1 |
L. Prechelft, G. Malpohl, and M. Philippsen, "Finding plagiarisms among a set of programs with jPlag," Journal of Universal Computer Science, vol. 8, no. 11, pp. 1016-1038, 2002
|
2 |
"Jikes Java Compiler" http://jikes.sourceforge.net/
|
3 |
Aho, Sethi, Ullman, Compilers: Principles, Techniques, and Tools, Addison-Wesley, 1986
|
4 |
Business Software Allience, "Fourth Annual BSA and IDC Global Software Piracy Study," 2006. http:// www.bsa.org/globalstudy
|
5 |
"Smokescreen" http://www.leesw.com/smokescreen/
|
6 |
Ginger Myles and Christian Collberg. k-gram Based Software Birthmarks. In Proceeding of the 2005 ACM Symposium on Applied Computing, pp. 314-318. Santa Fe, New Mexico, USA, 2005
|
7 |
Brudno M, Malde S, Poliakov A, Do CB, Couronne O, Dubchak I, Batzoglou S. Glocal alignment: finding rearrangements during alignment. Bioinformatics Vol.19 Suppl.1:i54-62, 2003
DOI
ScienceOn
|
8 |
Tamada, H., Nakamura, M., Monden, A., Matsumoto, K. Java birthmark Detecting the software theft. IEICE Transactions on Information and Systems, E88-D, 9 (Sept. 2005), 2148-2158
DOI
|