Search dblp for Publications

export results for "toc:db/journals/jthtl/jthtl8.bht:"

 download as .bib file

@article{DBLP:journals/jthtl/Adelmann10,
  author       = {Todd C. Adelmann},
  title        = {Are Your Bits Worn Out? The DMCA, Replacement Parts, and Forced Repeat
                  Software Purchases},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {185--216},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Adelmann.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Adelmann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Brensdal10,
  author       = {Kelli Brensdal},
  title        = {The Status of the Safe Harbor Provision after Proveris Scientific
                  Corp. v. Innovasystems, Inc},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {523--546},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Brensdal.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Brensdal10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Cohn10,
  author       = {Cindy Cohn},
  title        = {Lawless Surveillance, Warrantless Rationales},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {351--358},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Cohn.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Cohn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Dogan10,
  author       = {Stacey L. Dogan},
  title        = {Beyond Trademark Use},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {135--156},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Dogan.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Dogan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Frieden10,
  author       = {Rob Frieden},
  title        = {Case Studies in Abandoned Empiricism and the Lack of Peer Review at
                  the Federal Communications Commission},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {277--312},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Frieden.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Frieden10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Fry10,
  author       = {Blake Fry},
  title        = {Why Typefaces Proliferate Without Copyright Protection},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {425--490},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Fry.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Fry10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Goldman10,
  author       = {Eric Goldman},
  title        = {Wikipedia's Labor Squeeze and its Consequences},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {157--184},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Goldman.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Goldman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Greenstein10,
  author       = {Shane Greenstein},
  title        = {Glimmers and Signs of Innovative Health in the Commercial Internet},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {25--78},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Greenstein.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Greenstein10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/HahnS10,
  author       = {Robert Hahn and
                  Hal J. Singer},
  title        = {Why the iPhone Won't Last Forever and What the Government Should Do
                  to Promote its Successor},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {313--350},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_HahnSinger.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/HahnS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Kovacic10,
  author       = {William E. Kovacic},
  title        = {The Digital Broadband Migration and the Federal Trade Commission:
                  Building the Competition and Consumer Protection Agency of the Future},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {1--24},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Kovacic.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Kovacic10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Larsen10,
  author       = {Per Larsen},
  title        = {Text Message Price Gouging: {A} Perfect Storm of Tacit Collusion},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {217--242},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Larsen.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Larsen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Loewenstein10,
  author       = {Avi Loewenstein},
  title        = {Ticket Sniping},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {243--276},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Loewenstein.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Loewenstein10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Looijen10,
  author       = {Devin Looijen},
  title        = {Time for a Change: The Schema of Contract in the Digital Era},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {547--570},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Looijen.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Looijen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/OHolleran10,
  author       = {Jeffrey O'Holleran},
  title        = {Blood Code: The History and Future of Video Game Censorship},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {571--612},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_OHolleran.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/OHolleran10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Reid10,
  author       = {Blake Ellis Reid},
  title        = {Introduction},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Intro.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Reid10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Reid10a,
  author       = {Blake Ellis Reid},
  title        = {Introduction},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Intro.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Reid10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Reid10b,
  author       = {Blake Ellis Reid},
  title        = {Substitution Effects: {A} Problematic Justification for the Third-Party
                  Doctrine of the Fourth Amendment},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {613--630},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Reid.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Reid10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Samuelson10,
  author       = {Pamela Samuelson},
  title        = {Academic Author Objections to the Google Book Search Settlement},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {491--522},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Samuelson.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Samuelson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Soghoian10,
  author       = {Christopher Soghoian},
  title        = {Caught in the Cloud: Privacy, Encryption, and Government Back Doors
                  in the Web 2.0 Era},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {2},
  pages        = {359--424},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I2/JTHTLv8i2\_Soghoian.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Soghoian10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Speta10,
  author       = {James B. Speta},
  title        = {The Shaky Foundations of the Regulated Internet},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {101--134},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Speta.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Speta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jthtl/Yoo10,
  author       = {Christopher S. Yoo},
  title        = {Innovations in the Internet's Architecture that Challenge the Status
                  Quo},
  journal      = {J. Telecommun. High Technol. Law},
  volume       = {8},
  number       = {1},
  pages        = {79--100},
  year         = {2010},
  url          = {http://www.jthtl.org/content/articles/V8I1/JTHTLv8i1\_Yoo.PDF},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jthtl/Yoo10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics