期刊文献+

多层次的软件相似性分析 被引量:1

MULTIPHASE ANALYSIS OF PROGRAM SIMILARITY
下载PDF
导出
摘要 一般的软件纠纷案件分析时多在原、被告2个软件的编码层次上作对比.本文所反映的是国内首次3个软件之间在编选组合层(SCA)、成文表达层、编码层等多个层次上作程序相似性分析,最后给出明确的量化结果. Most defendant programs are compared with plaintiff's programs on the code-layer. In this paper, similarity analysis between three programs is discussed for the first time in China. This analysis is bassed upon the SCA(Selection, Coordination or Arrangement) layer, written expression layer and code layer, and its quantization result is given.
作者 王桂海
出处 《华南师范大学学报(自然科学版)》 CAS 1996年第1期99-103,共5页 Journal of South China Normal University(Natural Science Edition)
基金 国家自然科学基金
关键词 侵权 相似性 软件 保护 software infringement similarity analysis software protection
  • 相关文献

参考文献2

共引文献3

同被引文献9

  • 1王桂海,罗苏平.软件著作权的验证及软件相似性判别案例[J].华南师范大学学报(自然科学版),1995,27(4):1-6. 被引量:1
  • 2金惠生,黄荔,王桂海.软件相似性分析方法的运用[J].华南师范大学学报(自然科学版),1995,27(4):7-11. 被引量:1
  • 3ZHU W. Informed recognition in software watermarking [ M ]. New York: Intelligence and Security Informatics, 2007:257-261.
  • 4FALCARIN P, COLLBERG C, ATALLAH M, et al. Guest editors' introduction : Software protection [ J ]. Soft- ware, IEEE, 2011, 28(2): 24-27.
  • 5COLLBERG C S, THOMBORSON C D. Software water-marking: Models and dynamic embeddings [ C ] ff Pro- ceedings of the ACM SIGPLAN - SIGACT Symposium on Principles of Programming Languages - POPL. New York, NY, USA, 1999:311-324.
  • 6ZHU J Q, LIU Y H, YIN K X. A novel dynamic graph software watermark scheme [ C ] JJ Proceedings of the 2009 First International Workshop on Education Technology and Computer Science. Washington, DC, USA, 2009 : 775 - 780.
  • 7PALSBERG J, KRISHNASWAMY S, KWON M, et al. Experience with software watermarking[C]//Proceedings of the Computer Security Applications, 2000 ACSAC'00 16th Annu- al Conference. New Orleans, LA, 2000. 308 -316.
  • 8ZHU J Q, WANG A M, LIU Y H. Tamper - proofing soft- ware watermarking scheme based on constant encoding[ C] //Proceedings of the Education Technology and Computer Science (ETCS). Dunedin, New Zealand, 2010 : 129 - 132.
  • 9AGUZZI M, ALBANESI M, FERRETTI M. A novel watermarking algorithm for image authentication: Robustness against common attacks and JPEG2000 compression [ J ]. Image Analysis and Processing- ICIAP, 2005, 3617: 559 - 567.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部