| 1. | Knowledge of controlling cost , delivery , quality of project , and protecting intelligence property of company 7具产品成本、交货期和质量控制以及企业知识产权保护意识。 |
| 2. | With aware of cost controlling , delivery , quality of project , and protecting intelligence property of company 6有一定的产品成本、交货期和质量控制以及企业知识产权保护意识。 |
| 3. | Digital watermark evolved in recent years is a new means to protect ipr ( intelligence properties right ) in the field of information security 数字水印是近年来在信息安全领域兴起的保护知识产权的新方法。 |
| 4. | Moreover , build such a system with intelligence property right of our own country is valuable both in theory and practice 而设计和开发拥有我国自主知识产权的ip网络管理系统有着重要的理论意义和实用价值。 |
| 5. | It also runs a variety of professional training classes concerning science and technology management , operation management , intelligence property right , accounting and so on 开展科技管理、经营管理、工商管理、知识产权、会计等项目的培训。 |
| 6. | This paper points out that the nature of domain name is a kind of intelligence property . domain name and brand have many similarities and substantial differences 本文的重点部分是域名权与商标权的法律关系,指出域名权的性质是一种知识产权,域名与商标虽有很多相似之处,但也有着本质区别。 |
| 7. | Abstract : in respect of the rapid development of the central business district in shanghai , it has become increasingly important to develop the intelligence property and protect the intelligence property in the cbd 摘要:上海中心商业区快速发展,日益显现出与其特点相联的知识产权发展,中心商业区知识产权保护日益重要,必须进一步加强。 |
| 8. | The core chip of system , which implies the standard directly , has the most greatest technology value . it is very important to design and produce core chips provided with independent intelligence property both for marketing and financial reasons 系统的核心芯片直接体现了标准的含义,具有最高的科技含量,无论从市场角度的保护还是从产业经济利益的保护来看,能够配套设计和生产具有自主知识产权的核心芯片非常重要。 |
| 9. | This paper elaborates digital information transmission , digital information navigation , as well as intelligence property protection of database development so as to inspire the analysis of " library cooperation and information resources sharing in wuhan declaration " 本文从数字信息传播、数字信息导航以及数据库开发等方面所涉及的知识产权保护问题作了深入探究,以期对《图书馆合作与信息资源共享武汉宣言》解析有所启示。 |
| 10. | To avoid malicious attacks , the system provided are required to have id verification function and to prevent reproduction and protect intelligence property rights . a digital signature is required before the use of a service . the system should be able to track the invader and set up a blacklist 要求提供的系统具有身份认证功能,以防恶意攻击;享受服务要通过数字签名,以防复制,保护知识产权;系统要能对侵入者进行追踪,以便确定黑名单。 |