Jon Bing Proving Copyright Infringement of Computer Programs – Some practical Examples
Developing a computer program
Co-operation in developing a program
«One» program
User interface
Strategies in identifying interesting source code extracts Sorting on file names Sorting on file seize Indexing – inspecting variables identical or similar Calculating a hash value for each line of programming code
Comparing source code SJEKK-AVGR. MOVE 0 TO SJEKK SJEKK-10. SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20 IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG. IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > SJEKK-AVGR. MOVE 0 TO SJEKK SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20. IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > GO TO SJEKK-TILSLAG.
External factors Programming language Standards Best practrice guides Boiler-plate text Third party components
Incremental development
Development process Time and resources used for development Experience
Pro-active strategies Clean room procedures Full documentation Original when possible (name of variables as an example)