Sciweavers

50 search results - page 1 / 10
» A Practical Method for Watermarking Java Programs
Sort
View
COMPSAC
2000
IEEE
13 years 9 months ago
A Practical Method for Watermarking Java Programs
Java programs distributed through Internet are now suffering from program theft. It is because Java programs can be easily decomposed into reusable class files and even decompiled...
Akito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koj...
IH
2004
Springer
13 years 10 months ago
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks
Abstract. This paper presents an implementation of the novel watermarking method proposed by Venkatesan, Vazirani, and Sinha in their recent paper A Graph Theoretic Approach to Sof...
Christian S. Collberg, Andrew Huntwork, Edward Car...
ECR
2006
107views more  ECR 2006»
13 years 4 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
CAV
2012
Springer
270views Hardware» more  CAV 2012»
11 years 7 months ago
Automated Termination Proofs for Java Programs with Cyclic Data
Abstract. In earlier work, we developed a technique to prove termination of Java programs automatically: first, Java programs are automatically transformed to term rewrite systems...
Marc Brockschmidt, Richard Musiol, Carsten Otto, J...
JAVA
1999
Springer
13 years 8 months ago
Practical Guidelines for Boosting Java Server Performance
As Java technology matures, an increasing number of applications that have traditionally been the domain of languages such as C++ are implemented in Java. Many of these applicatio...
Reinhard Klemm