507,302 research outputs found

    A Methodology for Developing Computational Implementations of Scientific Theories

    Get PDF
    ā€œThis material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." ā€œCopyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.ā€Computer programs have become a popular representation for scientific theories, particularly for implementing models or simulations of observed phenomena. Expressing a theory as an executable computer program provides many benefits, including: making all processes concrete, supporting the development of specific models, and hence enabling quantitative predictions to be derived from the theory. However, as implementations of scientific theories, these computer programs will be subject to change and modification. As programs change, their behaviour will also change, and ensuring continuity in the scientific value of the program is difficult. We propose a methodology for developing computer software implementing scientific theories. This methodology allows the developer to continuously change and extend their software, whilst alerting the developer to any changes in its scientific interpretation. We introduce tools for managing this development process, as well as for optimising the developed models

    Software Copyright Infringement Claims after \u3ci\u3eMAI Systems v. Peak Computer\u3c/i\u3e

    Get PDF
    In MAI Systems Corp. v. Peak Computer, Inc. the Ninth Circuit Court of Appeals held that Peak committed copyright infringement by running MAI operating system software incidental to Peak\u27s repair of the computer system. The court rejected Peak\u27s section 117 defense under the Copyright Act because it refused to recognize a licensee of computer software as an owner of a copy of software. This Note argues that the decision contravenes both the substance and principles of federal copyright law, and unnecessarily harms computer owners. It suggests a two-tiered analysis that courts should follow when evaluating copyright infringement claims involving software licensing agreements and third parties

    Copyright Protection of Software

    Full text link
    Computer technology has developed within the last decades with many advancements which require intellectual property protections. This thesis addresses the need for the legal protection of software by the vast body of copyright laws. This thesis examines the history, nature, textual and practical compositions of copyright laws and their adaptability to computer technology. The thesis further analyses the scope of copyright protection with emphasis on the Computer Software Copyright Act of 1980 (CSCA), the regime of international conventions for the protection of software as well as other statutory protections for the owners and users of the software. The thesis concludes with recommendations for improving software protection as a national and international matter while retaining the current framework

    Copyright Protection for ASIC Gate Configurations: PLDs, Custom and Semicustom Chips

    Get PDF
    Conventional wisdom holds that computer software and computer hardware require two different species of intellectual property protection. Software is thought best protected by copyright law, while hardware is thought best protected by patent law, trade secret law or the Semiconductor Chip Protection Act of 1984. Recent technological and legal developments blur software-hardware distinctions, as courts have extended copyright protection to object code, firmware and microcode, and patent protection to software. This note argues that the standard industry conceptions of hardware and software are inadequate to answer the legal question of what is copyrightable as a computer program. Furthermore, it considers whether application specific integrated circuits (ASICs), which are, typically, semi-custom hardware solutions to engineering design problems traditionally solved in software, should qualify as computer programs for purposes of copyright protection

    Copyright Protection for ASIC Gate Configurations: PLDs, Custom and Semicustom Chips

    Get PDF
    Conventional wisdom holds that computer software and computer hardware require two different species of intellectual property protection. Software is thought best protected by copyright law, while hardware is thought best protected by patent law, trade secret law or the Semiconductor Chip Protection Act of 1984. Recent technological and legal developments blur software-hardware distinctions, as courts have extended copyright protection to object code, firmware and microcode, and patent protection to software. This note argues that the standard industry conceptions of hardware and software are inadequate to answer the legal question of what is copyrightable as a computer program. Furthermore, it considers whether application specific integrated circuits (ASICs), which are, typically, semi-custom hardware solutions to engineering design problems traditionally solved in software, should qualify as computer programs for purposes of copyright protection

