Faculty of Computer Science

  • 5000

    Belgium

Research Output

Filter
Article

Copies illégales de logiciels installées par un travailleur sur le réseau de l'entreprise

Rosier, K., 2009, Bulletin social et juridique, 402, p. 6.

Research output: Contribution to specialist publicationArticle

Copyright in artificially-generated works

Cabay, J., De Vroey, M., Lens, S., L'Hôte, A-M., Michaux, B. & Mottet, A., 2019, In : Revue de droit intellectuel. L'Ingénieur-Conseil. 2, p. 220-231

Research output: Contribution to journalArticle

Open Access

Correspondance et vie privée sur les lieux de travail: une cohabitation difficile

Robert, R., 2008, In : Orientations. 7, p. 16-22 7 p.

Research output: Contribution to journalArticle

Open Access

Correspondance privée sauvegardée sur le serveur de l'entreprise: à quoi s'attendre ?

Rosier, K., 2016, Bulletin juridique et social, 567, p. 6.

Research output: Contribution to specialist publicationArticle

Open Access

Cost comparison of open approach, transoral laser microsurgery and transoral robotic surgery for partial and total laryngectomy

Dombrée, M., Crott, R., Lawson, G., Janne, P., Castiaux, A. & Krug, B., 2014, In : European Archives of Oto-Rhino-Laryngology. 271, 10, p. 2825-2834

Research output: Contribution to journalArticle

Could participation support sustainability in Requirements engineering?

Mahaux, M., 2013, In : CEUR Workshop Proceedings. 995

Research output: Contribution to journalArticle

Counterfactuals and updates as Inverse Modalities

Ryan, M. & Schobbens, P-Y., 1997, In : Journal of Logic, Language and Information. 6, 2, p. 123-146 24 p.

Research output: Contribution to journalArticle

Crafting networks to achieve, or not achieve, chaotic states

De Nigris, S. & Leoncini, X., 27 Apr 2015, In : Physical Review E - Statistical, Nonlinear, and Soft Matter Physics. 91, 4, 042809.

Research output: Contribution to journalArticle

Crear: Consejero para la Repetición de Artículos y Evaluadores en Eventos Académicos

Ortiz Vega, J. J., Diaz, J. F. & Aranda, J., 2004, In : Ingeniería Y Competitividad. 6, 1, p. 53-62 10 p.

Research output: Contribution to journalArticle

Open Access
File
16 Downloads (Pure)

Création d’un instrument d’évaluation de la professionnalité en formation initiale des enseignants

Dantinne, F., Dehon, A., Dejean, K., Derobertmasure, A., Leroy, C., Charlier, E., Beckers, J. & Demeuse, M., 2015, (Accepted/In press) In : Education et Formation. 302

Research output: Contribution to journalArticle

Criminalité informatique

Dumortier, F. & Forget, C., 2017, In : Revue du Droit des Technologies de l'information. 68-69, p. 199-218 20 p.

Research output: Contribution to journalArticle

Open Access

Criminalité informatique

Forget, C. & Dumortier, F., 2015, In : Revue du Droit des Technologies de l'information. 59-60, p. 114-126

Research output: Contribution to journalArticle

Open Access

Criminalité informatique

Omrani, F. & Dumortier, F., 2012, In : Revue du Droit des Technologies de l'information. 48-49, p. 198-208

Research output: Contribution to journalArticle

Open Access

Criminalité informatique

de Villenfagne, F., 2010, In : Revue du Droit des Technologies de l'information. 39, p. 9-28 20 p.

Research output: Contribution to journalArticle

Open Access

Criminalité informatique: le législateur passe aux actes

Dusollier, S., Lefebvre, A. & De La Vallée, F., 2001, In : Ubiquité. 9, p. 7-8 2 p.

Research output: Contribution to journalArticle

File
3 Downloads (Pure)

"Critique éthique de l'algorithme"

Rouvroy, A., Jan 2015, L'ADN, les séquences de l'innovation, 2, p. 146-147 2 p.

Research output: Contribution to specialist publicationArticle

Open Access

Cross-border gaming: the European regulatory perspective

Keuleers, E. & Verbiest, T., 2003, In : Gaming Law Review. 7, 3, p. 185-196 12 p.

Research output: Contribution to journalArticle

Open Access

Cryptez, cryptez, mais en restera-t-il toujours quelque chose?

Dinant, J-M., 2002, In : Actualités Juridiques Vie Privée, Transparence et Nouvelles Technologies. 4, p. 9-10 2 p.

Research output: Contribution to journalArticle

CSMR 2012 Special Issue: Guest Editorial

Mens, T. & Cleve, A., 2014, In : Journal of software: Evolution and Process. 26, 8, p. 729-729

Research output: Contribution to journalArticle

"Cyberconsommation" et droit international privé

Moiny, J-P. & DE GROOTE, B., 2009, In : Revue du Droit des Technologies de l'information. 37, p. 5-37 33 p.

Research output: Contribution to journalArticle

Open Access

Cycles de vie et carrières dans les métiers des TIC: une perspective de genre

Valenduc, G., 2011, In : tic&société. 5, 1

Research output: Contribution to journalArticle

Database application evolution: a transformational approach

Hick, J-M. & Hainaut, J-L., 2006, In : Data & Knowledge Engineering. 59, 3, p. 534-558 25 p.

