-
1
-
-
47749106239
-
-
http://lucene.apache.org/.
-
-
-
-
2
-
-
47749126727
-
-
http://sandmark.cs.arizona.edu/index.html.
-
-
-
-
3
-
-
47749128289
-
-
http://www.catb.org/ẽsr/comparator/.
-
-
-
-
4
-
-
47749091079
-
-
and, http://gplviolations.org
-
http://www.fsf.org/licensing/licenses/ and http://gplviolations.org/.
-
-
-
-
5
-
-
47749107007
-
-
http://www.jpackage.org/.
-
-
-
-
6
-
-
47749123125
-
-
http://www.zelix.com.
-
-
-
-
8
-
-
0005540823
-
-
Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
R. A. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999.
-
(1999)
Modern Information Retrieval
-
-
Baeza-Yates, R.A.1
Ribeiro-Neto, B.2
-
10
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - CRYPTO, pages 1-18, 2001.
-
(2001)
Advances in Cryptology - CRYPTO
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
11
-
-
0032311601
-
Clone detection using abstract syntax trees
-
I. D. Baxter, A. Yahin, L. M. D. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In ICSM, pages 368-377, 1998.
-
(1998)
ICSM
, pp. 368-377
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.M.D.3
Sant'Anna, M.4
Bier, L.5
-
12
-
-
0001802606
-
The X-tree: An index structure for high-dimensional data
-
T. M. Vijayaraman, A. P. Buchmann, C. Mohan, and N. L. Sarda, editors, San Francisco, U.S.A, Morgan Kaufmann Publishers
-
S. Berchtold, D. A. Keim, and H.-P. Kriegel. The X-tree: An index structure for high-dimensional data. In T. M. Vijayaraman, A. P. Buchmann, C. Mohan, and N. L. Sarda, editors, Proceedings of the 22nd International Conference on Very Large Databases, pages 28-39, San Francisco, U.S.A., 1996. Morgan Kaufmann Publishers.
-
(1996)
Proceedings of the 22nd International Conference on Very Large Databases
, pp. 28-39
-
-
Berchtold, S.1
Keim, D.A.2
Kriegel, H.-P.3
-
13
-
-
0002816102
-
Comparing hierarchical data in external memory
-
San Francisco, CA, USA, Morgan Kaufmann Publishers Inc
-
S. S. Chawathe. Comparing hierarchical data in external memory. In VLDB '99: Proceedings of the 25th International Conference on Very Large Data Bases, pages 90-101, San Francisco, CA, USA, 1999. Morgan Kaufmann Publishers Inc.
-
(1999)
VLDB '99: Proceedings of the 25th International Conference on Very Large Data Bases
, pp. 90-101
-
-
Chawathe, S.S.1
-
14
-
-
84924223669
-
Static analysis of executables to detect malicious patterns
-
M. Christodorescu and S. Jha. Static analysis of executables to detect malicious patterns. 12th USENIX Security Symposium, pages 169-186, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 169-186
-
-
Christodorescu, M.1
Jha, S.2
-
15
-
-
84993661659
-
M-tree: An efficient access method for similarity search in metric spaces
-
P. Ciaccia, M. Patella, and P. Zezula. M-tree: An efficient access method for similarity search in metric spaces. In VLDB, pages 426-435, 1997.
-
(1997)
VLDB
, pp. 426-435
-
-
Ciaccia, P.1
Patella, M.2
Zezula, P.3
-
18
-
-
0026243790
-
Efficiently computing static single assignment form and the control dependence graph
-
R. Cytron, J. Ferrante, B. K. Rosen, M. N. Wegman, and F. K. Zadeck. Efficiently computing static single assignment form and the control dependence graph. ACM Trans. Program. Lang. Syst., 13(4):451-490, 1991.
-
(1991)
ACM Trans. Program. Lang. Syst
, vol.13
, Issue.4
, pp. 451-490
-
-
Cytron, R.1
Ferrante, J.2
Rosen, B.K.3
Wegman, M.N.4
Zadeck, F.K.5
-
20
-
-
77954316719
-
Graph-based comparison of executable objects
-
T. Dullien and R. Rolles. Graph-based comparison of executable objects. In SSTIC, 2005.
-
(2005)
SSTIC
-
-
Dullien, T.1
Rolles, R.2
-
21
-
-
0036361233
-
Approximate xml joins
-
New York, NY, USA, ACM Press
-
S. Guha, H. V. Jagadish, N. Koudas, D. Srivastava, and T. Yu. Approximate xml joins. In SIGMOD '02: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, pages 287-298, New York, NY, USA, 2002. ACM Press.
-
(2002)
SIGMOD '02: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 287-298
-
-
Guha, S.1
Jagadish, H.V.2
Koudas, N.3
Srivastava, D.4
Yu, T.5
-
22
-
-
0021615874
-
R-trees: A dynamic index structure for spatial searching
-
New York, NY, USA, ACM Press
-
A. Guttman. R-trees: a dynamic index structure for spatial searching. In SIGMOD '84: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, pages 47-57, New York, NY, USA, 1984. ACM Press.
