/2002ECAP0857.

Full text
Abstract:
Lorsque l'on transfère en temps réel des données audio au-dessus du service "best effort" donné sur l'Internet, les pertes de données non contrôlées peuvent dégrader significativement la qualité d'écoute. Pour améliorer cette qualité, une politique de protection contre les erreurs est nécessaire. Les techniques de protection contre les erreurs se répartissent en deux types : celles qui dépendent du codage et celles qui en sont indépendantes. Les techniques dépendant du codage s'appuient sur les propriétés du codage sous jacent pour la protection contre les erreurs. Une technique de protection
APA, Harvard, Vancouver, ISO, and other styles
5

Hallbäck, Erik. "Digital Rights Management on an IP-based set-top box." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5395.

Full text
Abstract:
<p>Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.</p><p>This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Simpson, Eric. "Runtime Intellectual Property Protection on Programmable Platforms." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/32184.

Full text
Abstract:
Modern Field-Programmable Gate Arrays (FPGAs) can accommodate complex system-on-chip designs and require extensive intellectual-property (IP) support. However, current IP protection mechanisms in FPGAs are limited, and do not reach beyond whole-design bitstream encryption. This work presents an architecture and protocol for securing IP based designs in programmable platforms. The architecture is reprsented by the Secure Authentication Module (SAM), an enabler for next-generation intellectual-property exchange in complex FPGAs. SAM protects hardware, software, application data, and also provi
APA, Harvard, Vancouver, ISO, and other styles
7

Colombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.

Full text
Abstract:
La conception de circuits intégrés est aujourd'hui une tâche extrêmement complexe. Cela pousse les concepteurs à adopter une approche modulaire, où chaque bloc fonctionnel est décrit de manière indépendante. Ces blocs fonctionnels, appelés composants virtuels, sont vendus par leurs concepteurs à des intégrateurs système qui les utilisent dans des projets complexes. Cette division a pour conséquence une hausse inquiétante des cas de copie illégale des composants virtuels. Afin de lutter contre cette menace sur la propriété intellectuelle des concepteurs, l'objectif de cette thèse était de mettr
APA, Harvard, Vancouver, ISO, and other styles
8

Müller, Karen E. "MPLS-based recovery." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53506.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2003.<br>ENGLISH ABSTRACT: MPLS-based recovery is intended to effect rapid and complete restoration of traffic affected by a fault in a Multiprotocol Label Switching (MPLS) network. Two MPLS-based recovery models have been proposed: lP re-routing which establishes recovery paths on demand, and protection switching which works with pre-established recovery paths. lP re-routing is robust and frugal since no resources are pre-committed but it is inherently slower than protection switching which is intended to offer high reliability to premium services w
APA, Harvard, Vancouver, ISO, and other styles
9

Fan, Dian. "Scalable Video Transport over IP Networks." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/460.

Full text
Abstract:
With the advances in video compression and networking techniques, the last ten years have witnessed an explosive growth of video applications over the Internet. However, the service model of the current best-effort network was never engineered to handle video traffic and, as a result, video applications still suffer from varying and unpredictable network conditions, in terms of bandwidth, packet loss and delay. To address these problems, a lot of innovative techniques have been proposed and researched. Among them, scalable video coding is a promising one to cope with the dynamics of the ava
APA, Harvard, Vancouver, ISO, and other styles
10

Ekrt, Ondřej. "Trademark and Design Protection of Applied Art." Thesis, Uppsala universitet, Juridiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352497.

Full text
Abstract:
The aim of the thesis is to analyse suitability of trademarks and designs for protection of products’ appearance, name its advantages and disadvantages and identify and discuss conditions that must be fulfilled for an appearance of a product to be protected by each of the two mentioned types of protection. The thesis further aims to ascertain whether it is, in general, more difficult to obtain a trademark or a design protection of products bearing in mind difficulties that may arise during the registration process. The thesis focuses mainly on the European Union trademarks and Community design
APA, Harvard, Vancouver, ISO, and other styles
11

Kan, Daniel Dao-Jun 1979. "Design of survivable IP-over-WDM networks : providing protection and restoration at the electronic layer." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87353.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.<br>Includes bibliographical references (leaves 107-109).<br>by Daniel Dao-Jun Kan.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
12

Martirosyan, Nelli. "Protecting IP at the Border : A Study of Customs Enforcement Mechanism for Protection of Intellectual Property Rights in the Eurasian Economic Union." Thesis, Uppsala universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Johansson, Elena. "Protection of Intellectual Property in the Russian Federation : Institutions and Organizations." Thesis, Södertörns högskola, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-33803.

