{"title":"评估计算机软件盗版的概率模型","authors":"R.J. Whitley, T.V. Hromadka II","doi":"10.1016/0961-3552(91)90018-Y","DOIUrl":null,"url":null,"abstract":"<div><p>The growing occurrence of computer software piracy has led to a new area of research, i.e., the development of methods to be used to supply evidence that software was copied.</p><p>One method to argue that computer source code was copied is to examine the occurence of strings of binary code (ones and zeroes) between the alleged parent and pirate codes. Given the occurence of a lengthy identical string between codes, and that string represents a development of executable code (versus data blocks that can be argued to exist in only one fashion), a model of the probability of repetition of such a string of code occurring between so-called independently derived source codes can be formulated. The developed probabilistic results can also be approximately by a simpler formula derived herein. A computer program and example computations are presented.</p></div>","PeriodicalId":100044,"journal":{"name":"Advances in Engineering Software and Workstations","volume":"13 4","pages":"Pages 206-210"},"PeriodicalIF":0.0000,"publicationDate":"1991-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/0961-3552(91)90018-Y","citationCount":"1","resultStr":"{\"title\":\"A probabilistic model to evaluate computer software piracy\",\"authors\":\"R.J. Whitley, T.V. Hromadka II\",\"doi\":\"10.1016/0961-3552(91)90018-Y\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>The growing occurrence of computer software piracy has led to a new area of research, i.e., the development of methods to be used to supply evidence that software was copied.</p><p>One method to argue that computer source code was copied is to examine the occurence of strings of binary code (ones and zeroes) between the alleged parent and pirate codes. Given the occurence of a lengthy identical string between codes, and that string represents a development of executable code (versus data blocks that can be argued to exist in only one fashion), a model of the probability of repetition of such a string of code occurring between so-called independently derived source codes can be formulated. The developed probabilistic results can also be approximately by a simpler formula derived herein. A computer program and example computations are presented.</p></div>\",\"PeriodicalId\":100044,\"journal\":{\"name\":\"Advances in Engineering Software and Workstations\",\"volume\":\"13 4\",\"pages\":\"Pages 206-210\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1991-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1016/0961-3552(91)90018-Y\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Engineering Software and Workstations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/096135529190018Y\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Engineering Software and Workstations","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/096135529190018Y","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A probabilistic model to evaluate computer software piracy
The growing occurrence of computer software piracy has led to a new area of research, i.e., the development of methods to be used to supply evidence that software was copied.
One method to argue that computer source code was copied is to examine the occurence of strings of binary code (ones and zeroes) between the alleged parent and pirate codes. Given the occurence of a lengthy identical string between codes, and that string represents a development of executable code (versus data blocks that can be argued to exist in only one fashion), a model of the probability of repetition of such a string of code occurring between so-called independently derived source codes can be formulated. The developed probabilistic results can also be approximately by a simpler formula derived herein. A computer program and example computations are presented.