Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("ingénierie inverse")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 46

  • Page / 2

Export

Selection :

  • and

Protection du logiciel: la directive européenneROS DE LOCHOUNOFF, N; MARCELLIN-TAUPENAS, S.Expertises. 1991, Num 141, pp 264-267Article

The Circuit Layouts Act 1989GAZE, B.Special issue. Australia and New Zealand. Computer Law and Practice. 1991, Vol 7, Num 3, pp 98-100Book Chapter

Analyse de la directive du 14 mai 1991 concernant la protection juridique des programmes d'ordinateurLE STANC.Cahiers Lamy du Droit de l'Informatique. 1991, Num 31, pp 3-9Article

La Directive du Conseil des Communautés européennes du 14 mai 1991 concernant la protection juridique des programmes d'ordinateurDREIER, T.La Semaine Juridique. 1991, Num 47, pp 351-357Article

Reverse engineering computer software. Australia parts company with the worldHUNTER, D.Tolley's computer law and practice. 1993, Vol 9, Num 4, pp 122-127, issn 1359-5989Article

Protection des logiciels: conséquences et critiques du projet français de transposition de la DirectiveROS DE LOCHOUNOFF, N; RUBAULT, J. G.Cahiers Lamy du Droit de l'Informatique. 1992, Num 41, pp 15-28Article

Atari v. Nintendo: Super Mario Uses «Expressive» Security Feature to «Lock» out the CompetitionMOORE, H. C.Rutgers Computer and Technology Law Journal. 1992, Vol 18, Num 2, pp 919-940Article

Technical issues in software copyright from a New Zealand viewpointMOON, K. R.Special issue. Australia and New Zealand. Computer Law and Practice. 1991, Vol 7, Num 3, pp 156-161Book Chapter

The implementation of the EC Software Copyright Directive in the Dutch Copyright ActMEIJBOOM, A. P.Computer Law and Practice. 1992, Vol 8, Num 1, pp 22-28Article

L'adaptation du droit au progrès technologique: l'exemple de la protection des logicielsDE LAMBERTERIE, I.Archives de Philosophie du Droit. 1991, Num 36, pp 156-163Article

The legality of disassembly of computer programs = La légalité de la décompilation de programmes informatiquesHAYES, D. L.Computer/law journal. 1993, Vol 12, Num 1, pp 1-15, issn 0164-8756Article

Intégration de vues et systèmes à objets persistants = View integration and persistent object systemsViallet, Fabienne; Gardarin, Georges.1991, 178 p.Thesis

Les incidences immédiates de la directive européenneROZENFELD, S.Expertises. 1991, Num 144, pp 373-376Article

Reverse engineering in AustraliaComputer Law and Practice. 1992, Vol 8, Num 2, pp 46-49Article

Commercial implications of the European Software DirectivePEARSON, H; MILLER, C; TURTLE, N et al.Computer Law and Practice. 1992, Vol 8, Num 1, pp 2-9Article

EC Antitrust Law and the Exploitation of Intellectual Property Rights in SoftwareREED, C.Jurimetrics. 1992, Vol 32, Num 3, pp 431-443Article

Licences de logiciels: application des règles de concurrence de la CEEPOWELL, M.Spécial Europe. Expertises. 1992, Num 145, pp 412-423Book Chapter

Softwareschutz durch Geheimnischutz = Protection du logiciel par la protection du secretTAEGER, J.Computer und Recht. 1991, Num 8, pp 449-457Article

Directive, l'harmonisation en découlant pourrait être paradoxale: «rectification avec bon sens du passé, nouveautés douteuses pour l'avenir»ROS DE LOCHOUNOFF, N; MARCELLIN-TAUPENAS, S.Cahiers Lamy du Droit de l'Informatique. 1991, Num 29, pp 7-11Article

Etats-Unis: petit guide des droits sur les logiciels, décisions récentes de tribunaux américainsBIERCE, W. B.Expertises. 1992, Num 153, pp 299-307Article

Automated support for Legacy code understanding : Reverse engineeringNING, J. Q; ENGBERTS, A; KOZACZYNSKI, W. V et al.Communications of the ACM. 1994, Vol 37, Num 5, pp 50-57, issn 0001-0782Article

Using an enabling technology to reengineer Legacy systems : Reverse engineeringMARKOSIAN, L; NEWCOMB, P; BRAND, R et al.Communications of the ACM. 1994, Vol 37, Num 5, pp 58-70, issn 0001-0782Article

Ein Ansatz für das Reverse Engineering relationaler Datenbanken = An approach for reverse engineering relational databasesSAUTER, C.Wirtschaftsinformatik. 1995, Vol 37, Num 3, pp 242-250, issn 0937-6429Article

A memory-based approach to recognizing programming plans : Reverse engineeringQUILICI, A.Communications of the ACM. 1994, Vol 37, Num 5, pp 84-93, issn 0001-0782Article

Adaptive object-oriented programming using graph-based customizationLIEBERHERR, K. J; SILVA-LEPE, I; CUN XIAO et al.Communications of the ACM. 1994, Vol 37, Num 5, pp 94-101, issn 0001-0782Article

  • Page / 2