1,111 research outputs found

    Ip in decisions of constitutional courts of latin american countries

    Get PDF
    FAPITEC/SE Brasi

    Proteção das marcas: uma perspectiva semiológica

    Get PDF
    Divulgação dos SUMÁRIOS das obras recentemente incorporadas ao acervo da Biblioteca Ministro Oscar Saraiva do STJ. Em respeito à Lei de Direitos Autorais, não disponibilizamos a obra na íntegra.Localização na estante: 347.77(81) B238

    Direitos autorais e TRIPs

    Get PDF
    Direitos Autorais e TRIPs. O que TRIPs efetivamente fez. O debate sobre Direitos Autorais. A divisão moral. A dicotomia da ideia-expressão. A questão da funcionalidade. Prazos maiores. Bases de dados. As exceções e limites. O direito de aluguel. Proteção de cantores, produtores de fonogramas e organizações de difusão. Aplicação dos direitos

    Identificação de oportunidades de melhorias em prazo através da análise de perdas em processos e operações na supraestrutura de concreto armado

    Get PDF
    A competitividade no setor da construção civil estimula a procura pela redução de custos, junto a isso, a procura por novas filosofias de produção para apoiar seu processo construtivo. Um dos principais sistemas construtivos de um edifício é a supraestrutura de concreto armado, composto por processos manuais, interdependentes e com o uso intensivo de mão de obra pouco qualificada. Essa atividade é conhecida pelo excesso de atividades que não agregam valor, como transportes, esperas e inspeções. Neste sentido, o objetivo do estudo foi identificar oportunidades de melhorias em relação ao prazo do processo de produção da supraestrutura de concreto armado em uma obra em Porto Alegre/RS. A estratégia de pesquisa utilizada foi de estudo de caso, sendo realizada coleta de dados referentes a um lote de um pavimento do serviço de supraestrutura em concreto armado. Como resultado do estudo foi constatado um ganho de prazo de sete semanas e a identificação de atividades que não agregam valor entre vinte e seis e trinta e sete porcento ao longo do processo de cada elemento da estrutura. Entre as contribuições dessa pesquisa, destaca-se a sugestão de criação da padronização do processo estudado, implementação do fluxo contínuo, utilização do mapa de fluxo de valor para uma análise das atividades presentes e o dimensionamento do ciclo através da linha de balanço (LB), permitindo uma análise global e a longo prazo dos serviços.The competitiveness in the construction industry encourages the search for cost reductions, as well as the search for new production philosophies to support the construction process. One of the main construction systems of a building is the reinforced concrete supra-structure, which is made of interdependent handmade processes and intensive unskilled labor. This activity is known for the excess of unproductive time, such as transport, waiting and inspections. Therefore, the purpose of this study was to identify opportunities for improvement in the timeframe of the reinforced concrete supra-structure process of production in a construction in Porto Alegre/RS. The analysis of an existing case was the strategy adopted in this study; data was collected from a portion of a floor of the reinforced concrete supra-structure. The results showed a deadline gain of seven weeks and the identification of the activities that do not add value between twenty-six and thirty-seven percent during the process of every element in the structure. The main contributions of this study are the suggestion of creating a standard process, the implementation of a continuous flow using a value stream mapping for the activities analysis and the cycle sizing using the line of balance, allowing a global and long-term analysis of the services

