Cryptography protected under US constitution
β Scribed by Wayne Madsen
- Publisher
- Elsevier Science
- Year
- 1998
- Tongue
- English
- Weight
- 252 KB
- Volume
- 1998
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Under US law, there are three forms of intellectual property protection that are potentially available for the technical content of computer software 1 -patent, copyright and trade secret. In general, patent protection is available for an invention implemented wholly or partially in software to the
In this paper, we propose a numerical simulation of axisymmetric extensional experiments on a viscoelastic polydimethylsiloxane (PDMS) material, using a fallingweight extensional rheometer. The polymer behaviour is represented by a K-BKZ memory-integral constitutive equation, involving a damping fun
## Abstract Methods of installing photolabile protecting groups for carbonyl compounds under neutral conditions without using any other chemical reagents are described. (Β© WileyβVCH Verlag GmbH & Co. KGaA, 69451 Weinheim, Germany, 2009)