Full text
Abstract:
Infringement in fields of Intellectual Property Rights is a global problem causing repeated and sustained attention at national and international levels. A number of different organizations and commissions are constantly control and counteract the growth of these infringements, but despite the taken measures counterfeit and piracy goods continue to be manufactured and sold around the world. The Russian Federation (RF) is a country that has close commercial ties with many foreign states, including Sweden. However the RF is one of the countries, included on the Special 301 Priority Watch List du
APA, Harvard, Vancouver, ISO, and other styles
14

SZABAS, CLAUDIO ALEJANDRO. "FOUNTAIN CODES AND OTHER CHANNEL CODING SCHEMES FOR PROTECTION OF TRANSPORT STREAMS OVER IP NETWORKS WITH PACKET ERASURE." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=17792@1.

Full text
Abstract:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO<br>COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>PROGRAMA DE EXCELENCIA ACADEMICA<br>Há, nos dias atuais, uma crescente demanda pelo transporte de video sobre IP, i.e., para distribuição de conteúdo pela Internet, por serviços de IPTV em definição padrão e em alta definição e, mesmo para uso interno nas redes de emissoras tradicionais de televisão, que transportam contribuições de elevada qualidade para seus programas. Em tais aplicações, o conteúdo dos programas é transportado usando MPEG-2 ou MPEG-4, sob a forma de MPEG-2 T
APA, Harvard, Vancouver, ISO, and other styles
15

Criqui-Barthalais, Géraldine. "La protection des libertés individuelles sur le réseau internet." Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020076/document.

Full text
Abstract:
Cette étude envisage le réseau internet comme un nouvel espace invitant à réinterpréter les libertés de la personne physique. Au titre de celles-ci, sont protégées la liberté individuelle, entendue comme le fait de ne pouvoir être arbitrairement détenu et la liberté d’aller et venir. Il doit en aller de même sur le réseau. Etablissant une analogie avec ces libertés, la première partie de la thèse consacre deux libertés : la liberté d’accès au réseau et la liberté de naviguer sur le web. La première implique de définir le contenu d’un service public de l’accès. De plus, il faut affirmer que la
APA, Harvard, Vancouver, ISO, and other styles
16

LEME, CLAUDIA BARUCKE MARCONDES PAES. "PROTECTION AND RESTORATION, TOGETHER WITH NODE ADDRESSING AND TMN MANAGEMENT FOR IP OVER DWDM OPTICAL NETWORKS BY USING PHYSICAL LAYER." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2000. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7495@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR<br>Esta dissertação tem como objetivo explorar as possibilidades de introdução de inteligência na camada física de uma Rede Óptica de Telecomunicações, visando a sua aplicação futura. A utilização de subportadoras de RF - introduzidas no domínio óptico através de moduladores Mach-Zehnder -, associada a tecnologias de múltiplo acesso óptico, permite a construção de mecanismos de proteção, restauração, endereçamento, qualidade de serviço e gerenciamento TMN, na camada física. A vantagem da solução proposta reside no aumento de
APA, Harvard, Vancouver, ISO, and other styles
17

Lücking, Thomas [Verfasser], and Marcus [Gutachter] Wagner. "Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection / Thomas Lücking. Gutachter: Marcus Wagner." Würzburg : Universität Würzburg, 2013. http://d-nb.info/110282254X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Kalysch, Anatoli [Verfasser], Felix [Akademischer Betreuer] Freiling, Felix [Gutachter] Freiling, and André Ricardo Abed [Gutachter] Grégio. "Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms / Anatoli Kalysch ; Gutachter: Felix Freiling, André Ricardo Abed Grégio ; Betreuer: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2020. http://d-nb.info/1214888453/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Karlsson, Hanna. "Trademark Protection for the Chinese Market - A study on Swedish retail companies established in China." Thesis, Umeå universitet, Juridiska institutionen, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-171035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Blaise, Agathe. "Novel anomaly detection and classification algorithms for IP and mobile networks." Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS257.