    Slouching Towards Development in International Intellectual Property

    Get PDF
    An understanding of intellectual property\u27s classic innovation mandate as only one of many cross-cutting development goals should be well-accepted by now within international intellectual property law and policy, given the pervasiveness of development rhetoric at the WTO, WIPO and other regional and bilateral fora. Yet development walk lags behind development talk on both international and domestic levels. This article focuses on how intellectual property can promote development, not only through innovation, but also by the promotion of broad-based human development implicitly underpinning global knowledge economies. First, we consider the rapidly evolving relationship of development and trade to intellectual property, and conclude that current approaches to all three of these areas emphasize balanced rules, which means assessments of costs and benefits, preservation of flexibility, and transparency of development impact. To increase this pro-development balance within the current international intellectual property regime, each of us offers a specific proposal. Barbosa proposes three principles of treaty interpretation to maximize the potential of TRIPS articles 7 and 8 as balancing mechanisms within WTO jurisprudence. These include the principles of integration, evolutive interpretation and vectorial interpretation all of which are consistent with a teleological approach to TRIPS as an instrument of development. Chon posits development as a key legal term of art throughout the international intellectual property regime via a substantive equality principle; this principle is applied here to the current Development Agenda within WIPO, to link intellectual property and innovation to human development priorities such as education. Finally, Moncayo von Hase advocates for the recognition of emerging rules of customary international law, such as the emerging human right to health, in the context of interpreting related intellectual property obligations; in addition, he argues in favor of maximizing international law principles of non-derogation and freedom of implementation, to maintain national policy space and flexibility for social welfare objectives in the context of post-TRIPS bilateral and regional treaties. By its very structure, this article attempts to demonstrate the thesis that a pro-development balancing walk must occur simultaneously within and among all aspects of the international intellectual property regime, the complexity of which is manifest in multiple fora and jurisdictions, globally and domestically

    Slouching Towards Development in International Intellectual Property

    Get PDF
    An understanding of intellectual property\u27s classic innovation mandate as only one of many cross-cutting development goals should be well-accepted by now within international intellectual property law and policy, given the pervasiveness of development rhetoric at the WTO, WIPO and other regional and bilateral fora. Yet development walk lags behind development talk on both international and domestic levels. This article focuses on how intellectual property can promote development, not only through innovation, but also by the promotion of broad-based human development implicitly underpinning global knowledge economies. First, we consider the rapidly evolving relationship of development and trade to intellectual property, and conclude that current approaches to all three of these areas emphasize balanced rules, which means assessments of costs and benefits, preservation of flexibility, and transparency of development impact. To increase this pro-development balance within the current international intellectual property regime, each of us offers a specific proposal. Barbosa proposes three principles of treaty interpretation to maximize the potential of TRIPS articles 7 and 8 as balancing mechanisms within WTO jurisprudence. These include the principles of integration, evolutive interpretation and vectorial interpretation all of which are consistent with a teleological approach to TRIPS as an instrument of development. Chon posits development as a key legal term of art throughout the international intellectual property regime via a substantive equality principle; this principle is applied here to the current Development Agenda within WIPO, to link intellectual property and innovation to human development priorities such as education. Finally, Moncayo von Hase advocates for the recognition of emerging rules of customary international law, such as the emerging human right to health, in the context of interpreting related intellectual property obligations; in addition, he argues in favor of maximizing international law principles of non-derogation and freedom of implementation, to maintain national policy space and flexibility for social welfare objectives in the context of post-TRIPS bilateral and regional treaties. By its very structure, this article attempts to demonstrate the thesis that a pro-development balancing walk must occur simultaneously within and among all aspects of the international intellectual property regime, the complexity of which is manifest in multiple fora and jurisdictions, globally and domestically

    Filtragem adaptativa para a estimação da freqüência em sistemas elétricos de potência

    Get PDF
    Esta pesquisa apresenta um método para a estimação da freqüência em sistemas elétricos de potência utilizando filtros adaptativos baseados no método dos mínimos quadrados (MMQ). A análise do sistema de potência é realizada através da conversão das tensões trifásicas em um sinal complexo pela aplicação da transformada α β, sendo este direcionado ao algoritmo de filtragem adaptativa. As simulações computacionais, assim como a modelagem dos equipamentos, foram realizadas utilizando-se do software ATP (Alternative Transients Program). Este teve por objetivo, gerar dados das mais diversas e distintas situações para a verificação e análise da metodologia proposta, em comparação a resultados obtidos de um determinado relé comercial, habilitado à supervisão da freqüência do sistema.This research presents a method for frequency estimation in power system using adaptive filter based on the Least Mean Square algorithm (LMS). In power system analysis, the three-phase voltages are converted to a complex signal with the application of α β-transform whose complex form was submitted to the algorithm of adaptive filtering. The computational simulations were accomplished using the software ATP. This utilization had as objective to generate data for the most severe and different situations for the verification and analysis of the proposed methodology. The results were to those of a commercial relay for validation, showing the advantages of the new method.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP

    Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations

    Get PDF
    We present a computer-aided framework for proving concrete security bounds for cryptographic machine code implementations. The front-end of the framework is an interactive verification tool that extends the EasyCrypt framework to reason about relational properties of C-like programs extended with idealised probabilistic operations in the style of code-based security proofs. The framework also incorporates an extension of the CompCert certified compiler to support trusted libraries providing complex arithmetic calculations or instantiating idealized components such as sampling operations. This certified compiler allows us to carry to executable code the security guarantees established at the high-level, and is also instrumented to detect when compilation may interfere with side-channel countermeasures deployed in source code. We demonstrate the applicability of the framework by applying it to the RSA-OAEP encryption scheme, as standard- ized in PKCS#1 v2.1. The outcome is a rigorous analysis of the advantage of an adversary to break the security of as- sembly implementations of the algorithms specified by the standard. The example also provides two contributions of independent interest: it bridges the gap between computer-assisted security proofs and real-world cryptographic implementations as described by standards such as PKCS,and demonstrates the use of the CompCert certified compiler in the context of cryptographic software development.ONR -Office of Naval Research(N000141210914

    Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC

    Get PDF
    We provide further evidence that implementing software countermeasures against timing attacks is a non-trivial task and requires domain-specific software development processes: we report an implementation bug in the s2n library, recently released by AWS Labs. This bug ( now fixed) allowed bypassing the balancing countermeasures against timing attacks deployed in the implementation of the MAC-then-Encode-then-CBC-Encrypt (MEE-CBC) component, creating a timing side-channel similar to that exploited by Lucky 13.Although such an attack could only be launched when the MEE-CBC component is used in isolation - Albrecht and Paterson recently confirmed in independent work that s2n's second line of defence, once reinforced, provides adequate mitigation against current adversary capabilities - its existence serves as further evidence to the fact that conventional software validation processes are not effective in the study and validation of security properties. To solve this problem, we define a methodology for proving security of implementations in the presence of timing attackers: first, prove black-box security of an algorithmic description of a cryptographic construction; then, establish functional correctness of an implementation with respect to the algorithmic description; and finally, prove that the implementation is leakage secure.We present a proof-of-concept application of our methodology to MEE-CBC, bringing together three different formal verification tools to produce an assembly implementation of this construction that is verifiably secure against adversaries with access to some timing leakage. Our methodology subsumes previous work connecting provable security and side-channel analysis at the implementation level, and supports the verification of a much larger case study. Our case study itself provides the first provable security validation of complex timing countermeasures deployed, for example, in OpenSSL.The first two authors were funded by Project "TEC4Growth - Pervasive Intelligence, Enhancers and Proofs of Concept with Industrial Impact/ NORTE-01-0145-FEDER-000020", which is financed by the North Portugal Regional Operational Programme (NORTE 2020), under the PORTUGAL 2020 Partnership Agreement, and through the European Regional Development Fund (ERDF). The third and fourth authors were supported by projects S2013/ICE-2731 N-GREENS Software-CM and ONR Grants N000141210914 (AutoCrypt) and N00014151 2750 (SynCrypt). The fourth author was supported by FP7 Marie Cure Actions-COFUND 291803 (Amarout II). The machine-checked proof for CBC improves on a script by Benjamin Gregoire and Benedikt Schmidt. Pierre-Yves Strub provided support for extracting Why3 definitions from EasyCrypt specifications. We thank Mathias Pedersen and Bas Spitters for useful comments.info:eu-repo/semantics/publishedVersio
    corecore