Results 11 - 20
of
5,105
Table 2 Notable dates in the US history of copyright
"... In PAGE 4: ... It administers the copyright law, creates and maintains public records, and serves as a resource to the domestic and interna- tional copyright communities. Table2 shows some of the copyright milestones in the US for the last two centuries [54,1,25]. 3.... ..."
Table 12. Perceived Advantages and Disadvantages of Copyright Advantages
"... In PAGE 5: ...able 11. Methods for Protecting Software Creations - PROs................... 64 Table12 .... In PAGE 76: ... Again, as with the SMEs, the PROs appeared to be aware of the advantages and disadvantages that copyright protection offer. The data provided below in Table12 , show that the representatives from the PROs believed copyright law to be less complicated than patent law, and were of the opinion that copyright offered a sufficient level of IP protection. Significantly, the latter two were regarded as being the most advantageous aspects of copyright protection.... ..."
Table 2: Attributes used for quality and copyright
"... In PAGE 5: ... This is guaranteed by introducing a copyright scheme. Attributes as listed in Table2 are thus added to the table- objects. 5.... ..."
Table 3. Permissible and Impermissible Uses of Copyrighted Material.
1999
"... In PAGE 7: ... However, copyright holders have exclusive rights to public display and public performance of their works. Table3 shows some common classroom allowed and disallowed activities gleaned from our current statutes as well as recent case law: Permissible Uses Impermissible Uses Unlimited, non-dramatic performances of music or literature (i.e.... ..."
Table 7. Business Models for Copyrighted Works
2003
Cited by 30
Table 7 Business models for copyrighted works
Table 1. A Summary of Copyright Watermarking Techniques.
"... In PAGE 4: ... WT/DCT will stand up better against those attacks that are the more likely attacks that include compression, filtering, rotation and cropping. See Table1 below for a comparison of the two methods. 4.... In PAGE 4: ... If pure watermarking strength is the most important criteria, then DWT/DFT is the best choice. See Table1 below for a summary of these findings. The first was set forth in a paper by C.... ..."
Table 4. Use of formal IPR methods (% of each group) Level of use of
"... In PAGE 5: ...able 3. Informal methods of IP protection................................................ 34 Table4 .... In PAGE 51: ... In his analysis Miles distinguished the way in which firms protected their IP and innovations on the basis of formal IPR and informal methods of protection. It is interesting to note that figures reported in Table4 below for use of copyright as a formal method protection range between zero per cent in the Always category to 90 per cent in the Never category. This prompts one to question if the service firms that were surveyed know that copyright is automatic.... In PAGE 51: ... Alternatively, these responses may suggest that the respondents were referring only to the use of copyright notices that accompany the delivery of the service product?127 Nonetheless, this ambiguity suggests a need for IPR awareness raising measures to highlight the automatic nature of copyright. The data provided by Table4 also suggest that services firms may patent more frequently than it is generally assumed. For instance, more than one third of the respondents from the environmental engineering sector report using patents at least some of the times However, when compared to informal methods of protection, there is a preponderant use of the latter.... ..."
TABLE III. Suppofl for Copyright and/or Patent for Software Aspects
1990
Cited by 1
Results 11 - 20
of
5,105