-
1
-
-
74049165023
-
-
Available from World Wide Web
-
[online]Available from World Wide Web: http://news.zdnet.com/2100-3513- 22-5629876.html.
-
-
-
-
3
-
-
74049110260
-
-
The gecko engine, http://en.wikipedia.org/wiki/Gecko-layout-engine.
-
The gecko engine
-
-
-
4
-
-
74049092497
-
-
Khtml engine, http://en.wikipedia.org/wiki/KHTML.
-
Khtml engine
-
-
-
6
-
-
84976807106
-
Minimizing reference count updating with deferred and anchored pointers for functional data structures
-
H. G. Baker. Minimizing reference count updating with deferred and anchored pointers for functional data structures. ACM SIGPLAN Notices, 29:29-9, 1994.
-
(1994)
ACM SIGPLAN Notices
, vol.29
, pp. 29-29
-
-
Baker, H.G.1
-
7
-
-
0032311601
-
Clone detection using
-
abstract syntax trees
-
I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier. Clone detection using abstract syntax trees. In Int. Conf. on Software Maintenance, 1998.
-
(1998)
Int. Conf. on Software Maintenance
-
-
Baxter, I.D.1
Yahin, A.2
Moura, L.3
Sant'Anna, M.4
Bier, L.5
-
9
-
-
8344263880
-
Dynamic path-based software watermarking
-
C. Collberg, E. Carter, S. Debray, A. Huntwork, C. Linn, and M. Stepp. Dynamic path-based software watermarking. In Proceedings of the Conference on Programming Language Design and Implementation, 2004.
-
(2004)
Proceedings of the Conference on Programming Language Design and Implementation
-
-
Collberg, C.1
Carter, E.2
Debray, S.3
Huntwork, A.4
Linn, C.5
Stepp, M.6
-
11
-
-
0004046658
-
A taxonomy of obfuscating transformations. Technical Report 148, The Univeristy of Auckland
-
July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, The Univeristy of Auckland, July 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
15
-
-
0036648690
-
Ccfinder: A multilinguistic token-based code clone detection system for large scale source code
-
T. Kamiya, S. Kusumoto, and K. Inoue. Ccfinder: a multilinguistic token-based code clone detection system for large scale source code. IEEE Trans. Softw. Eng., 28(7), 2002.
-
(2002)
IEEE Trans. Softw. Eng
, vol.28
, Issue.7
-
-
Kamiya, T.1
Kusumoto, S.2
Inoue, K.3
-
16
-
-
85077680022
-
Behavior-based spyware detection
-
E. Kirda, C. Kruegel, G. Banks, G. Vigna, and R. A. Kemmerer. Behavior-based spyware detection. In Proceedings of the 15th conference on USENIX Security Symposium, 2006.
-
(2006)
Proceedings of the 15th conference on USENIX Security Symposium
-
-
Kirda, E.1
Kruegel, C.2
Banks, G.3
Vigna, G.4
Kemmerer, R.A.5
-
21
-
-
35048854764
-
Detecting software theft via whole program path birthmarks
-
G. Myles and C. Collberg. Detecting software theft via whole program path birthmarks. In ISC, pages 404-415, 2004.
-
(2004)
ISC
, pp. 404-415
-
-
Myles, G.1
Collberg, C.2
-
22
-
-
74049120598
-
-
G. Myles and C. S. Collberg. K-gram based software birthmarks. In SAC, 2005.
-
G. Myles and C. S. Collberg. K-gram based software birthmarks. In SAC, 2005.
-
-
-
-
24
-
-
74049144309
-
Finding plagiarisms among a set of programs with jplag
-
Available from World Wide Web
-
L. Prechelt, G. Malpohl, and M. Philippsen. Finding plagiarisms among a set of programs with jplag. Universal Computer Science, 2000. Available from World Wide Web: citeseer.ist.psu.edu/article/ prechelt01finding.html.
-
(2000)
Universal Computer Science
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
29
-
-
74049126356
-
Design and evaluation of dynamic software birthmarks based on api calls
-
Technical report, Nara Institute of Science and Technology
-
H. Tamada, K. Okamoto, M. Nakamura, A. Monden, and K. ichi Matsumoto. Design and evaluation of dynamic software birthmarks based on api calls. Technical report, Nara Institute of Science and Technology, 2007.
-
(2007)
-
-
Tamada, H.1
Okamoto, K.2
Nakamura, M.3
Monden, A.4
ichi Matsumoto, K.5
-
30
-
-
0016870630
-
An algorithm for subgraph isomorphism
-
J. R. Ullmann. An algorithm for subgraph isomorphism. Journal of the ACM, 23(1):31-42, 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.1
, pp. 31-42
-
-
Ullmann, J.R.1
|