The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Irah H. Donner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Irah H. Donner
    Intellectual Property Protection: Everything You've Always Wanted to Know. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1994, v:27, n:10, pp:74-75 [Journal]
  2. Irah H. Donner
    Robo-Mop Gets Wrung Out. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1994, v:27, n:11, pp:91-92 [Journal]
  3. Irah H. Donner
    Is the Patent Office Correctly Examining Computer-related Patent Applications? Part 1. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1994, v:27, n:12, pp:78-79 [Journal]
  4. Irah H. Donner
    Be Careful about Disclosing your Invention. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:5, pp:83- [Journal]
  5. Irah H. Donner
    Photocopyright Infringement. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:9, pp:67-68 [Journal]
  6. Irah H. Donner
    Is the Patent Office Correctly Examining Computer-Related Patent Applications? Part 2. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:1, pp:93-94 [Journal]
  7. Irah H. Donner
    Computer-Related Inventions: When "Obvious" is Not So Obvious. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:2, pp:78-79 [Journal]
  8. Irah H. Donner
    GATT is Gonna Get Ya! [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:3, pp:98-99 [Journal]
  9. Irah H. Donner
    Billing Taxes Novell with Novel Patent-Infringement Claim. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:4, pp:72-73 [Journal]
  10. Irah H. Donner
    Patent or Perish. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:6, pp:84-85 [Journal]
  11. Irah H. Donner
    Intellectual Property Protection for Multimedia Applications, Part 1: So Many Flavors, So Little Time. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:7, pp:92-93 [Journal]
  12. Irah H. Donner
    Intellectual Property Protection for Multimedia Applications, Part 2: Putting the Pieces Together. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:8, pp:99-100 [Journal]
  13. Irah H. Donner
    Ground Rules for Software Maintenance. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:10, pp:84-85 [Journal]
  14. Irah H. Donner
    Exchanging Software over the Internet Could be Hazardous. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:11, pp:86-87 [Journal]
  15. Irah H. Donner
    The Info Age Law Firm. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:12, pp:86-87 [Journal]
  16. Irah H. Donner
    For Whom The Bomb Tolls. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:2, pp:94- [Journal]
  17. Irah H. Donner
    Don't Judge a Software Licence by Its Cover. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:10, pp:114-115 [Journal]
  18. Steven G. Tepper, Irah H. Donner
    IPOs, Part I: Preparation is the Key. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1996, v:29, n:5, pp:108-110 [Journal]

Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002