-
5
-
-
85027130496
-
-
Sept.
-
T. Ueno, "The protest page to pocketmascot," Sept. 2001. http://members.jcom.home.ne.jp/tomohiro-ueno/About_PocketMascot/ About_PocketMascot_e.html
-
(2001)
The Protest Page to Pocketmascot
-
-
Ueno, T.1
-
6
-
-
0003518498
-
-
Addison-Wesley, June
-
B. Joy, G. Steele, J. Gosling, and G. Bracha, The Java Language Specification Second Edition, Addison-Wesley, June 2000.
-
(2000)
The Java Language Specification Second Edition
-
-
Joy, B.1
Steele, G.2
Gosling, J.3
Bracha, G.4
-
15
-
-
84861262258
-
-
"Zelix klass master," 1997. http://www.zelix.com/klassmaster/ index.html
-
(1997)
Zelix Klass Master
-
-
-
16
-
-
68049110535
-
-
"Apache Ant," http://ant.apache.org/
-
Apache Ant
-
-
-
19
-
-
85027166306
-
-
"jikes," http://www-124.ibm.com/developerworks/oss/jikes/
-
Jikes
-
-
-
21
-
-
26444481301
-
Design and evaluation of birthmarks for detecting theft of Java programs
-
Innsbruck, Austria, Feb.
-
H. Tamada, M. Nakamura, A. Monden, and K. Matsumoto, "Design and evaluation of birthmarks for detecting theft of Java programs," Proc. IASTED International Conference on Software Engineering (IASTED SE 2004), pp.569-575, Innsbruck, Austria, Feb. 2004.
-
(2004)
Proc. IASTED International Conference on Software Engineering (IASTED SE 2004)
, pp. 569-575
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.4
-
22
-
-
84861264782
-
-
"Method and system for generating and auditing a signature for a computer program," US Patent 5,559,884, Sept. Filed: June 30
-
R.L. Davidson and N. Myhrvold, "Method and system for generating and auditing a signature for a computer program," US Patent 5,559,884, Sept. 1996. Filed: June 30, 1994.
-
(1994)
-
-
Davidson, R.L.1
Myhrvold, N.2
-
24
-
-
0034504466
-
A practical method for watermarking Java programs
-
A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii, "A practical method for watermarking Java programs," Proc. COMP-SAC 2000, 24th Computer Software and Applications Conference, pp. 191-197, 2000
-
(2000)
Proc. COMP-SAC 2000, 24th Computer Software and Applications Conference
, pp. 191-197
-
-
Monden, A.1
Iida, H.2
Matsumoto, K.3
Inoue, K.4
Torii, K.5
-
26
-
-
0032691819
-
Software watermarking: Models and dynamic embeddings
-
San Antonio, TX, Jan.
-
C. Collberg and C. Thomborson, "Software watermarking: Models and dynamic embeddings," Proc. Principles of Programming Languages 1999, POPL'99, pp.311-324, San Antonio, TX, Jan. 1999.
-
(1999)
Proc. Principles of Programming Languages 1999, POPL'99
, pp. 311-324
-
-
Collberg, C.1
Thomborson, C.2
-
27
-
-
24944466169
-
Tamper-proofing software watermarks
-
Australian Computer Society, Dunedin, New Zealand
-
C. Thomborson, J. Nagra, R. Somaraju, and C. He, "Tamper-proofing software watermarks," Proc. second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, pp.27-36, Australian Computer Society, Dunedin, New Zealand, 2004.
-
(2004)
Proc. Second Workshop on Australasian Information Security, Data Mining and Web Intelligence, and Software Internationalisation
, pp. 27-36
-
-
Thomborson, C.1
Nagra, J.2
Somaraju, R.3
He, C.4
-
29
-
-
26444511378
-
-
Dec.
-
X. Chen, B. Francia, M. Li, B. Mckinnon, and A. Seker, "SID plagiarism detection," Dec. 2003. http://genome.math.uwaterloo.ca/SID/
-
(2003)
SID Plagiarism Detection
-
-
Chen, X.1
Francia, B.2
Li, M.3
Mckinnon, B.4
Seker, A.5
-
30
-
-
1442310235
-
Finding plagiarisms among a set of programs with JPlag
-
Nov.