Research output: Contribution to journalArticle

Database Reverse Engineering : from Requirements to CARE tools

Hainaut, J-L., Englebert, V., Henrard, J., Hick, J-M. & Roland, D., 1996, In : Journal of Automated Software Engineering. 3, 1, p. 9-45 37 p.

Research output: Contribution to journalArticle

Database Semantics Recovery through Analysis of Dynamic SQL Statements

Cleve, A., Meurisse, J-R. & Hainaut, J-L., 2011, In : Journal on Data Semantics. XV, p. 130-157 28 p.

Research output: Contribution to journalArticle

Data-Intensive System Evolution

Cleve, A., Mens, T. & Hainaut, J-L., 2010, In : IEEE Computer. 43, 8, p. 110-112 3 p.

Research output: Contribution to journalArticle

Data protection: multi-application smart cards : the use of global unique identifiers for cross-profiling purposes. Part 1

Dinant, J-M. & Keuleers, E., 2003, In : Computer Law and Security Report. 19, 6, p. 480-486 7 p.

Research output: Contribution to journalArticle

Open Access

Data protection and biobanks in 2018

Herveg, J., 2018, In : European Journal of Health Law. 25, 5, p. 479-500 22 p.

Research output: Contribution to journalArticle

Open Access

Data protection and multi-application smart cards - the use of intelligent servers to ensure interoperability and data flow requirements

Dinant, J-M. & Keuleers, E., 2005, In : Computer Law and Security Report. 21, 2, p. 146-152 7 p.

Research output: Contribution to journalArticle

Data protection and online networks

Louveaux, S. & de Terwangne, C., 1998, In : Multimédia und Recht. 9, p. 451-458 8 p.

Research output: Contribution to journalArticle

Open Access

Data protection and online networks

Louveaux, S. & de Terwangne, C., 1997, In : Computer Law and Security Report. 13, 4, p. 234-246 13 p.

Research output: Contribution to journalArticle

Data protection and privacy in global networks: a european approach. Meda Conference, Athens, 25 April 2001

Louveaux, S., Pérez Asinari, M. V. & Poullet, Y., 2001, In : The EDI Law Review. 8, 2-3, p. 147-196 50 p.

Research output: Contribution to journalArticle

Open Access

Data Protection - Belgium: an analysis of the new law

Dhont, J. & Poullet, Y., 2000, In : Computer Law and Security Report. 16, 1, p. 5-19 15 p.

Research output: Contribution to journalArticle

File
2 Downloads (Pure)

Data Protection in Europe and the Internet: an analysis of the European Community's Privacy Legislation in the Context of the World Wide Web

Dhont, J. & Bergkamp, L., 2000, In : The EDI Law Review. 7, 2-3, p. 71-114 44 p.

Research output: Contribution to journalArticle

Open Access

Data protection in health and telematics projects compliance with legal and ethical requirements

Louveaux, S. & Poullet, Y., 1996, In : Computer Law and Security Report. 12, 3, p. 169-176 8 p.

Research output: Contribution to journalArticle

Open Access

Data Protection in the Arab Spring: Tunisia and Morocco

Gayrel, C., 2012, In : Privacy laws & business international report. 115, p. 18-20 3 p.

Research output: Contribution to journalArticle

Open Access

Data protection legislation: what is at stake for our society and democracy ?

Poullet, Y., 2009, In : Computer Law and Security Review. 25, 3, p. 211-227 17 p.

Research output: Contribution to journalArticle

Open Access

Data sets about patients: legal and ethical issues

Warrant, F., DELIEGE, D., MEERT- VAN DE PUT, R. & Poullet, Y., 1990, In : C.H.I.C.. p. 3-40 38 p.

Research output: Contribution to journalArticle

Open Access

DB-MAIN: A Next Generation Meta-CASE

Englebert, V. & Hainaut, J-L., 1999, (Unpublished) In : Information Systems Journal. 24, 2, p. 99-112 14 p.

Research output: Contribution to journalArticle

DB-MAIN: un atelier d'ingénierie de bases de données

Englebert, V., Henrard, J., Hick, J-M., Roland, D. & Hainaut, J-L., 1996, In : Ingénierie des Systèmes d'Information. 4, 1

Research output: Contribution to journalArticle

De- and Re-Institutionalizing Technology Assessment in Contemporary Knowledge-Based Economies

Delvenne P., Rosskamp B., Van Oudheusden M., 2015, In : Technikfolgenabschätzung - Theorie und Praxis. 24, 1, p. 20-28

Research output: Contribution to journalArticle

Open Access

De Auteursrechtelijke bescherming van software: drie beslissingen van het HJEU die de zaak veranderen

Laurent, P., 2013, In : Abex News. 206, p. 20-24

Research output: Contribution to journalArticle

Open Access
Open Access

Défis de la sécurité de l'information -- Support à la gestion des risques de sécurité par les modèles

Mayer, N., Dubois, E., Heymans, P. & Matulevicius, R., 2008, In : Ingénierie des Systèmes d'Information. 13, 1

Research output: Contribution to journalArticle

De implementatie van de communicatie-richtlijnen in België: kwintet of kakofonie ?

Queck, R., Stevens, D. & Uyttendaele, C., 2003, In : Computerrecht. Tijdschrift voor informatica, telecommunicatie en recht. 1, p. 44-61 18 p.

Research output: Contribution to journalArticle

Open Access