6,723 research outputs found

    Copyright as a Rule of Evidence

    Get PDF
    Many copyright doctrines serve to exclude from the copyright regime cases particularly prone to evidentiary complexity. The implicit logic is that, for these cases, the social costs of litigation would likely outweigh the social benefits derived from offering copyright protection in the first place. Doctrines that serve this evidentiary function include some doctrines for which an evidentiary purpose is readily apparent (for example, the requirement that eligible works be fixed in tangible form), and some for which the link is quite subtle (for example, the rule against protecting work that lacks creativity). Understanding these doctrines in this light helps to refine their proper scope and application. It also makes clear a problem facing copyright law more generally: the increasing divergence between the logical justifications for various copyright doctrines and their actual use by courts and commentators

    On the Multidimensional Stable Marriage Problem

    Get PDF
    We provide a problem definition of the stable marriage problem for a general number of parties pp under a natural preference scheme in which each person has simple lists for the other parties. We extend the notion of stability in a natural way and present so called elemental and compound algorithms to generate matchings for a problem instance. We demonstrate the stability of matchings generated by both algorithms, as well as show that the former runs in O(pn2)O(pn^2) time.Comment: 8 page

    Easy 4G/LTE IMSI Catchers for Non-Programmers

    Full text link
    IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of mobile network operators. Recently, we verified that IMSI Catcher attacks are really practical for the state-of-the-art 4G/LTE mobile systems too. Our IMSI Catcher device acquires subscription identities (IMSIs) within an area or location within a few seconds of operation and then denies access of subscribers to the commercial network. Moreover, we demonstrate that these attack devices can be easily built and operated using readily available tools and equipment, and without any programming. We describe our experiments and procedures that are based on commercially available hardware and unmodified open source software

    Climate change, irrigation, and Israeli agriculture : will warming be harmful ?

    Get PDF
    The authors use a Ricardian model to test the relationship between annual net revenues and climate across Israeli farms. They find that it is important to include the amount of irrigation water available to each farm in order to measure the response of farms to climate. With irrigation water omitted, the model predicts that climate change is strictly beneficial. But with water included, the model predicts that only modest climate changes are beneficial, while drastic climate change in the long run will be harmful. Using the Atmospheric Oceanic Global Circulation Models scenarios, the authors show that farm net revenue is expected to increase by 16 percent in 2020, while in 2100 farm net revenue is expected to drop by 60-390 percent varying between the different scenarios. Although Israel has a relatively warm climate, a mild increase in temperature is beneficial due to the ability to supply international markets with farm products early in the season. The findings lead to the conclusion that securing water rights to the farmers and international trade agreements can be important policy measures to help farmers adapt to climate change.Climate Change,Water Supply and Sanitation Governance and Institutions,Water Supply and Systems,Water and Industry,Common Property Resource Development

    Common Circle for Human Rights, Vol.1, No.5 (June 1997)

    Get PDF
    https://digitalcommons.usm.maine.edu/common_circle/1003/thumbnail.jp
    • …
    corecore