-
(1984)
SIGMOD '84: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data
, pp. 47-57
-
-
Guttman, A.1
-
23
-
-
0025446340
-
Identifying the semantic and textual differences between two versions of a program
-
New York, NY, USA, ACM Press
-
S. Horwitz. Identifying the semantic and textual differences between two versions of a program. In PLDI '90: Proceedings of the ACM SIGPLAN 1990 conference on Programming Language Design and Implementation, pages 234-245, New York, NY, USA, 1990. ACM Press.
-
(1990)
PLDI '90: Proceedings of the ACM SIGPLAN 1990 conference on Programming Language Design and Implementation
, pp. 234-245
-
-
Horwitz, S.1
-
24
-
-
29844445531
-
Efficient similarity search for hierarchical data in large databases
-
K. Kailing, H.-P. Kriegel, S. Schoenauer, and T. Seidl. Efficient similarity search for hierarchical data in large databases. In EDBT 2004, pages 676-693, 2004.
-
(2004)
EDBT 2004
, pp. 676-693
-
-
Kailing, K.1
Kriegel, H.-P.2
Schoenauer, S.3
Seidl, T.4
-
25
-
-
17644397978
-
-
A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy. Interprocedural static slicing of binary executables. SCAM, 00:118, 2003.
-
A. Kiss, J. Jasz, G. Lehotai, and T. Gyimothy. Interprocedural static slicing of binary executables. SCAM, 00:118, 2003.
-
-
-
-
27
-
-
0027029758
-
Undecidability of static analysis
-
W. Landi. Undecidability of static analysis. ACM Lett. Program. Lang. Syst., 1(4):323-337, 1992.
-
(1992)
ACM Lett. Program. Lang. Syst
, vol.1
, Issue.4
, pp. 323-337
-
-
Landi, W.1
-
28
-
-
0029701640
-
-
W. M. YAP3: Improved detection of similarities in computer program and other texts. SIGCSEB: SIGCSE Bulletin, 28:130-134, 1996.
-
W. M. YAP3: Improved detection of similarities in computer program and other texts. SIGCSEB: SIGCSE Bulletin, 28:130-134, 1996.
-
-
-
-
29
-
-
0034504466
-
-
A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference, pages 191-197, 2000
-
A. Monden, H. Iida, K. Matsumoto, K. Inoue, and K. Torii. A practical method for watermarking java programs. In compsac2000, 24th Computer Software and Applications Conference, pages 191-197, 2000.
-
-
-
-
30
-
-
77952410052
-
On approximate matching of programs for protecting libre software
-
New York, NY, USA, ACM Press
-
A. Müller and T. Shinohara. On approximate matching of programs for protecting libre software. In CASCON '06: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative Research, pages 275-289, New York, NY, USA, 2006. ACM Press.
-
(2006)
CASCON '06: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative Research
, pp. 275-289
-
-
Müller, A.1
Shinohara, T.2
-
31
-
-
84987187338
-
A precise inter-procedural data flow algorithm
-
New York, NY, USA, ACM Press
-
E. M. Myers. A precise inter-procedural data flow algorithm. In POPL '81: Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 219-230, New York, NY, USA, 1981. ACM Press.
-
(1981)
POPL '81: Proceedings of the 8th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 219-230
-
-
Myers, E.M.1
-
32
-
-
33745315005
-
The q-gram distance for ordered unlabeled trees
-
N. Ohkura, K. Hirata, T. Kuboyama, and M. Harao. The q-gram distance for ordered unlabeled trees. In Discovery Science (8th international conference), pages 189-202, 2004.
-
(2004)
Discovery Science (8th international conference)
, pp. 189-202
-
-
Ohkura, N.1
Hirata, K.2
Kuboyama, T.3
Harao, M.4
-
33
-
-
1442310235
-
Finding plagiarism among a set of programs with jplag
-
L. Prechelt, G. Malpohl, and M. Philippsen. Finding plagiarism among a set of programs with jplag. Journal of Universal Computer Science, 8(11):1016-1038, 2002.
-
(2002)
Journal of Universal Computer Science
, vol.8
, Issue.11
, pp. 1016-1038
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
34
-
-
0032094249
-
Optimal multi-step k-nearest neighbor search
-
New York, NY, USA, ACM Press
-
T. Seidl and H.-P. Kriegel. Optimal multi-step k-nearest neighbor search. In SIGMOD '98: Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data, pages 154-165, New York, NY, USA, 1998. ACM Press.