Full text
Abstract:
Ces dernières années ont été marquées par une nette augmentation de la fréquence et de la diversité des attaques réseau, qui apparaissent toujours plus sophistiquées et conçues pour être indétectables. En parallèle, des techniques sont développées pour les détecter et prendre des contre-mesures rapidement. Récemment, l’essor des techniques statistiques et d’apprentissage machine ("machine learning") ont permis un développement rapide de techniques innovantes visant à détecter de telles attaques. Ces techniques ont des applications dans de nombreux domaines qui gagneraient à être davantage auto
APA, Harvard, Vancouver, ISO, and other styles
21

Díaz, Rizo Alán Rodrigo. "Security and Trust for Wireless Integrated Circuits." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS005.

Full text
Abstract:
Les menaces pour la sécurité matérielle trouvent leur origine dans la chaîne d'approvisionnement en circuits intégrés (IC) massivement mondialisée et basée sur l'externalisation que nous connaissons aujourd'hui. Le coût prohibitif de la possession d'une fonderie de semi-conducteurs de haut niveau oblige les sociétés de conception de circuits intégrés à opter pour la sous-traitance de la fabrication, l'assemblage et le test de leurs circuits. L'externalisation de ces tâches intensifie le risque d'attaques de piratage de IC et d'insertion de chevaux de Troie matériels (HT), et ces deux menaces s
APA, Harvard, Vancouver, ISO, and other styles
22

Hauser, Christian. "Protecting virtual identities in mobile IP-based communication /." Stuttgart : Inst. für Kommunikationsnetze und Rechnersysteme, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016534457&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ben, Hadj Mohamed Asma. "Réseau de capteurs sans fil comportementaux pour l'aide au maintien à domicile par la surveillance en habitat intelligent." Thesis, Toulouse 2, 2015. http://www.theses.fr/2015TOU20077/document.

Full text
Abstract:
Ces dernières années, les réseaux de capteurs sans fil ont vu leurs champs d'applications s'élargir pour toucher plusieurs domaines dont celui de surveillance. En parallèle, le domaine à vocation médicale pour l'assistance aux personnes n’a pas manqué de s'intéresser lui aussi à cette technologie émergente face aux nombreux attraits qu'elle représente. C'est dans ce contexte que se situe notre travail de thèse. Nous nous intéressons à l'utilisation des réseaux de capteurs de type vidéo non intrusif pour la surveillance continue de personnes âgées évoluant dans leur environnement naturel. L’obj
APA, Harvard, Vancouver, ISO, and other styles
24

Benešová, Jana. "Systém ochrany práv duševního vlastnictví v Číně: problémy a ekonomické dopady." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193619.

Full text
Abstract:
The diploma thesis deals with the issues and economic impacts of the system of Intellectual Property Rights protection in China. The work is divided into three main chapters. The theoretical framework of the system of Intellectual Property Rights is explained in the first part of the diploma thesis. It is focused on the detailed analysis of the most important types of Intellectual Property Rights, that can be found in People's Republic of China. Different ways how to protect our rights in this area are also covered in this section. The second part describes the current situation in China and c
APA, Harvard, Vancouver, ISO, and other styles
25

Polido, Fabrício Bertini Pasquot. "Contribuições ao estudo do direito internacional da propriedade intelectual na era Pós-Organização Mundial do Comércio: fronteiras da proteção, composição do equilíbrio e expansão do domínio público." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/2/2135/tde-29082011-115009/.