    An Investigation into the Australian Position on Software Copyright

    Get PDF
    Copyright Is the primary means most software authors seek to protect their software. Software, that is work (the ordered expression of thought) put into some tangible form (such a being written down, stored in a computer, programs, data and distributed files) is a truly international product. Where does this copyright protection come from? The current governing laws in Australia are the Australian Copyright Act of 1968 (Cwlth) and the Australian Copyright Amendments Act 1984 (Cwlth) which afford copyright protection to computer software. In copyright law, a number of words and terms have specialised meanings, which are different to their meanings in everyday language. These terms are important for determining the scope of copyright law. Including the types of material that are protected by copyright and the types of activities that infringe copyright, they are examined in this thesis. In Australia, copyright protection to is relatively easily, cheap and has been designed so as to be a powerful deterrent to software pirates, in many nations it is completely automatic. Yet independent research conducted by the Business Software Association of Australia (see Chapter 2) estimated that total losses to the software industry from software piracy In Australia in 1992 could have been as high as $400 million dollars. On this basis alone the clarification of how copyright is applied to afford protection to computer software is a worthy undertaking. Copyright experts around the world are debating, discussing, conferencing, writing and publishing their views on the direction that copyright law must take to meet the challenges posed by the new modes of communication. The only thing that can be agreed upon is that technology has outpaced the effectiveness of the Australia\u27s Software Copyright Laws. Part of this debate today is not about the need for copyright to cover authors from abuse of their work it is about whether software copyright stretches far enough to protect the rights of the authors. In an Australian context this poses the questions: ā€¢ \u27What Is the Australian position on Software Copyright? ā€¢ \u27What is the Australian position on Software Copyright in the advent of the Information Age? ā€¢ How effective are these positions? ā€¢ How will these positions stand up to challenges? This thesis, the result of extended descriptive research activity examines these questions in detail. Additionally H considers how the recommendations of the Australian Copyright Law Review Committee for changes to the Australian Copyright Act of 1968 (Cwlth) to afford suitable protection to software and computer programs If enacted in legislation will alter Australia\u27s current position on Software Copyright and impact on the future of the copyright doctrine

    Software Look and Feel Protection in the 1990s

    Get PDF
    This article reviews the historical development of look and feel copyright protection of computer software, including discussion of decisions favoring broad protection, decisions favoring competitive principles, and decisions taking an analytic approach to software copyright protection. The article also analyzes recent U.S. Supreme Court decisions to explore how the Court may decide the computer software look and feel issues, including consideration of how Lanham Act trade dress protection might be applied to protect computer software visual displays

    Copyright on Computer Software Products in Palangka Raya City (Positive Legal Perspective and Sharia Economic Law)

    Get PDF
    The widespread use and sale of pirated software products to the public in Palangka Raya City, who have the potential to commit copyright infringement, motivates this research. The use and sale of software products without permission from the creator/copyright holder is piracy and an act of copyright infringement under the Copyright Law and the MUI Fatwa. This study discusses the forms and constraints in controlling Copyright on computer software products and Islamic views on the practice of buying and selling pirated computer software products. The researcher uses a statutory and conceptual approach in this sociological, juridical research. The data collection techniques in this study used literature and field studies with descriptive-analytical methods. The practice of buying and selling computer software products is legal in Islam's view. However, suppose you practice buying and selling using illegal (pirated) computer software products. In that case, the sale and purchase are considered harmful, and the law is forbidden or prohibited in Islam.Ā The existence of free song download sites on electronic media has the potential to infringe on Copyright. I gave authors the exclusive right to use themselves and may prohibit other people without their permission from using their work primarily for commercial purposes. Free download sites that do not have permission and do not provide royalties to classify creators as copyright infringement based on the Copyright Law and ITE Law provisions. The method used in this research is legal research, which is included in empirical research. Based on the research results, the law enforcement process has not run optimally. Public legal awareness of Copyright, which is still low, and technological advances

    Threats to Copyrighted Code: Bots, Mods, and Reverse Engineering

    Get PDF
    Computer code is subject to copyright protection as a literary work, while video games have added protection as both a literary work and as an audiovisual work. Through the enactment of the Digital Millennium Copyright Act, the Computer Fraud and Abuse Act, and various case precedents, copyright law is beginning to accommodate 21st century concerns. However, the creation of technological advancements inevitably leads to threats against intellectual property and security. Computer software is constantly under attack from malicious software and techniques, including ā€œbots,ā€ ā€œmods,ā€ and reverse engineering. Therefore, the need for stronger copyright protection for code is crucial. Protection could be enhanced through more frequent litigation, amendments to copyright law, and more efficient construction of licensing agreements
    • ā€¦
    corecore