Abstract
We believe that the intellectual efforts of persons should be protected, but that the needs of society must be protected, too. Substantial interest in this issue, as it pertains to the protection of microcode, has prompted the preparation of this paper as a position statement to initiate discussion at the 18th International Microprogramming Workshop. We describe the relevant protection mechanisms and some of the nuances regarding them. We describe the important characteristics of microcode. Finally, we assume an advocacy position.
- 1 Anawalt, H. et al.,"Protection of Computer Ideawork - Today and Tomorrow" IEEE Software, April 1984, pp. 74-82.Google Scholar
- 2 Stern, Richard, "Microlaw", IEEE MICRO, April 1985, [email protected] 91.Google Scholar
- 3 Apple Computer, Inc. v. Franklin Computer Corp., 714 F.2d 1240 (3d Cir. 1983).Google Scholar
- 4 Wilkes, M. V., "The Best Way to Design an Automatic Calculating Machine," Manchester University Computer Inaugural Conf.,Ferranti, Ltd., London, 1951.Google Scholar
- 5 Myers, Glenford J., Advance8 In Computer Architecture,Wiley, 1978, p.5. Google Scholar
Digital Library
- 6 Patterson, David. "Microprogramming", Scientific American, March 1983.Google Scholar
- 7 MacPberson, Alan, et al. "Microcode: Patentable or Copyrightable?" in press.Google Scholar
Index Terms
Microcode and the protection of intellectual effort
Recommendations
Microcode and the protection of intellectual effort
MICRO 18: Proceedings of the 18th annual workshop on MicroprogrammingWe believe that the intellectual efforts of persons should be protected, but that the needs of society must be protected, too. Substantial interest in this issue, as it pertains to the protection of microcode, has prompted the preparation of this paper ...
Identity disclosure protection: A data reconstruction approach for privacy-preserving data mining
Identity disclosure is one of the most serious privacy concerns in today's information age. A well-known method for protecting identity disclosure is k-anonymity. A dataset provides k-anonymity protection if the information for each individual in the ...






Comments