Full text
Abstract:
Após 15 anos de sua adoção pelos Membros da Organização Mundial do Comércio, o Acordo sobre os Aspectos da Propriedade Intelectual Relacionados ao Comércio (TRIPS) ainda permanece como um dos pilares das modernas instituições do sistema internacional da propriedade intelectual e merece contínua análise de seus efeitos sobre países em desenvolvimento. Nesse sentido, tendências expansionistas e níveis mais elevados de proteção dos direitos de propriedade intelectual, nas distintas esferas do multilareralismo, bilateralismo e regionalismo, são, no entanto, confrontadas com as necessidades reais d
APA, Harvard, Vancouver, ISO, and other styles
26

Kvasnička, Karel. "Mobilní zdroje elektrické energie." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Wei, shongyang, and 魏崇晏. "IP-in-IP tunnelling mechanism for multihop protection in IP network based on shortest path criteria." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29127908817766282676.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>100<br>The IP network is the core foundation of the Internet routing protocol for transmission of IP packets will affect the efficiency in the use of the entire network and communications quality. A good IP network will have several characteristics:simplicity, packet-switched, connectionless, memoryless, best-effort. Therefore, Internet protocol has several advantages: flexible, robust, lower cost, provide the advantages of generalized service can be executed on any platform. Solve mechanism in IP network, network equipment damage can be divided into two types: netwo
APA, Harvard, Vancouver, ISO, and other styles
28

Wu, Chun-Rong, and 吳俊融. "Watermarking HDL Codes for Soft IP Protection." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/32s4zq.

Full text
Abstract:
碩士<br>崑山科技大學<br>電子工程研究所<br>96<br>Reuse-based Intellectual property (IP) design is one of the most promising techniques to take the SoC design quickly into market. However, soft IPs has higher protection requirements than hard IPs and most existing IP protection techniques are not applicable to soft IPs. In this paper, we proposed two practical schemes for HDL code protection by hiding author’s signature which is also called as watermark and similar to the idea for hard IP and multimedia data protection. We proposed how to embed watermark into HDL source codes by LUT (ROM) units and distributed
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Shi-Wei, and 陳仕偉. "An information hiding technique for Soft-IP protection." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/53816265570816373368.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊工程系所<br>93<br>As the progress of EDA tools and manufacturing technologies, we get shorter and shorter time-to-market. In order to catch up with the decreasing time-to-market, reuse pre-defined and pre-verified components is inevitable. This creates a new market of selling reusable pre-defined components ( i.e. Intellectual Property ). But the IP must be protected by some techniques from malicious duplication. In this thesis, we propose a new method to protect Soft-IP by hiding information in FSMs. We re-encode the state coding in the way that the difference of two states of s
APA, Harvard, Vancouver, ISO, and other styles
30

Hu, Hung-ta, and 胡宏達. "The Protection of IP Rights for the Drugs during Registration Process." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/96996452618593371370.

Full text
Abstract:
碩士<br>東吳大學<br>法律學系<br>97<br>This essay attempts to discuss the protection of IP rights for the drugs during registration process, and analyze the main issues concerning the objections of "Data Exclusivity", "the copyright of drug product package insert" and "Patent Linkage". Taking references to the comparative study of the related laws of U.S. and TRIPS, the author would conclude the opinions as following statement: 1. The legal property of drug registration data would be belong to “the Information Commissioner” 2. The TRIPs §39.3 use “trade secret” to protect the data submitted to the Govern
APA, Harvard, Vancouver, ISO, and other styles
31

Sue, Huang-Wen, and 蘇皇文. "A Study of Cross Layers Protection Scheme in IP over WDM Networks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/02124946900787793740.

Full text
Abstract:
碩士<br>國立中央大學<br>通訊工程研究所<br>93<br>Abstract Due to the explosive growth of user traffic driven by the Internet technology, network survivability has become one of the important issues of internet.deployment. In this thesis, we investigate various kinds of protection approaches in IP/MPLS-over-WDM networks. In GMPLS (Generalized Multi-Protocol Label Switching), an LSP (Label Switch Path) can be protected at either the sequential-routing approach or the integrated-routing approach. In sequential-routing approach, an LSP (LSR) can be protected at either the IP/MPLS layer protection or the optical l
APA, Harvard, Vancouver, ISO, and other styles
32

