Next: About this document ...
Up: The Software Invention Cube:
Previous: Acknowledgments
- 1
-
Association for Computing Machinery (ACM).
http://www.acm.org.
- 2
-
R. Bakels.
Private communication, 2005 2005.
- 3
-
K. Beck.
Extreme Programming Explained: Embrace Change.
Addison-Wesley, 1999.
- 4
-
J.A. Bergstra and P. Klint.
About "trivial" software patents: the isnot case.
http://www.cwi.nl/~paulk/patents/isnot.pdf, 2005.
- 5
-
The American Heritage Dictionary of the English Language, 2000.
- 6
-
Institute of Electrical and Electronics Engineers (IEEE).
http://www.ieee.org.
- 7
-
R. Plotkin.
From idea to action: toward a unified theory of software and the law.
International Review of Law, Computers & Technology, 17(3),
November 2003.
- 8
-
Reference.com.
http://Reference.com.
- 9
-
R. Rivest, A. Shamir, and L. Adleman.
A method for obtaining digital signatures and public-key
cryptosystems.
Communications of the ACM, 21(2):120-126, 1978.
- 10
-
Software engineering body of knowledge (SWEBOK).
http://www.swebok.org, 2004.
- 11
-
Princeton University.
Wordnet 2.0.
http://wordnet.princeton.edu, 2003.
- 12
-
E.A. van Nieuwenhoven Helbach, J.L.R.A. Huydecoper, and C.J.J.C. van Nispen,
editors.
Industriële Eigendom, volume Bescherming van technische
innovatie.
Kluwer, 2002.
In Dutch.
- 13
-
H. van Vliet.
Software Engineering: Principles and Practice.
Wiley, second edition, 2000.
- 14
-
Merriam-webster's dictionary of law.
Merriam-Webster, Inc., 1996.
- 15
-
Webster online.
http://websteronline.com, 2005.
Paul Klint
2006-06-02