-
(1998)
SIGMOD '98: Proceedings of the 1998 ACM SIGMOD International Conference on Management of Data
, pp. 154-165
-
-
Seidl, T.1
Kriegel, H.-P.2
-
35
-
-
84867658685
-
On dimension reduction mappings for approximate retrieval of multi-dimensional data
-
London, UK, Springer-Verlag
-
T. Shinohara and H. Ishizaka. On dimension reduction mappings for approximate retrieval of multi-dimensional data. In Progress in Discovery Science, Final Report of the Japanese Discovery Science Project, pages 224-231, London, UK, 2002. Springer-Verlag.
-
(2002)
Progress in Discovery Science, Final Report of the Japanese Discovery Science Project
, pp. 224-231
-
-
Shinohara, T.1
Ishizaka, H.2
-
36
-
-
0036648690
-
A multilinguistic token-based code clone detection system for large scale source code
-
K. T., K. S., and I. K. Ccfinder: A multilinguistic token-based code clone detection system for large scale source code. In IEEE Transactions on Software Engineering 28(7), pages 654-670, 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.7
, pp. 654-670
-
-
Ccfinder, I.K.1
-
37
-
-
0018491659
-
The tree-to-tree correction problem
-
K.-C. Tai. The tree-to-tree correction problem. J. ACM, 26(3):422-433, 1979.
-
(1979)
J. ACM
, vol.26
, Issue.3
, pp. 422-433
-
-
Tai, K.-C.1
-
39
-
-
47749151648
-
A method for extracting program fingerprints from java class files
-
H. Tamada, M. Nakamura, A. Monden, and K. ichi Matsumoto. A method for extracting program fingerprints from java class files. The Institute of Electronics, Information and Communication Engineers Technical Report, ISEC2003-29:127-133, 2003.
-
(2003)
The Institute of Electronics, Information and Communication Engineers Technical Report
, vol.ISEC2003-29
, pp. 127-133
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
ichi Matsumoto, K.4
-
40
-
-
26444535682
-
Java birthmarks: Detecting the software theft
-
H. Tamada, M. Nakamura, A. Monden, and K.-i. Matsumoto. Java birthmarks: Detecting the software theft. IEICE Trans Inf Syst, E88-D(9):2148-2158, 2005.
-
(2005)
IEICE Trans Inf Syst
, vol.E88-D
, Issue.9
, pp. 2148-2158
-
-
Tamada, H.1
Nakamura, M.2
Monden, A.3
Matsumoto, K.-I.4
-
41
-
-
38349021089
-
Dynamic software birthmarks to detect the theft of windows applications
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. ichi Matsumoto. Dynamic software birthmarks to detect the theft of windows applications. International Symposium on Future Software Technology 2004 (ISFST 2004), 2004.
-
(2004)
International Symposium on Future Software Technology 2004 (ISFST 2004)
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
ichi Matsumoto, K.5
-
42
-
-
26444552144
-
A linear tree edit distance algorithm for similar ordered trees
-
H. Touzet. A linear tree edit distance algorithm for similar ordered trees. In Lecture Notes in Computer Science, volume 3537, pages 334-345, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3537
, pp. 334-345
-
-
Touzet, H.1
-
43
-
-
84928594241
-
-
F. Umemori, K. Konda, R. Yokomori, and K. Inoue. Design and implementation of bytecode-based java slicing system. SCAM, 00:108-117, 2003.
-
F. Umemori, K. Konda, R. Yokomori, and K. Inoue. Design and implementation of bytecode-based java slicing system. SCAM, 00:108-117, 2003.
-
-
-
-
44
-
-
0001956132
-
Soot - a java optimization framework
-
R. Vall-Rai, L. Hendren, V. Sundaresan, P. Lam, E. Gagnon, and P. Co. Soot - a java optimization framework. CASCON99, pages 13-24, 1999.
-
(1999)
CASCON99
, pp. 13-24
-
-
Vall-Rai, R.1
Hendren, L.2
Sundaresan, V.3
Lam, P.4
Gagnon, E.5
Co, P.6
-
45
-
-
3042816530
-
Automatic validation of code-improving transformations on low-level program representations
-
R. van Engelen, D. Whalley, and X. Yuan. Automatic validation of code-improving transformations on low-level program representations. Sci. Comput. Program., 52(1-3):257-280, 2004.
-
(2004)
Sci. Comput. Program
, vol.52
, Issue.1-3
, pp. 257-280
-
-
van Engelen, R.1
Whalley, D.2
Yuan, X.3
-
46
-
-
34547197548
-
Normalizing metamorphic malware using term rewriting
-
Washington, DC, USA, IEEE Computer Society
-
A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia. Normalizing metamorphic malware using term rewriting. In SCAM '06: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation, pages 75-84, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
SCAM '06: Proceedings of the Sixth IEEE International Workshop on Source Code Analysis and Manipulation
, pp. 75-84
-
-
Walenstein, A.1
Mathur, R.2
Chouchane, M.R.3
Lakhotia, A.4
|