全文获取类型
收费全文 | 63篇 |
免费 | 0篇 |
专业分类
各国政治 | 1篇 |
外交国际关系 | 2篇 |
法律 | 44篇 |
中国政治 | 2篇 |
政治理论 | 2篇 |
综合类 | 12篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2021年 | 1篇 |
2020年 | 1篇 |
2019年 | 1篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 1篇 |
2015年 | 5篇 |
2014年 | 3篇 |
2013年 | 3篇 |
2012年 | 7篇 |
2011年 | 4篇 |
2010年 | 2篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 3篇 |
2005年 | 2篇 |
2004年 | 1篇 |
2003年 | 3篇 |
2001年 | 2篇 |
2000年 | 1篇 |
1990年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有63条查询结果,搜索用时 15 毫秒
41.
Yijun Tian 《Computer Law & Security Report》2009,25(4):352-366
This paper will focus on the recent development of the Chinese IP abuse legislation and its potential impact on IP protection and the operation of technology-driven foreign enterprises in China. Firstly, it will provide a brief overview of the TRIPS's requirements on IPR abuse and technology transfer, and the recent development of IP abuse laws at the domestic level, particularly in the US and the EC. Secondly, by drawing a comparison with similar laws in the US and the EC, this paper will critically examine the recent development of the Chinese laws regarding technology transfer and IP abuse prevention, including both the recently enacted Anti-Monopoly Law 2008 (AML) and other prior-AML regulations. Thirdly, the paper will examine both opportunities and potential risks these laws may bring to foreign IP holders/technology-driven companies when operating in China, particularly focusing on the impact of the IP-related provision in the AML. Recent development in antitrust litigation in which Microsoft is a party, including the recent anti-monopoly investigation against Microsoft in China, will also be examined. Lastly, it will provide some practical suggestions for foreign IP holders and technology-driven companies to operate in China, such as useful defences against potential IP abuse claims, and other strategies for flexibly applying the IP abuse rules and better participating in future IP abuse legislative process in China. 相似文献
42.
知识产权审判面临事实查明难度大,民事、刑事和行政审判领域之间缺乏沟通,确权纠纷解决程序设计不合理等现实问题。世界范围的知识产权审判体制改革业已形成较为一致的趋势和做法,我国知识产权法院的规划设计应当合理借鉴比较法经验,秉持战略思维、国情思维、改革思维和治理思维,按照四级两审、交错并行的纵向架构,均衡分布、两区分离的横向布局,在案件管辖上实行民事、刑事和行政纠纷的三审合一与技术类纠纷的集中管辖,通过准确的程序定位与有效的程序衔接提高确权争议解决的效率,以多元设计的程序规则和增设序列的队伍配备保障知识产权法院的有效运行。 相似文献
43.
Kathryn Hendley 《后苏联事务》2016,32(6):491-511
The article explores Russians’ satisfaction with their experiences in court and with the legal system more generally. The analysis draws on a nationally representative survey of Russians, fielded by the Levada Center in 2010. The results show that most court veterans believe that the decision in their case was just, and that the judge treated them well. But these positive feelings do not extend beyond their case. Russians who have no court experience tend to have more favorable views about the legal system than do court veterans. These findings serve to remind us of the difficulty of building confidence in the legal system in post-Soviet Russia. 相似文献
44.
针对信息家电上网的协议栈移植、地址资源有限等问题,设计并实现了一种可重构的嵌入式TCP/IP协议栈。该协议栈可以根据用户需求重构为IPv4.IPv6等多种协议栈,可以为家电上网以及其他嵌入式应用系统的远程网络控制提供一种良好的解决方案。 相似文献
45.
One of the ongoing conundrums in the field of IT law is the nature of software. Pragmatic solutions have been adopted, and lawyers and developers alike have become comfortable that contracts and licences can be drafted and concluded in relative certainty despite the fundamental conceptual problem. As Atiyah's Sale of Goods puts it:
?…?the key to the conundrum is not to get lost in metaphysical questions as to whether or not software is goods, but to focus on who is being sued in respect of what sort of defect, and to be clear as to the basis on which liability is being imposed. (Atiyah 2010, 78–79) 相似文献
46.
胡靖韬 《浙江青年专修学院学报》2009,26(2)
手机垃圾短信干扰着人们的正常生活,给接收人的生活学习带来不便,有些带有欺诈性质的短信更是给人们带来了不同程度的经济损失。治理垃圾短信,无论政府层面还是手机运营商等,都应当发挥各自的作用,抵制垃圾短信的产生,努力净化短信环境。 相似文献
47.
WTO框架下完善我国知识产权滥用规制制度的若干思考 总被引:8,自引:0,他引:8
防止滥用知识产权是WTO框架下的TRIPs协议确立的一项基本原则。我国对于知识产权滥用的规制既要充分利用TRIPs给予成员的立法空间,又要符合TRIPs协议的要求。我们应该就TRIPs协议中已经规定的对限制竞争行为的禁止、专利强制许可、滥用知识产权执法程序等几个方面来建立和完善规制知识产权滥用的制度,以全面履行TRIPs协议。 相似文献
48.
A.M. Marshall 《Science & justice》2003,43(4):237-248
Internet server managers have a range of techniques available to help them improve service performance and security. These techniques can become barriers to the investigation of illicit or illegal activity. This paper describes some of the legitimate techniques which can be used to improve server performance or security, and which present challenges for the investigator. Furthermore, it proposes a rigorous procedure which should be followed to ensure that any investigation of a web site or server has been complete and accurate, and that all possible useful information has been extracted and examined. 相似文献
49.
Evangelos Dragonas MSc Costas Lambrinoudakis PhD Michael Kotsis MSc 《Journal of forensic sciences》2024,69(1):117-130
CCTV surveillance systems are ubiquitous IoT appliances. Their forensic examination has proven critical for investigating crimes. DAHUA Technology is a well-known manufacturer of such products. Despite its global market share, research regarding digital forensics of DAHUA Technology CCTV systems is scarce and currently limited to extracting their video footage, overlooking the potential presence of valuable artifacts within their log records. These pieces of evidence remain unexploited by major commercial forensic software, yet they can hide vital information for an investigation. For instance, these log records document user actions, such as formatting the CCTV system's hard drive or disabling camera recording. This information can assist in attributing nefarious actions to specific users and hence can be invaluable for understanding the sequence of events related to incidents. Therefore, in this paper, several DAHUA Technology CCTV systems are thoroughly analyzed for these unexplored pieces of evidence, and their forensic value is presented. 相似文献
50.
将法律之间交叉领域的基本关系概括为一般法与特别法的关系以及一般法律竞合的关系,前者适用规则为特别法优先于一般法,后者当事人可自由选择适用.认为知识产权法与反不正当竞争法之间整体上不存在一般法与特别法的关系;就具体法条而言,大多数相关法条之间也不属于一般法规与特别法规的关系,应按照一般法律竞合处理两法交叉领域的法律适用问题,由当事人自由选择.如此总结知识产权法与反不正当竞争的关系,既能理顺并简化法律的适用,又能反映我国司法实践. 相似文献