-
L. Prechelt, G. Malpohl, and M. Philippsen, "Finding plagiarisms among a set of programs with JPlag," J. Universal Computer Science, vol.8, no.11, pp.1016-1038, Nov. 2002.
-
(2002)
J. Universal Computer Science
, vol.8
, Issue.11
, pp. 1016-1038
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
31
-
-
0029701640
-
YAP3: Improved detection of similarities in computer program and other texts
-
Philadelphia, Pennsylvania, United States
-
M.J. Wise, "YAP3: Improved detection of similarities in computer program and other texts," Proc. 27 SIGCSE technical symposium on Computer science education, pp.130-134, Philadelphia, Pennsylvania, United States, 1996.
-
(1996)
Proc. 27 SIGCSE Technical Symposium on Computer Science Education
, pp. 130-134
-
-
Wise, M.J.1
-
32
-
-
34250902471
-
Computer algorithms for plagiarism detection
-
May
-
A. Parker and H.O. James, "Computer algorithms for plagiarism detection," IEEE Trans. Educ., vol.32, no.2, pp.94-99, May 1989.
-
(1989)
IEEE Trans. Educ.
, vol.32
, Issue.2
, pp. 94-99
-
-
Parker, A.1
James, H.O.2
-
33
-
-
84976799118
-
An algorithmic approach to the detection and prevention of plagiarism
-
K.J. Ottenstein, "An algorithmic approach to the detection and prevention of plagiarism," SIGCSE Bulletin, vol.8, no.4, pp.30-41, 1976.
-
(1976)
SIGCSE Bulletin
, vol.8
, Issue.4
, pp. 30-41
-
-
Ottenstein, K.J.1
-
34
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I.D. Baxter, A. Yahin, L.M.D. Moura, M. Sant'Anna, and L. Bier, "Clone detection using abstract syntax trees," ICSM: The International Conference on Software Maintenance, pp.368-377, 1998.
-
(1998)
ICSM: The International Conference on Software Maintenance
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.M.D.3
Sant'Anna, M.4
Bier, L.5
-
35
-
-
0036648690
-
CCFinder: A multi-linguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue, "CCFinder: A multi-linguistic token-based code clone detection system for large scale source code," IEEE Trans. Softw. Eng., vol.28, no.7, pp.654-670, 2002.
-
(2002)
IEEE Trans. Softw. Eng.
, vol.28
, Issue.7
, pp. 654-670
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
36
-
-
0030653064
-
Authorship analysis: Identifying the author of a program
-
I. Krsul and E.H. Spafford, "Authorship analysis: Identifying the author of a program," Comput. Secur., vol.16, no.3, pp.233-257, 1997.
-
(1997)
Comput. Secur.
, vol.16
, Issue.3
, pp. 233-257
-
-
Krsul, I.1
Spafford, E.H.2
-
37
-
-
0027677539
-
Software forensics: Can we track code to its authors?
-
E.H. Spafford and S.A. Weeber, "Software forensics: Can we track code to its authors?," Comput. Secur., vol.12, no.6, pp.585-595, 1993.
-
(1993)
Comput. Secur.
, vol.12
, Issue.6
, pp. 585-595
-
-
Spafford, E.H.1
Weeber, S.A.2
-
40
-
-
85027199308
-
-
Tests
-
"Java decompiler tests," http://www.program-transformation.org/ Transform/JavaDecompiler Tests
-
Java Decompiler Tests
-
-
-
41
-
-
26444593634
-
Program birthmark scheme with tolerance to equivalent conversion of Java classfiles
-
Dec.
-
K. Fukushima, T. Tabata, and K. Sakurai, "Program birthmark scheme with tolerance to equivalent conversion of Java classfiles," IPSJ SIG Notes 2003-126, pp.81-86, Dec. 2003.
-
(2003)
IPSJ SIG Notes
, vol.2003
, Issue.126
, pp. 81-86
-
-
Fukushima, K.1
Tabata, T.2
Sakurai, K.3
-
42
-
-
0003548405
-
-
Benjamin/Cummings series in software engineering, Addison-Wesley, March
-
S. Conte, H.E. Dunsmore, and V.Y. Shen, Software Engineering Metrics and Models (Benjamin/Cummings series in software engineering), Addison-Wesley, March 1986.
-
(1986)
Software Engineering Metrics and Models
-
-
Conte, S.1
Dunsmore, H.E.2
Shen, V.Y.3
|