최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.34 no.1, 2016년, pp.37 - 44
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
BSA Global Report Study in Brief, http://globalstudy.bsa.org/2011/downloads/study_pdf/2011_BSA_Piracy_ Study-InBrief.pdf
The Economic Impact of Properly Licensed Software, http://portal.bsa.org/insead/assets/studies/2013softwarevaluestudy_en.pdf
B. Baker, "On finding duplication and near-duplication in large software systems", In Proceedings of WCRE 1995.
S. Ducasse, M. Rieger, S. Demeyer, "A language independent approach for detecting duplicated code", In Proceeding of lCSM 1999.
U. Manber, "Finding similar files in a large file system", In Proceeding of USENIX Winter Conf, 1994.
T. Kamiya, S. Kusumoto, K. Inoue, "CCFinder: A multilinguistic token-based code clone detection system for large scale source code", IEEE Transactions on Software Engineering 28(7), 2002.
Z. Li, S. Lu, S. Myagmar, and Y. Zhou, "Cp-miner: Finding copy-paste and related bugs in large-scale software code", IEEE Transactions on Software Engineering, 32(3),2006.
I. Baxter, A. Yahin, L. Moura, M. Anna, "Clone detection using abstract syntax trees", In Proceeding of iCSM 1998.
L. Jiang, G. Misherghi, Z. Su, S. Glondu, "DECKARD: Scalable and accurate tree-based detection of code clones", In Proceedings of iCSE 2007.
R. Komondoor, S. Horwitz, "Using slicing to identify duplication in source code", In Proceedings of SAS 2001.
M. Gabel, L. Jiang, and Z. Su, "Scalable detection of semantic clones", In Proceeding of iCSE, 2008.
C. Liu, C. Chen, J. Han, and P.S. Yu, "GPlag: detection of software plagiarism by program dependence graph analysis", In proceeding of KDD, 2006.
X. Wang, Y. -C. Jhi, S. Zhu, and P. Liu, "Behavior based software theft detection," In Proceeding of CCS, 2009.
J. Jang and D. Brumley, "BitShred: Fast, Scalable Code Reuse Detection in Binary Code", CMU-CyLab-10-006, 2009.
Y. Dang, R. Wu, H. Zhang, D. Zhang, and P. Nobel, "ReBucket: A method for clustering duplicate crash reports based on call stack similarity", In Proceeding of ICSE 2012.
S. Han, Y. Dang, S. Ge, D. Zhang, and T. Xie, "Performance debugging in the large via mining millions of stack traces," In Proceeding of iCSE, 2012.
Y.-C. Jhi, X. Wang, X. Jia, S. Zhu, P. Liu, and D, Wu, "Value-based program characterization and its application to software plagiarism detection", In Proceeding of iCSE 2011.
H. Kim, Y. Jung, S. Kim and K. Yi, "MeCC: Memory Comparison based Clone Detector", In Proceeding of ICSE, 2011.
CREST Project Page, http://code.google.com/p/crest
C. Cadar, D. Dunbar, and D. Engler, "Klee: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs", In Proceedings of OSDI, 2008.
Y Choi, "Prism: Semantic Units Clustering and Memory Context Techniques for Binary-level Software Similarity Analysis and Plagiarism Detection", Ph.D. Dissertation, Dankook University, 2013.
S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: local algorithms for document fingerprinting", In Proceeding of SIGMOD, 2003.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.