Author of the publication

Design and evaluation of birthmarks for detecting theft of java programs.

, , and . IASTED Conf. on Software Engineering, page 569-574. IASTED/ACTA Press, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Relationship between Gender and Code Reading Speed in Software Development., , , and . CoRR, (2022)Modeling and Detecting Feature Interactions among Integrated Services of Home Network Systems., and . IEICE Transactions, 93-D (4): 822-833 (2010)Feature Interactions in Integrated Services of Networked Home Appliances: An Object-Oriented Approach., , and . FIW, page 236-251. IOS Press, (2005)Fine-Grained Map Coloring Web Service for JavaScript., , and . HCI (19), volume 12199 of Lecture Notes in Computer Science, page 159-174. Springer, (2020)Extracting service candidates from procedural programs based on process dependency analysis., , , and . APSCC, page 484-491. IEEE, (2009)RSS Conversion Service for Integrating Web Information Resources and Home Network System., , and . ICE-B, page 131-134. INSTICC Press, (2009)Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process., , , and . ACSW, volume 44 of CRPIT, page 145-151. Australian Computer Society, (2005)Exploiting House Log of Home Network System to Derive Contexts with Past Situations., , , , and . ICCASA, page 13-18. ACM, (2014)Exploiting contexts with house log for value-added smart TV services., , , , and . GCCE, page 258-259. IEEE, (2014)Implementation and evaluation of consumer-oriented lifelog service using daily receipts., , and . iiWAS, page 337-340. ACM, (2011)