Results 11 to 20 of about 1,739,326 (273)

A critical look at power law modelling of the Internet [PDF]

open access: yes, 2009
This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold.
Clegg, Richard G.   +2 more
core   +4 more sources

Problems of existing models of protection of computer programs in Ukraine

open access: yesТеорія і практика правознавства, 2019
The law enforcement and legislative practice of most states followed the path of protecting computer programs by copyright law. It happened because the model of copyright protection of the computer programs is cheaper and faster procedure than patent ...
Олена Вікторівна Піхурець   +1 more
doaj   +1 more source

Is I-Voting I-Llegal? [PDF]

open access: yes, 2003
The Voting Rights Act was passed to prevent racial discrimination in all voting booths. Does the existence of a racial digital divide make Internet elections for public office merely a computer geek\u27s pipe dream?
Dongsheng Cui   +7 more
core   +3 more sources

Search of computers for discovery of electronic evidence [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2015
In order to address the specific nature of criminal activities committed using computer networks and systems, the efforts of states to adapt or complement the existing criminal law with purposeful provisions is understandable.
Pisarić Milana M.
doaj   +1 more source

A Building-Material Supply Chain Sustainable Operations under Fairness Concerns and Reference Price Benefits

open access: yesComplexity, 2021
This paper incorporates fairness concerns and consumer reference price effects into a two-echelon building-material closed-loop supply chain consisting of a manufacturer and a retailer.
Huimin Xiao, Youlei Xu, Shiwei Li
doaj   +1 more source

How the Law Learns in the Digital Society

open access: yesLaw, Technology and Humans, 2021
Recent court decisions have revealed how the law is frequently under pressure to adjust to novel digital technologies. As legal practice is blind to the factual particularities of the relationship between law and technology, the courts’ efforts to re ...
Christoph B Graber
doaj   +1 more source

Criminal legal protection in the field of intellectual property and computer related rights in the Republic of Croatia [PDF]

open access: yesPravni Zapisi, 2015
More frequent infringements causing high damages to persons holding intellectual property rights have influenced the intensified actions within member states and the European Union in regard to the harmonisation of criminal legal protection in the field ...
Zlatović Dragan
doaj  

The normative response to problems of detection and investigation of cyber crime [PDF]

open access: yesZbornik Radova: Pravni Fakultet u Novom Sadu, 2013
Certain aspects of cyber crime represent the essence of the problems that authorities prosecuting crimes committed by abuse of information technology face everyday.
Pisarić Milana
doaj   +1 more source

The Significance of Computer Forensics in Electronic Documents as Evidence in Criminal Law

open access: yesJurnal Cakrawala Hukum, 2023
Forensic science standards, no crime never leaves traces. Along with the emergence of cybercrime, a new type of evidence emerged as an expansion of conventional evidence in Indonesian criminal procedural law, namely electronic evidence as stated in the ...
Aris Hardinanto   +2 more
doaj   +1 more source

Recurrence and transience for the frog model on trees [PDF]

open access: yes, 2016
The frog model is a growing system of random walks where a particle is added whenever a new site is visited. A longstanding open question is how often the root is visited on the infinite $d$-ary tree.
Hoffman, Christopher   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy