default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 154 matches
- 1996
- David L. Hayes:
A comprehensive current analysis of software look and feel protection - Part III - Recent 'look' cases plus commencement of analysis of the 'feel' cases. Comput. Law Secur. Rev. 12(2): 66-79 (1996) - Editorial. Comput. Law Secur. Rev. 12(1): 1 (1996)
- International legal protection for software. Comput. Law Secur. Rev. 12(1): 2-13 (1996)
- News and comment on recent developments from around the world. Comput. Law Secur. Rev. 12(2): 117-131 (1996)
- Communicating Britain's future. Comput. Law Secur. Rev. 12(2): 132 (1996)
- A comprehensive analysis of software look and feel protection - Part IV - Continued analysis of the 'feel' cases. Comput. Law Secur. Rev. 12(3): 133 (1996)
- Experimental use and patents: By David Gilat, Volume 16, IIC Studies in Industrial Property and Copyright Law, 1995, soft-cover, VCH Publishers Inc., DM128/SFr128, 141 pp., ISBN 3527286608. Comput. Law Secur. Rev. 12(3): 134-142 (1996)
- The EC legal advisory Board's reply to the green paper on copyright and related rights in the information society. Comput. Law Secur. Rev. 12(3): 142 (1996)
- Public administration and information technology: By Jon Bing and Dag Wiese Schartum, 1995, soft-cover, Tano Press, 295 pp., NOK238, - ISBN 8251834163. Comput. Law Secur. Rev. 12(3): 143-149 (1996)
- Public policy and legal regulation of the information market in the digital network environment: By Stephen Saxby, soft-cover, Tano Press, 184 pp., NOK238, - ISBN 8251834449. Comput. Law Secur. Rev. 12(3): 149 (1996)
- Statement of William J. Cook before the house judiciary committee courts and intellectual property subcommittee continued hearing on the NII copyright protection act - 8 February 1996. Comput. Law Secur. Rev. 12(3): 149 (1996)
- International year book of law, computers and technology, volumes VII-IX: Edited by Kenneth Russell, 1993-1995, hard-cover, Carfax Publishing Company, 275 pp. (Vol VII), 362 pp. (Vol VIII) and 241 pp. (Vol IX), ISBN 0902 879 057 (Vol VII); 0902 879 502 (Vol VIII) and 0902 879 60X (Vol IX). Comput. Law Secur. Rev. 12(3): 150-156 (1996)
- Protection of computer programs in Ireland. Comput. Law Secur. Rev. 12(3): 156 (1996)
- European information and communication technologies. Comput. Law Secur. Rev. 12(3): 157-159 (1996)
- The data protection directive: A legal analysis. Comput. Law Secur. Rev. 12(3): 159 (1996)
- Data protection in health and telematics projects compliance with legal and ethical requirements1. Comput. Law Secur. Rev. 12(3): 160-168 (1996)
- Peddling big brother. Comput. Law Secur. Rev. 12(3): 169-176 (1996)
- Infonortics has published two new indepth briefings on different aspects of electronic publishing. The first is: The legal and regulatory environment for electronic information: 2nd Edition, by Charles Oppenheim, 1995, soft-cover, Infonortics, 132 pp., £95/US$150, ISBN 18736699239. Comput. Law Secur. Rev. 12(3): 177-179 (1996)
- The second text is: Publishing on the internet - A new medium for a new millennium: By Stephen E Arnold, 1996, soft-cover, Infonortics, 157 pp., £95/US $150, ISBN 187369928X. Comput. Law Secur. Rev. 12(3): 179 (1996)
- Electronic cash strikes a sour note for privacy. Comput. Law Secur. Rev. 12(3): 180-181 (1996)
- OECD publications. Comput. Law Secur. Rev. 12(3): 181 (1996)
- EC developments in it law. Comput. Law Secur. Rev. 12(3): 182-184 (1996)
- News and comment on recent developments from around the world. Comput. Law Secur. Rev. 12(3): 185-200 (1996)
- Editorial. Comput. Law Secur. Rev. 12(4): 201 (1996)
- Doing business on the internet: The legal issues. Comput. Law Secur. Rev. 12(4): 202-213 (1996)
- A comprehensive analysis of software look and feel protection - part v - continued analysis of the 'feel' cases. Comput. Law Secur. Rev. 12(4): 214-225 (1996)
- Intellectual property law: By Jon Holyoak and Paul Torremans, 1995, soft-cover, Butterworth, 489 pp., £24.95, ISBN 040605245X. Comput. Law Secur. Rev. 12(4): 225 (1996)
- Butterworths intellectual property law handbooks: 2nd Edition, consulting editor Jeremy Phillips, 1994, soft-cover, Butterworths, 990 pp., £29.95, ISBN 0406026742. Comput. Law Secur. Rev. 12(4): 225 (1996)
- Online distribution: Mechanical right, performing right, or both. Comput. Law Secur. Rev. 12(4): 226-232 (1996)
- A comprehensive analysis of software 'look and feel' protection: Part II - Apple v Microsoft - The ninth circuit's decision. Comput. Law Secur. Rev. 12(1): 14-27 (1996)
skipping 124 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-18 11:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint