953,676 research outputs found

    Hail to the thief: a tribute to Kazaa

    Get PDF
    THIS PAPER CONSIDERS THE ONGOING LITIGATION against the peer-to-peer network KaZaA. Record companies and Hollywood studios have faced jurisdictional and legal problems in suing this network for copyright infringement. As Wired Magazine observes: “The servers are in Denmark. The software is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the South Pacific. The users—60 million of them—are everywhere around the world.” In frustration, copyright owners have launched copyright actions against intermediaries—like against Internet Service Providers such as Verizon. They have also embarked on filing suits against individual users of file-sharing programs. In addition, copyright owners have called for domestic- and international-law reform with respect to digital copyright. The Senate Committee on Government Affairs of the United States Congress has reviewed the controversial use of subpoenas in suits against users of file-sharing peer-to-peer networks. The United States has encouraged other countries to adopt provisions of the Digital Millennium Copyright Act 1998 in bilateral and regional free-trade agreements

    Advanced PON topologies with wireless connectivity

    Get PDF
    “This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”The interoperability of wireless and PON networking solutions is investigated to reduce deployment expenditure by means of centralised network management while providing ubiquitous access connections and mobility. Network modelling in the physical layer of WiMAX channel transmission based on FDM over legacy PONs has demonstrated EVMs below -30 dB and error-free multipath transmission. In addition, the development of a dynamic MAC protocol suite has been presented to assign bandwidth between the OLT and ONU BaseStations over a multi-wavelength, splitter-PON topology to demonstrate converged network scalability. This has been achieved by managing data-centric traffic with quality of service in view of diverse multi-user access technologies

    Remote booting in a hostile world: to whom am I speaking? [Computer security]

    Get PDF
    “This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”Today's networked computer systems are very vulnerable to attack: terminal software, like that used by the X Window System, is frequently passed across a network, and a trojan horse can easily be inserted while it is in transit. Many other software products, including operating systems, load parts of themselves from a server across a network. Although users may be confident that their workstation is physically secure, some part of the network to which they are attached almost certainly is not secure. Most proposals that recommend cryptographic means to protect remotely loaded software also eliminate the advantages of remote loading-for example, ease of reconfiguration, upgrade distribution, and maintenance. For this reason, they have largely been abandoned before finding their way into commercial products. The article shows that, contrary to intuition, it is no more difficult to protect a workstation that loads its software across an insecure network than to protect a stand-alone workstation. In contrast to prevailing practice, the authors make essential use of a collision-rich hash function to ensure that an exhaustive off-line search by the opponent will produce not one, but many candidate pass words. This strategy forces the opponent into an open, on-line guessing attack and offers the user a defensive strategy unavailable in the case of an off-line attack.Peer reviewe

    Full-Service MAC Protocol for Metro-Reach GPONs

    Get PDF
    “This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder." “Copyright IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.”An advanced medium access control protocol is presented demonstrating dynamic bandwidth allocation for long-reach gigabit-capable passive optical networks (GPONs). The protocol enables the optical line terminal to overlap the idle time slots in each packet transmission cycle with a virtual polling cycle to increase the effective transmission bandwidth. Contrasting the new scheme with developed algorithms, network modeling has exhibited significant improvement in channel throughput, mean packet delay, and packet loss rate in the presence of class-of-service and service-level differentiation. In particular, the displayed 34% increase in the overall channel throughput and 30 times reduction in mean packet delay for service-level 1 and service-level 2 optical network units (ONUs) at accustomed 50% ONU load constitutes the highest extended-reach GPON performance reported up to date.Peer reviewe

    Introduction: Legal Form and Cultural Symbol – Music, Copyright and Information Studies

    Get PDF
    Writers in information and communication studies often assume the stability of objects under investigation: network nodes, databases, information. Legal writers in the intellectual property tradition often assume that cultural artefacts exist as objects prior to being governed by copyright law. Both assumptions are fallacious. This introduction conceptualises the relationship of legal form and cultural symbol. Starting from an understanding of copyright law as part of systems of production (in the sense of Peterson 1976), it is argued that copyright law constructs the artefacts it seeks to regulate as objects that can be bought and sold. In doing so, the legal and aesthetic logic of cultural symbols may clash, as in the case of digital music (the central focus of this special issue)

    A new adaptive neural network and heuristics hybrid approach for job-shop scheduling

    Get PDF
    Copyright @ 2001 Elsevier Science LtdA new adaptive neural network and heuristics hybrid approach for job-shop scheduling is presented. The neural network has the property of adapting its connection weights and biases of neural units while solving the feasible solution. Two heuristics are presented, which can be combined with the neural network. One heuristic is used to accelerate the solving process of the neural network and guarantee its convergence, the other heuristic is used to obtain non-delay schedules from the feasible solutions gained by the neural network. Computer simulations have shown that the proposed hybrid approach is of high speed and efficiency. The strategy for solving practical job-shop scheduling problems is provided.This work is supported by the National Nature Science Foundation (No. 69684005) and National High -Tech Program of P. R. China (No. 863-511-9609-003)

    What\u27s in a Name: Cable Systems, FilmOn, and Judicial Consideration of the Applicability of the Copyright Act\u27s Compulsory License to Online Broadcasters of Cable Content

    Get PDF
    The way we consume media today is vastly different from the way media was consumed in 1976, when the Copyright Act created the compulsory license for cable systems. The compulsory license allowed cable systems, as defined by the Copyright Act, to pay a set fee for the right to air television programming rather than working out individual deals with each group that owned the copyright in the programming, and helped make television more widely accessible to the viewing public. FilmOn, a company that uses a mini-antenna system to capture and retransmit broadcast network signals, is now seeking access to the compulsory license. In three concurrent legal cases in New York, California, and D.C., FilmOn argues that it meets the statutory requirements to classify as a cable system. This Issue Brief examines the legal history of cable systems and considers the effects of agency influence, policy concerns, and the lack of judicial or congressional resolution regarding FilmOn’s contested legal status

    Vertically Related Markets of Collective Licensing of Differentiated Copyrights with Indirect Network Effects

    Get PDF
    This paper presents a theory of vertically interrelated markets of identical fixed size under implementation of positive indirect network effects. By introducing two Salop circles, a two-sided market model is provided, where intermediaries of differentiated copyrights for intellectual property, like performing rights organizations or publishers, compete as oligopsonists for owners of the intellectual property and as oligopolists for the users of their blanket licenses. We demonstrate, that an increase in competition benefits either license users or copyright owners or harms both groups. Moreover, if license users gain from an increased market entry, the owners of the intellectual property have to incur losses and vice versa.Vertical restraints, Indirect network effects, Copyright enforcement, Performing rights organizations, Music industry

    What\u27s in a Name: Cable Systems, FilmOn, and Judicial Consideration of the Applicability of the Copyright Act\u27s Compulsory License to Online Broadcasters of Cable Content

    Get PDF
    The way we consume media today is vastly different from the way media was consumed in 1976, when the Copyright Act created the compulsory license for cable systems. The compulsory license allowed cable systems, as defined by the Copyright Act, to pay a set fee for the right to air television programming rather than working out individual deals with each group that owned the copyright in the programming, and helped make television more widely accessible to the viewing public. FilmOn, a company that uses a mini-antenna system to capture and retransmit broadcast network signals, is now seeking access to the compulsory license. In three concurrent legal cases in New York, California, and D.C., FilmOn argues that it meets the statutory requirements to classify as a cable system. This Issue Brief examines the legal history of cable systems and considers the effects of agency influence, policy concerns, and the lack of judicial or congressional resolution regarding FilmOn’s contested legal status
    • 

    corecore