Jon Bing Proving Copyright Infringement of Computer Programs – Some practical Examples.

Slides:



Advertisements
Similar presentations
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 2 Alphabetic Indexing Rules 1-4 Copyright 2011 South-Western, Cengage Learning.
Advertisements

Copyright © 2005, SAS Institute Inc. All rights reserved. Making the Transition from MDDB-based OLAP Applications to a SAS ® 9 OLAP Solution Ivy Parker.
Microprocessors I Why study Microprocessors? –Why not use PLD/FPGA designs for all digital designs What are microprocessors? How do they work? How do they.
Chapter 2- Visual Basic Schneider1 Chapter 2 Problem Solving.
Numeric Filing Procedures OT 122 Chapter Four. Introduction Numeric filing – Arranges numbers according to numbers Either consecutively Or in groups –
Perl Practical Extraction and Report Language Senior Projects II Jeff Wilson.
Fundamentals, Design, and Implementation, 9/e Chapter 11 Managing Databases with SQL Server 2000.
Program Flow Charting How to tackle the beginning stage a program design.
Program Flow Charting How to tackle the beginning stage a program design.
Summary. Chapter 9 – Triggers Integrity constraints Enforcing IC with different techniques –Keys –Foreign keys –Attribute-based constraints –Schema-based.
Using PC SAS Help. You can get information about the Editor, Log, or Output windows by Selecting “Using this Window” under the Help Menu...
Electronic Filing and Calculating
Guide To UNIX Using Linux Third Edition
Selection Sort
1 A Student Guide to Object- Orientated Development Chapter 9 Design.
ACT 96 - Indoor Environmental Quality In conjunction with the requirements directed under WI Statute and Administrative Code, school building officials.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Chapter.
1 LOMGen: A Learning Object Metadata Generator Applied to Computer Science Terminology A. Singh, H. Boley, V.C. Bhavsar National Research Council and University.
MULTIMEDIA DEVELOPMENT
Python File Handling. In all the programs you have made so far when program is closed all the data is lost, but what if you want to keep the data to use.
DEFECTS By K.KARTHIKE. WHAT IS DEFECTS? Software bug, a failure of computer software to meet requirements Software bug The term defect and its relationship.
Plug-in System for the Xylia Extensible XML Editor Student: Jonathan Milley Supervisor: Dr. T. S. Norvell.
Systems Development Lifecycle Testing and Documentation.
The Development of a search engine & Comparison according to algorithms Sungsoo Kim Haebeom Lee The mid-term progress report.
BLU-ICE and the Distributed Control System Constraints for Software Development Strategies Timothy M. McPhillips Stanford Synchrotron Radiation Laboratory.
Business Intelligence Software Business Intelligence A Software at your size.
EXAMPLE 3 Find the inverse of a 3 × 3 matrix Use a graphing calculator to find the inverse of A. Then use the calculator to verify your result. 2 1 – 2.
Updating JUPITER framework using XML interface Kobe University Susumu Kishimoto.
Evidence Handling If the evidence is there the case is yours to lose.
JavaScript Syntax, how to use it in a HTML document
Graphical User Interface You will be used to using programs that have a graphical user interface (GUI). So far you have been writing programs that have.
Project & Risk Management For next class -- Pressman: 3, , 5.8, , 6.6 Introductions Software Development Processes Software Maturity Models.
Search engines and copyright Cardozo 10 Sep 2007 Jon Bing Norwegian Research Center for Computers and Law.
Defect Classes and the defect repository
Selection Sort
 Programming - the process of creating computer programs.
2016 N5 Prelim Revision. HTML Absolute/Relative addressing in HTML.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department A MULTITHREADED SEARCH ENGINE AND TESTING OF MULTITHREADED.
Geographic Filing Procedures OT 122 Chapter Six. Introduction Geographic Filing – Records are sorted by location.
The Development of a search engine & Comparison according to algorithms Sung-soo Kim The final report.
Math 252: Math Modeling Eli Goldwyn Introduction to MATLAB.
System Analysis and Design Copyright © Genetic Computer School 2007 SAD14-1 CHAPTER OVERVIEW  Overview Of System Maintenance  Tasks Performed During.
CMA Coastline Matching Algorithm SSIP’99 - Project 10 Team H.
1 CSE1301 Computer Programming: Where are we now in the CSE1301 syllabus?
Click to edit Master text styles Stacks Data Structure.
Chapter 6 Testing and running a solution. Errors X Three types Syntax Logic Run-time.
Software Design and Development Development Methodoligies Computing Science.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Chapter 4. CONCEPT OF THE OPERATING SYSTEM MANAGING ESSENTIAL FILE OPERATIONS.
Introduction to Algorithm. What is Algorithm? an algorithm is any well-defined computational procedure that takes some value, or set of values, as input.
INTRO. To I.T Razan N. AlShihabi
CLEAN UP & INSPECTION.
Search Techniques and Advanced tools for Researchers
Java for Teachers Intermediate
Yuri Pettinicchi Jeny Tony Philip
Documentation for Developers
SQA Role during Software Code and Unit Test Phase
I PRO' -.._ r.. f FOLLOW I 0.
© Copyright The PiXL Club Ltd, 2016
Mail Merge.
Group Policy Preferences
Chapter 11 Managing Databases with SQL Server 2000
APACHE LICENSE HISTORICAL EVOLUTION
© Copyright The PiXL Club Ltd, 2016
Requirements Engineering Lecture 6
Introduction Time is something we waist as a society
CHAPTER FOUR VARIABLES AND CONSTANTS
One-way Hash Function Network Security.
4d – Program Design Lingma Acheson CSCI N331 VB .NET Programming
Presentation transcript:

Jon Bing Proving Copyright Infringement of Computer Programs – Some practical Examples

Developing a computer program

Co-operation in developing a program

«One» program

User interface

Strategies in identifying interesting source code extracts Sorting on file names Sorting on file seize Indexing – inspecting variables identical or similar Calculating a hash value for each line of programming code

Comparing source code SJEKK-AVGR. MOVE 0 TO SJEKK SJEKK-10.   SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20 IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG. IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > SJEKK-AVGR. MOVE 0 TO SJEKK   SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20. IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > GO TO SJEKK-TILSLAG.

External factors Programming language Standards Best practrice guides Boiler-plate text Third party components

Incremental development

Development process Time and resources used for development Experience

Pro-active strategies Clean room procedures Full documentation Original when possible (name of variables as an example)