Chang, Chi-Chien, and 張綺倩. "Non-Weighted Load Balanced Fast Local Protection Schemes for IP Survivable Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/15489552026876297817.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程學系<br>98<br>Long packet delay and service interruption are unacceptable for applications with high QoS requirement in IP networks. When a failure occurs, the total recovery time for current link state routing protocols (such as OSPF) may take up to tens of seconds to re-converge. To mitigate the impact of failures, many IP fast local recovery schemes have been proposed. However, some of them did not consider load balancing. Since the rerouted traffic must follow shortest path routing governed by link weight, it would result in congestion or overload on some heavy loaded lin
APA, Harvard, Vancouver, ISO, and other styles
33

Huang, Yan-Han, and 黃彥涵. "A SAT-Based FSM Watermarking Scheme for IP Protection of Sequential Circuit Design." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/20728943387835797611.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>104<br>System on Chip (SoC) is an integrated circuit which integrates computer components or other electronic systems into a single chip for combining multiple functions. With the advance of SoC technology, circuit design becomes more and more complicated, and therefore the use of ready-made Intellectual Property (IP) as the basic circuit units for a whole system design becomes a general development trend. For IP providers, how to protect their IPs from unauthorized use or plagiarized is an important issue. In addition to protecting IPs with laws or copyrights, embeddin
APA, Harvard, Vancouver, ISO, and other styles
34

Yu-Cheng, Fan. "Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200522465300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Fan, Yu-Cheng, and 范育成. "Design and Implementation of Digital Watermarking for SOC IP Identification, Multimedia Protection and Authentication." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/60881005838219294714.

Full text
Abstract:
博士<br>國立臺灣大學<br>電機工程學研究所<br>93<br>In this dissertation, the algorithm and architecture design and implementation of digital watermarking coding system are presented. The research focuses on three watermarking system: SoC IP watermarking for IP identification and digital right management framework, wavelet-based visible watermarking and fragile watermarking. Advances in semiconductor processing technology have led to rapid increases in integrated circuit (IC) design complexity. Intellectual property (IP)-based design methodologies have become a major concern in IC industries. Design reuse lea
APA, Harvard, Vancouver, ISO, and other styles
36

XIAO, BO-XIAN, and 蕭博先. "A Monitoring Cycle-based Fast Link Failure Protection Scheme for Fibbing Controlled IP Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/83fvyc.

Full text
Abstract:
碩士<br>國立中正大學<br>通訊工程研究所<br>107<br>Fibbing is a new network technology which enables flexible routing in IP networks. In a Fibbing network, the network controller cleverly broadcasts OSPF Link State Advertisements (LSAs) into the network to generate some fake nodes. Those fake nodes change the topology viewed by the routers so as to steer traffic in the network. As a result, the shortest path routing constraint in IP networks is relaxed. Although Fibbing networks own the capability of flexible routing, how to achieve fast failure recovery is not well addressed. Conventionally an IP network run
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Yueh-Chun, and 陳岳駿. "A Study on IP Protection of Computer Program and Business Method - Focusing on Patent Law." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/14148908603171229753.

Full text
Abstract:
碩士<br>國立高雄第一科技大學<br>科技法律研究所<br>98<br>The subject to be explored in this thesis is inspired by the experiences of information technology. This study began by seeking ways to provide truly effective and adequate legal protection for works of computer software developers after going through an exhausting, painstaking process, particularly in modern days when the importance of intellectual property has been widely recognized, and the awareness of legal protection of various intellectual property rights is rising. In regard to computer program and business method inventions, the Copyright Law, Tr
APA, Harvard, Vancouver, ISO, and other styles
38

"Defending against low-rate TCP attack: dynamic detection and protection." 2005. http://library.cuhk.edu.hk/record=b5892579.

Full text
Abstract:
Sun Haibin.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.<br>Includes bibliographical references (leaves 89-96).<br>Abstracts in English and Chinese.<br>Abstract --- p.i<br>Chinese Abstract --- p.iii<br>Acknowledgement --- p.iv<br>Chapter 1 --- Introduction --- p.1<br>Chapter 2 --- Background Study and Related Work --- p.5<br>Chapter 2.1 --- Victim Exhaustion DoS/DDoS Attacks --- p.6<br>Chapter 2.1.1 --- Direct DoS/DDoS Attacks --- p.7<br>Chapter 2.1.2 --- Reflector DoS/DDoS Attacks --- p.8<br>Chapter 2.1.3 --- Spoofed Packet Filtering --- p.9<br>Chapter 2.1.4 --- IP Tra
APA, Harvard, Vancouver, ISO, and other styles
39

Lücking, Thomas. "Acquisition Behavior in High-Technology Industries – The Role of Product Diversification, Technological Change, and IP Protection." Doctoral thesis, 2013. https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-85065.

