Learn More
¡¡¡¡¡¡¡ 200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristics of every class file, a class file with the same birthmark of another can be easily suspected as a copy. However, performance and tolerance of the birthmarks against(More)
This paper proposes dynamic software birthmarks which can be extracted during execution of Windows applications. Birth-marks are unique and native characteristics of software. For a pair of software p and q, if q has the same birthmarks as p's, q is suspected as a copy of p. Our security analysis showed that the proposed birthmark has good tolerance against(More)
Intelligent vehicle cooperation based on reliable communication systems contributes not only to reducing traffic accidents but also to improving traffic flow. Adaptive cruise control (ACC) systems can gain enhanced performance by adding vehicle-vehicle wireless communication to provide additional information to augment range sensor data, leading to(More)
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integrated services. Complementing our previous work, the language captures each appliance as an object consisting of properties and methods, encapsulating the underlying protocols and(More)
This paper presents a technique of dynamic software birthmarks to support efficient detection of software theft. A dynamic birthmark f (p, I) is a set of unique and native characteristics of a program p, obtained by executing p with a given input I. For a pair of software p and q, if f (p, I) = f (q, I) holds, q is suspected as a copy of p. In this paper,(More)
In this paper, we present a new method to protect software against illegal acts of hacking. The key idea is to add a mechanism of self-modifying codes to the original program, so that the original program becomes hard to be analyzed. In the binary program obtained by the proposed method, the original code fragments we want to protect are camouflaged by(More)
This paper proposes to use eye movements to characterize the performance of individuals in reviewing source code of computer programs. We first present an integrated environment to measure and record the eye movements of the code reviewers. Based on the fixation data, the environment computes the line number of the source code that the reviewer is currently(More)
<b>Background:</b> Software product metrics have been widely used as independent variables for constructing a fault prediction model. However, fault injection depends not only on characteristics of the products themselves, but also on characteristics of developers involved in the project. <b>Aims:</b> The goal of this paper is to study the effects of(More)
This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conventional methods generally employ a home server to achieve the integrated services. The server controls all the networked appliances in a centralized manner. However, as the number(More)
Smart city is a next-generation city planning. In the smart city, some value-added services such as energy saving and optimization of traffic are provided using wide variety of logs collected from various appliances and sensors. We are currently developing a smart city platform, called Scallop4SC, which supports collecting and processing the extremely(More)