Loading...
Advanced Search
Welcome Guest
RSS
RSS
Public Health
Computer Engineering
Agriculture
Environment
Legacy Lectures
Home
Authors
Public Health
|
Computer Engineering
|
Agriculture
|
Environment
Assist researchers in planning and analyzing their research efforts
Member Login
Log in or sign up for more personalized features
Please fill in your email.
Please fill in a valid email
Please fill in your password
sign up
Remember me
Forgot your password?
Home
»
Computer Engineering
»
Computing Environment
»
Legal Aspects of Computing
» Hardware/Software Protection (13) lectures
Order By: Newest |
Rating
|
View Count
Florida’s Public Records Act and Electronic Communications
By Deal, Charles M.
22 Slide(s),
1,700 Views, Added 13 years ago, in English
Classified as :
Public Health
»
Medical care
»
Discrimination in medical care
Computer Engineering
»
Computing Environment
»
Legal Aspects of Computing
»
Hardware/Software Protection
»
Licensing
and 2 more...
Supply Chain Strategy
50 Slide(s),
7,929 Views, Added 13 years ago
Classified as :
Computer Engineering
»
Computing Environment
»
Legal Aspects of Computing
»
Hardware/Software Protection
»
Patents
Computer Engineering
»
Computing Environment
»
Management of Computing and Information Systems
»
Installation Management
»
Computer selection
and 20 more...
COOPERATIVE INNOVATION IN THE COMMONS Rethinking Distributed Collaboration and Intellectual Property for Sustainable Design Innovation
37 Slide(s),
2,339 Views, Added 13 years ago
Classified as :
Computer Engineering
»
Computer Systems Organization
»
Processor Architectures
»
Multiple Data Stream Architectures (Multiprocessors)
»
Associative processors
Computer Engineering
»
Computer Systems Organization
»
Processor Architectures
»
Other Architecture Styles
»
Capability architectures
and 11 more...
The Future of JA-SIG and uPortal
53 Slide(s),
1,201 Views, Added 13 years ago
Classified as :
Computer Engineering
»
Computer Systems Organization
»
Computer System Implementation
»
Servers
Computer Engineering
»
Software
»
Software Engineering
»
Interoperability
»
Distributed objects
and 4 more...
The Anatomy of a Patent Understanding the legal vs. technical significance of claims, specifications and drawings in different contexts
34 Slide(s),
858 Views, Added 13 years ago
Classified as :
Computer Engineering
»
Computer Applications
»
Physical Sciences and Engineering
»
Electronics
Computer Engineering
»
Computer Applications
»
Physical Sciences and Engineering
»
Engineering
and 2 more...
Trespass to Chattels: Spam
By Warner, Richard
17 Slide(s),
207 Views, Added 13 years ago, in English
Classified as :
Computer Engineering
»
Computing Environment
»
Legal Aspects of Computing
»
Hardware/Software Protection
»
Proprietary rights
Previous
1
2
3
Next
Computer Engineering (57,730)
Artificial Intelligence (
2,759
)
Computer Applications (
321
)
Computer Graphics (
1,072
)
Computer Systems Organization (
441
)
Computing Environment (
712
)
Computers and Education (
39
)
Computers and Society (
25
)
History of Computing (
19
)
Legal Aspects of Computing (
31
)
Governmental Issues (
21
)
Hardware/Software Protection (
13
)
Copyrights (
1
)
Licensing (
9
)
Patents (
5
)
Proprietary rights (
4
)
Management of Computing and Information Systems (
89
)
Personal Computing (
65
)
The Computer Industry (
19
)
The Computing Profession (
17
)
Data (
11,409
)
Document and Text Processing (
193
)
Hardware (
11,191
)
Image Processing and Computer Vision (
2,524
)
Information Systems (
4,028
)
Mathematics of Computing (
393
)
Pattern Recognition (
1,110
)
Simulation and Modeling (
1,216
)
Software (
14,813
)
Symbolic and Algebraic Manipulation (
48
)
Theory of Computation (
391
)
Unclassified (
18,885
)
Based on the
ACM
Computing Classification System
Automatically Rated
Rated By Users
Your Feedback
Title:
Content:
You forgot to fill in your feedback
Thank You
Your feedback has been sent successfully
Register
Please
sign up
or login in Science Supercourse to enjoy all its facilities !
Please fill in your email.
Please fill in a valid email
Please fill in your password