Search dblp for Publications

export results for "toc:db/journals/jthtl/jthtl3.bht:"

 download as .bib file

@article{DBLP:journals/jthtl/Abernathy05,
  author       = {Kathleen Q. Abernathy},
  title        = {Preserving Universal Service in the Age of {IP}},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {409--416},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Abernathy.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Abernathy05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Black05,
  author       = {John Black},
  title        = {The Impossibility of Technology-Based {DRM} and a Modest Suggestion},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {387--396},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Black.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Black05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Fernandez05,
  author       = {Ben Fernandez},
  title        = {Digital Content Protection and Fair Use: What's the Use?},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {425--452},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Fernandez.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Fernandez05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Gunning05,
  author       = {Eric D. Gunning},
  title        = {Introduction},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Intro.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Gunning05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Manner05,
  author       = {Jennifer Manner},
  title        = {Emerging Communications Technologies: Wireless Deployments and Beyond},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {417--424},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Manner.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Manner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Owens05,
  author       = {Jennifer Owens},
  title        = {"Not Quite Dead Yet": The Near Fatal Wounding of the Experimental
                  Use Exception and its Impact on Public Universities},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {453},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Owens.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Owens05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Ryan05,
  author       = {Patrick S. Ryan},
  title        = {Wireless Communications and Computing at a Crossroads: New Paradigms
                  and Their Impact on Theories Governing the Public's Right to Spectrum
                  Access},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {239--274},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Ryan.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Ryan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Thierer05,
  author       = {Adam Thierer},
  title        = {Are "Dumb Pipe" Mandates Smart Public Policy? Vertical Integration,
                  Net Neutrality, and the Network Layers Model},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {275--308},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Thierer.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Thierer05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Wallman05,
  author       = {Kathleen Wallman},
  title        = {The Tension Between Privacy and Security: An Analysis Based on Coase
                  and Pigou},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {397--408},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Wallman.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Wallman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Williamson05,
  author       = {John Matthew Williamson},
  title        = {Rights Management in Digital Media Content: {A} Case for {FCC} Intervention
                  in the Standardization Process},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {2},
  pages        = {309--386},
  year         = {2005},
  url          = {http://www.jthtl.org/content/articles/V3I2/JTHTLv3i2\_Williamson.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Williamson05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Gunning04,
  author       = {Eric D. Gunning},
  title        = {Introduction},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Intro.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Gunning04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Linhoff04,
  author       = {Joe Linhoff},
  title        = {Video Games and Reverse Engineering: Before and After the Digital
                  Millennium Copyright Act},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {209--237},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Linhoff.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Linhoff04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Marcus04,
  author       = {J. Scott Marcus},
  title        = {Evolving Core Capabiliites of the Internet},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {121--162},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Marcus.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Marcus04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Powell04,
  author       = {Michael K. Powell},
  title        = {Preserving Internet Freedom: Guiding Principles for the Industry},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {5--22},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Powell.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Powell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Shelanski04,
  author       = {Howard A. Shelanski},
  title        = {Competition Policy for Mobile Broadband Networks},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {97--120},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Shelanski.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Shelanski04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Swire04,
  author       = {Peter P. Swire},
  title        = {A Model for When Disclosure Helps Security: What Is Different About
                  Computer and Network Security?},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {163--208},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Swire.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Swire04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Weiser04,
  author       = {Philip J. Weiser},
  title        = {Introduction: {A} Regulatory Regime for the Internet Age},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {1--4},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Weiser.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Weiser04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Wu04,
  author       = {Tim Wu},
  title        = {The Broadband Debate, {A} User's Guide},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {69--96},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Wu.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Wu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Yoo04,
  author       = {Christopher S. Yoo},
  title        = {Would Mandating Broadband Network Neutrality Help or Hurt Competition?
                  {A} Comment on the End-to-End Debate},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {3},
  number       = {1},
  pages        = {23--68},
  year         = {2004},
  url          = {http://www.jthtl.org/content/articles/V3I1/JTHTLv3i1\_Yoo.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Yoo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics