Download presentation
Presentation is loading. Please wait.
Published byVivian Patterson Modified over 6 years ago
1
Jon Bing Proving Copyright Infringement of Computer Programs – Some practical Examples
2
Developing a computer program
3
Co-operation in developing a program
4
«One» program
5
User interface
6
Strategies in identifying interesting source code extracts
Sorting on file names Sorting on file seize Indexing – inspecting variables identical or similar Calculating a hash value for each line of programming code
7
Comparing source code SJEKK-AVGR. MOVE 0 TO SJEKK SJEKK-10.
SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20 IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG. IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > SJEKK-AVGR. MOVE 0 TO SJEKK SJEKK-10. IF WS-FRA = 0 AND WS-TIL = 0 GO TO SJEKK-20. IF WS-FRA NOT < WS-FRA1 AND WS-FRA NOT > WS-TIL1 GO TO SJEKK-TILSLAG IF WS-TIL NOT < WS-FRA1 AND WS-TIL NOT > GO TO SJEKK-TILSLAG.
8
External factors Programming language Standards Best practrice guides
Boiler-plate text Third party components
9
Incremental development
10
Development process Time and resources used for development Experience
11
Pro-active strategies
Clean room procedures Full documentation Original when possible (name of variables as an example)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.