-
1
-
-
4544376775
-
-
Specjvm98. http://www.specbench.org/osg/jvm98, 1998.
-
(1998)
Specjvm98
-
-
-
3
-
-
4544274351
-
-
Caffeinemark. http://www.benchmarkhq.ru/cm30/info.html, 1997.
-
(1997)
Caffeinemark.
-
-
-
4
-
-
4544343865
-
Graph theoretic software watermarks: Implementation, analysis, and attacks
-
Christian Collberg, Andrew Huntwork, Edward Carter, and Gregg Townsend. Graph theoretic software watermarks: Implementation, analysis, and attacks. In 6th International Information Hiding Workshop, 2004.
-
(2004)
6th International Information Hiding Workshop
-
-
Collberg, C.1
Huntwork, A.2
Carter, E.3
Townsend, G.4
-
7
-
-
0031649930
-
Manufacturing cheap, resilient, and stealthy opaque constructs
-
San Diego, CA, January
-
Christian Collberg, Clark Thomborson, and Douglas Low. Manufacturing cheap, resilient, and stealthy opaque constructs. In Principles of Programming Languages 1998, POPL'98, San Diego, CA, January 1998.
-
(1998)
Principles of Programming Languages 1998, POPL'98
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
8
-
-
2442589724
-
An abstract interpretation-based framework for software watermarking
-
Venice, Italy
-
Patric Cousot and Radhia Cousot. An abstract interpretation-based framework for software watermarking. In POPL'04, Venice, Italy, 2004.
-
(2004)
POPL'04
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
4544378738
-
-
Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, September Assignee: Microsoft Corporation
-
Robert L. Davidson and Nathan Myhrvold. Method and system for generating and auditing a signature for a computer program. US Patent 5,559,884, September 1996. Assignee: Microsoft Corporation.
-
(1996)
-
-
Davidson, R.L.1
Myhrvold, N.2
-
10
-
-
0035111361
-
ALTO: A link-time optimizer for the compaq Alpha
-
January
-
Saumya K. Debray, Robert Muth, Scott Watterson, and Koen De Bosschere. ALTO: A link-time optimizer for the Compaq Alpha. Software - Practice and Experience, 31:67-101, January 2001.
-
(2001)
Software - Practice and Experience
, vol.31
, pp. 67-101
-
-
Debray, S.K.1
Muth, R.2
Watterson, S.3
De Bosschere, K.4
-
12
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
July
-
Michael L. Fredman, Janos Komlós, and Endre Szemerédi. Storing a sparse table with O(1) worst case access time. Journal of the ACM, 31(3):538-544, July 1984.
-
(1984)
Journal of the ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
13
-
-
4544376776
-
-
Jess. http://web.njit.edu/all_topics/Prog_Lang_ Docs/html/jess51/intro.html, 1997.
-
(1997)
-
-
-
14
-
-
0003657593
-
-
Addison-Wesley, Reading, MA, USA, third edition
-
Donald E. Knuth. Seminumerical Algorithms, volume 2 of The Art of Computer Programming. Addison-Wesley, Reading, MA, USA, third edition, 1997.
-
(1997)
Seminumerical Algorithms, Volume 2 of the Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
16
-
-
13944253413
-
Software watermarking through register allocation: Implementation, analysis, and attacks
-
Ginger Myles and Christian Collberg. Software watermarking through register allocation: Implementation, analysis, and attacks. In ICISC'203, 2003.
-
(2003)
ICISC'203
-
-
Myles, G.1
Collberg, C.2
-
18
-
-
0000528368
-
A practical system for intermodule code optimization at link-time
-
March
-
Amitabh Srivastava and David W. Wall. A practical system for intermodule code optimization at link-time. Journal of Programming Languages, 1(1):1-18, March 1993.
-
(1993)
Journal of Programming Languages
, vol.1
, Issue.1
, pp. 1-18
-
-
Srivastava, A.1
Wall, D.W.2
-
19
-
-
84947921326
-
Robust object watermarking: Application to code
-
Julien P. Stern, Gaël Hachez, Franois Koeune, and Jean-Jacques Quisquater. Robust object watermarking: Application to code. In 3rd International Information Hiding Workshop, pages 368-378, 1999.
-
(1999)
3rd International Information Hiding Workshop
, pp. 368-378
-
-
Stern, J.P.1
Hachez, G.2
Koeune, F.3
Quisquater, J.-J.4
-
20
-
-
4544234052
-
A graph theoretic approach to software watermarking
-
Pittsburgh, PA, April
-
Ramarathnam Venkatesan, Vijay Vazirani, and Saurabh Sinha. A graph theoretic approach to software watermarking. In 4th International Information Hiding Workshop, Pittsburgh, PA, April 2001.
-
(2001)
4th International Information Hiding Workshop
-
-
Venkatesan, R.1
Vazirani, V.2
Sinha, S.3
|