• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 3,442
Next 10 →

Table 12. Perceived Advantages and Disadvantages of Copyright Advantages

in Table of Contents
by Prof John Adams
"... In PAGE 5: ...able 11. Methods for Protecting Software Creations - PROs................... 64 Table12 .... In PAGE 76: ... Again, as with the SMEs, the PROs appeared to be aware of the advantages and disadvantages that copyright protection offer. The data provided below in Table12 , show that the representatives from the PROs believed copyright law to be less complicated than patent law, and were of the opinion that copyright offered a sufficient level of IP protection. Significantly, the latter two were regarded as being the most advantageous aspects of copyright protection.... ..."

Table 2: Attributes used for quality and copyright

in Designing a Market for Quantitative Knowledge
by unknown authors
"... In PAGE 5: ... This is guaranteed by introducing a copyright scheme. Attributes as listed in Table2 are thus added to the table- objects. 5.... ..."

Table 3. Permissible and Impermissible Uses of Copyrighted Material.

in I. THE LAW OF COPYRIGHT A. The Basics
by Dr. Robert, N. Diotalevi, Ll. M 1999
"... In PAGE 7: ... However, copyright holders have exclusive rights to public display and public performance of their works. Table3 shows some common classroom allowed and disallowed activities gleaned from our current statutes as well as recent case law: Permissible Uses Impermissible Uses Unlimited, non-dramatic performances of music or literature (i.e.... ..."

Table 7. Business Models for Copyrighted Works

in unknown title
by unknown authors 2003
Cited by 30

Table 7. Business Models for Copyrighted Works

in Security of Digital Entertainment Content From Creation to Consumption
by Ahmet Eskicioglu John, John Town, Edward J. Delp 2003
Cited by 30

Table 7 Business models for copyrighted works

in Security of digital entertainment content from creation to consumption
by Ahmet M. Eskicioglu A, John Town B, Edward J. Delp C

Table 1. A Summary of Copyright Watermarking Techniques.

in Abstract Copyright Protection of Digital Still Images Using Invisible Watermarking Techniques
by unknown authors
"... In PAGE 4: ... WT/DCT will stand up better against those attacks that are the more likely attacks that include compression, filtering, rotation and cropping. See Table1 below for a comparison of the two methods. 4.... In PAGE 4: ... If pure watermarking strength is the most important criteria, then DWT/DFT is the best choice. See Table1 below for a summary of these findings. The first was set forth in a paper by C.... ..."

TABLE III. Suppofl for Copyright and/or Patent for Software Aspects

in Survey on the Look and Feel Lawsuits
by Pamela Samuelson, Robert Glushko 1990
Cited by 1

Table 1. 2002 estimated US trade losses due to copyright piracy in 56 countries.

in unknown title
by unknown authors
"... In PAGE 3: ...2 billion in trade due to piracy. Table1 lists the 2002 trade losses for five copyright- based industry sectors. A 14 February 2003 letter from IIPA to the US Trade Commission argued that copyright gives creators the basic property rights that enable them to authorize and control the copying, distribution, performance, and display of the works they create.... ..."

Table 2: Licensing agreements

in Joint Meeting with:- Meeting Number: 83 Simultaneous Interpretation: Yes Licensing Issues for Central and Eastern European Libraries
by Maja Žumer
"... In PAGE 4: ... Table2 shows that many libraries in CEE countries have been exposed to licensing. Licensing consortia are becoming more and more common in CEE countries.... ..."
Next 10 →
Results 11 - 20 of 3,442
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University