next up previous
Next: About this document ... Up: The Software Invention Cube: Previous: Acknowledgments

Bibliography

1
Association for Computing Machinery (ACM).
http://www.acm.org.

2
R. Bakels.
Private communication, 2005 2005.

3
K. Beck.
Extreme Programming Explained: Embrace Change.
Addison-Wesley, 1999.

4
J.A. Bergstra and P. Klint.
About "trivial" software patents: the isnot case.
http://www.cwi.nl/~paulk/patents/isnot.pdf, 2005.

5
The American Heritage Dictionary of the English Language, 2000.

6
Institute of Electrical and Electronics Engineers (IEEE).
http://www.ieee.org.

7
R. Plotkin.
From idea to action: toward a unified theory of software and the law.
International Review of Law, Computers & Technology, 17(3), November 2003.

8
Reference.com.
http://Reference.com.

9
R. Rivest, A. Shamir, and L. Adleman.
A method for obtaining digital signatures and public-key cryptosystems.
Communications of the ACM, 21(2):120-126, 1978.

10
Software engineering body of knowledge (SWEBOK).
http://www.swebok.org, 2004.

11
Princeton University.
Wordnet 2.0.
http://wordnet.princeton.edu, 2003.

12
E.A. van Nieuwenhoven Helbach, J.L.R.A. Huydecoper, and C.J.J.C. van Nispen, editors.
Industriële Eigendom, volume Bescherming van technische innovatie.
Kluwer, 2002.
In Dutch.

13
H. van Vliet.
Software Engineering: Principles and Practice.
Wiley, second edition, 2000.

14
Merriam-webster's dictionary of law.
Merriam-Webster, Inc., 1996.

15
Webster online.
http://websteronline.com, 2005.



Paul Klint 2006-06-02