Results 11 to 20 of about 1,739,326 (273)
A critical look at power law modelling of the Internet [PDF]
This paper takes a critical look at the usefulness of power law models of the Internet. The twin focuses of the paper are Internet traffic and topology generation. The aim of the paper is twofold.
Clegg, Richard G. +2 more
core +4 more sources
Problems of existing models of protection of computer programs in Ukraine
The law enforcement and legislative practice of most states followed the path of protecting computer programs by copyright law. It happened because the model of copyright protection of the computer programs is cheaper and faster procedure than patent ...
Олена Вікторівна Піхурець +1 more
doaj +1 more source
The Voting Rights Act was passed to prevent racial discrimination in all voting booths. Does the existence of a racial digital divide make Internet elections for public office merely a computer geek\u27s pipe dream?
Dongsheng Cui +7 more
core +3 more sources
Search of computers for discovery of electronic evidence [PDF]
In order to address the specific nature of criminal activities committed using computer networks and systems, the efforts of states to adapt or complement the existing criminal law with purposeful provisions is understandable.
Pisarić Milana M.
doaj +1 more source
This paper incorporates fairness concerns and consumer reference price effects into a two-echelon building-material closed-loop supply chain consisting of a manufacturer and a retailer.
Huimin Xiao, Youlei Xu, Shiwei Li
doaj +1 more source
How the Law Learns in the Digital Society
Recent court decisions have revealed how the law is frequently under pressure to adjust to novel digital technologies. As legal practice is blind to the factual particularities of the relationship between law and technology, the courts’ efforts to re ...
Christoph B Graber
doaj +1 more source
Criminal legal protection in the field of intellectual property and computer related rights in the Republic of Croatia [PDF]
More frequent infringements causing high damages to persons holding intellectual property rights have influenced the intensified actions within member states and the European Union in regard to the harmonisation of criminal legal protection in the field ...
Zlatović Dragan
doaj
The normative response to problems of detection and investigation of cyber crime [PDF]
Certain aspects of cyber crime represent the essence of the problems that authorities prosecuting crimes committed by abuse of information technology face everyday.
Pisarić Milana
doaj +1 more source
The Significance of Computer Forensics in Electronic Documents as Evidence in Criminal Law
Forensic science standards, no crime never leaves traces. Along with the emergence of cybercrime, a new type of evidence emerged as an expansion of conventional evidence in Indonesian criminal procedural law, namely electronic evidence as stated in the ...
Aris Hardinanto +2 more
doaj +1 more source
Recurrence and transience for the frog model on trees [PDF]
The frog model is a growing system of random walks where a particle is added whenever a new site is visited. A longstanding open question is how often the root is visited on the infinite $d$-ary tree.
Hoffman, Christopher +2 more
core +1 more source

