A Guided Tour of the Legal Implications of Software Cloning
暂无分享,去创建一个
Alberto Sillitti | Giancarlo Succi | Paolo Ciancarini | Daniel Russo | G. Succi | P. Ciancarini | Daniel Russo | A. Sillitti
[1] Daniel M. Germán,et al. License integration patterns: Addressing license mismatches in component-based development , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[2] Akito Monden,et al. Software quality analysis by code clones in industrial legacy software , 2002, Proceedings Eighth IEEE Symposium on Software Metrics.
[3] Chanchal K. Roy,et al. A Survey on Software Clone Detection Research , 2007 .
[4] Keith N. Hylton. Antitrust Law and Economics , 2010 .
[5] Hans-Gerhard Groß,et al. Self-certification and trust in component procurement , 2005, Sci. Comput. Program..
[6] Søren Riis. What makes a chess program original? Revisiting the Rybka case , 2014, Entertain. Comput..
[7] Giancarlo Succi,et al. Legal Issues Regarding Software Use and Reuse within the European Union Legislation , 2015, CIT 2015.
[8] Alberto Sillitti,et al. Assessment of software developed by a third-party: A case study and comparison , 2016, Inf. Sci..
[9] J. Howard Johnson,et al. Substring matching for clone detection and change tracking , 1994, Proceedings 1994 International Conference on Software Maintenance.
[10] Jan A. Bergstra,et al. About "trivial" software patents: The IsNot case , 2007, Sci. Comput. Program..
[11] Michael W. Godfrey,et al. Supporting the analysis of clones in software systems , 2006, J. Softw. Maintenance Res. Pract..
[12] Michael W. Godfrey,et al. “Cloning considered harmful” considered harmful: patterns of cloning in software , 2008, Empirical Software Engineering.
[13] Miryung Kim,et al. An ethnographic study of copy and paste programming practices in OOPL , 2004, Proceedings. 2004 International Symposium on Empirical Software Engineering, 2004. ISESE '04..
[14] Alberto Sillitti,et al. Comparing OpenBRR, QSOS, and OMM Assessment Models , 2010, OSS.
[15] 石井 六哉,et al. The 27th Annual Conference of the IEEE Industrial Electronics Society (IECON'01)の報告 , 2002 .
[16] Tullio Vernazza,et al. Components and data-flow applied to the integration of Web services , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).
[17] R. Koschke,et al. Frontiers of software clone management , 2008, 2008 Frontiers of Software Maintenance.
[18] Paolo Ciancarini,et al. Detecting clones in game-playing software , 2009, Entertain. Comput..
[19] Daniel M. Germán,et al. An exploratory study of the evolution of software licensing , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[20] Alberto Sillitti,et al. Reverse engineering: a European IPR perspective , 2016, SAC.
[21] Per Runeson,et al. Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.
[22] Kai‐Uwe Kühn. Law, Economics and Antitrust: Towards a New Perspective , 2006 .
[23] Thierry Lavoie,et al. Challenging cloning related problems with GPU-based algorithms , 2010, IWSC '10.
[24] Stéphane Ducasse,et al. Insights into system-wide code duplication , 2004, 11th Working Conference on Reverse Engineering.
[25] Michael W. Godfrey,et al. Supporting the analysis of clones in software systems: Research Articles , 2006 .
[26] H. Jaap van den Herik,et al. Plagiarism in game programming competitions , 2014, Entertain. Comput..
[27] Maninder Singh,et al. Software clone detection: A systematic review , 2013, Inf. Softw. Technol..
[28] References , 1971 .
[29] Brenda S. Baker,et al. On finding duplication and near-duplication in large software systems , 1995, Proceedings of 2nd Working Conference on Reverse Engineering.