Full text
Abstract:
Frequent acquisition activities in high-technology industries are due to the intense competition, driven by short product life cycles, more complex products/services and prevalent network effects. This dissertation theoretically analyzes the circumstances leading to technology-driven acquisitions and empirically tests these within a clearly defined market scenario<br>Die zahlreichen Unternehmensakquisitionen in Hochtechnologiebranchen sind einem intensiven Wettbewerb geschuldet, der durch immer kürzere Produktlebenszyklen, komplexere Produktdesigns und extreme Netzwerkeffekte geprägt ist. Die
APA, Harvard, Vancouver, ISO, and other styles
40

Sung, Houng-Shiang, and 宋宏祥. "The Application of IP-Camera on Water Protection Using Gore-Tex Film and The Moisture Coagulation Problem Solution Analysis." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/29730514936603298627.

Full text
Abstract:
碩士<br>國立交通大學<br>工學院精密與自動化工程學程<br>100<br>This study describes the future application and development of IP camera and compares IP camera with conventional surveillance camera CCTV to explain characteristic differences between the two. In the study, IP camera was applied for analyzing the foggy phenomenon produced by breathable Gore-Tex film. The goal is to examine the appropriateness of currently available methods for preventing fogginess as well as to offer more effective strategies for resolving this phenomenon. Considering the manufacturing method of Gore-Tex breathable film and characterist
APA, Harvard, Vancouver, ISO, and other styles
41

Hunko, M. A., та V. M. Tkachov. "Development of a module for sorting the ip-addresses of user nodes in cloud firewall protection of web resourсes". Thesis, 2019. http://openarchive.nure.ua/handle/document/13993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Zulhasnine, Mohammad. "Availability-Aware Spare Capacity Allocation with Partially Protected Rings." Thesis, 2008. http://hdl.handle.net/10012/3584.

Full text
Abstract:
This thesis work focuses on designing a survivable IP-core network with the minimal investment of spare capacity. A span-oriented spare capacity allocation (SCA) scheme is proposed to satisfy customers' availability requirements in the end-to-end (E2E) sense. The novelty of the proposed SCA scheme is that it meets the E2E availability requirements despite the lack of knowledge of E2E bandwidth by employing protection rings covering all links in the network. Different ring selection methods are presented and also compared from the aspect of network redundancy and LP feasibility which provide mo
APA, Harvard, Vancouver, ISO, and other styles
43

Malik, Shweta. "Development of a Layout-Level Hardware Obfuscation Tool to Counter Reverse Engineering." 2015. https://scholarworks.umass.edu/masters_theses_2/238.

Full text
Abstract:
Reverse engineering of hardware IP block is a common practice for competitive purposes in the semiconductor industry. What is done with the information gathered is the deciding legal factor. Once this information gets into the hands of an attacker, it can be used to manufacture exact clones of the hardware device. In an attempt to prevent the illegal copies of the IP block from flooding the market, layout-level obfuscation based on switchable dopant is suggested for the hardware design. This approach can be integrated into the design and manufacturing flow using an obfuscation tool (ObfusTool)
APA, Harvard, Vancouver, ISO, and other styles
44

Ajigini, Olusegun Ademolu. "A framework to manage sensitive information during its migration between software platforms." Thesis, 2016. http://hdl.handle.net/10500/21118.

Full text
Abstract:
Software migrations are mostly performed by organisations using migration teams. Such migration teams need to be aware of how sensitive information ought to be handled and protected during the implementation of the migration projects. There is a need to ensure that sensitive information is identified, classified and protected during the migration process. This thesis suggests how sensitive information in organisations can be handled and protected during migrations by using the migration from proprietary software to open source software to develop a management framework that can be used to mana
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!