期刊文献+

软件相似性分析方法的运用 被引量:1

APPLICATION OF METHODS OF SOFTWARE SIMILARITY ANALYSIS
下载PDF
导出
摘要 本文运用软件相似性分析方法,具体分析了深圳市某软件侵权策。结果表明,这些方法可以较准确地认定软件相似的程度,而且,分析过程表明,多种方法的交叉运用,会有很好的效果。 Methods of software similarity analysis are applied to one case of software copyrightinfringement.Results show that these methods can be used to determine the degree of similaritybetween two software,Also,it would be better to use these metheds alternatively.
出处 《华南师范大学学报(自然科学版)》 CAS 1995年第4期7-11,共5页 Journal of South China Normal University(Natural Science Edition)
基金 国家自然科学基金
关键词 软件保护 相似性 侵权 著作权 software protection similarity infringement
  • 相关文献

同被引文献9

  • 1王桂海,罗苏平.软件著作权的验证及软件相似性判别案例[J].华南师范大学学报(自然科学版),1995,27(4):1-6. 被引量:1
  • 2王桂海.多层次的软件相似性分析[J].华南师范大学学报(自然科学版),1996,28(1):99-103. 被引量:1
  • 3ZHU W. Informed recognition in software watermarking [ M ]. New York: Intelligence and Security Informatics, 2007:257-261.
  • 4FALCARIN P, COLLBERG C, ATALLAH M, et al. Guest editors' introduction : Software protection [ J ]. Soft- ware, IEEE, 2011, 28(2): 24-27.
  • 5COLLBERG C S, THOMBORSON C D. Software water-marking: Models and dynamic embeddings [ C ] ff Pro- ceedings of the ACM SIGPLAN - SIGACT Symposium on Principles of Programming Languages - POPL. New York, NY, USA, 1999:311-324.
  • 6ZHU J Q, LIU Y H, YIN K X. A novel dynamic graph software watermark scheme [ C ] JJ Proceedings of the 2009 First International Workshop on Education Technology and Computer Science. Washington, DC, USA, 2009 : 775 - 780.
  • 7PALSBERG J, KRISHNASWAMY S, KWON M, et al. Experience with software watermarking[C]//Proceedings of the Computer Security Applications, 2000 ACSAC'00 16th Annu- al Conference. New Orleans, LA, 2000. 308 -316.
  • 8ZHU J Q, WANG A M, LIU Y H. Tamper - proofing soft- ware watermarking scheme based on constant encoding[ C] //Proceedings of the Education Technology and Computer Science (ETCS). Dunedin, New Zealand, 2010 : 129 - 132.
  • 9AGUZZI M, ALBANESI M, FERRETTI M. A novel watermarking algorithm for image authentication: Robustness against common attacks and JPEG2000 compression [ J ]. Image Analysis and Processing- ICIAP, 2005, 3617: 559 - 567.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部