Haruaki Tamada
TitleCited byYear
Design and evaluation of birthmarks for detecting theft of java programs.
H Tamada, M Nakamura, A Monden, K Matsumoto
IASTED Conf. on Software Engineering, 569-574, 2004
1452004
Dynamic software birthmarks to detect the theft of windows applications
H Tamada, K Okamoto, M Nakamura, A Monden, K Matsumoto
International Symposium on Future Software Technology 20 (22), 2004
1252004
Constructing home network systems and integrated services using legacy home appliances and web services
M Nakamura, A Tanaka, H Igaki, H Tamada, K Matsumoto
International Journal of Web Services Research (IJWSR) 5 (1), 82-98, 2008
962008
Java Birthmarks--Detecting the Software Theft--
H Tamada, M Nakamura, A Monden, K Matsumoto
IEICE transactions on information and systems 88 (9), 2148-2158, 2005
902005
Implementing integrated services of networked home appliances using service oriented architecture
M Nakamura, H Igaki, H Tamada, K Matsumoto
Proceedings of the 2nd international conference on Service oriented …, 2004
552004
Design and evaluation of dynamic software birthmarks based on api calls
H Tamada, K Okamoto, M Nakamura, A Monden, K Matsumoto
Info. Science Technical Report NAIST-IS-TR2007011, ISSN, 0919-9527, 2007
462007
Defect data analysis based on extended association rule mining
S Morisaki, A Monden, T Matsumura, H Tamada, K Matsumoto
Fourth International Workshop on Mining Software Repositories (MSR'07: ICSE …, 2007
382007
Adapting legacy home appliances to home network systems usingweb services
M Nakamura, A Tanaka, H Igaki, H Tamada, K Matsumoto
2006 IEEE International Conference on Web Services (ICWS'06), 849-858, 2006
312006
Detecting the theft of programs using birthmarks
H Tamada, M Nakamura, A Monden, K Matsumoto
NAIST-IS-TR2003014, 2003
302003
サービス指向アーキテクチャを用いたネットワーク家電連携サービスの開発
井垣 宏, 中村 匡秀, 玉田 春昭松本 健一
情報処理学会論文誌 46 (2), 314-326, 2005
17*2005
A goal-oriented approach to software obfuscation
A Monden, M Nakamura, H Tamada
IJCSNS 8 (9), 59, 2008
142008
A framework for programming process measurement and compiling error interpretation for novice programmers
H Tamada, A Ogino, H Ueda
2011 Joint Conference of the 21st International Workshop on Software …, 2011
122011
A dynamic birthmark from analyzing operand stack runtime behavior to detect copied software
K Fukuda, H Tamada
2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013
102013
Introducing dynamic name resolution mechanism for obfuscating system-defined names in programs
H Tamada, M Nakamura, A Monden, K Matsumoto
Proc. IASTED International Conference on Software Engineering (IASTED SE …, 2008
102008
Using software birthmarks to identify similar classes and major functionalities
T Kakimoto, A Monden, Y Kamei, H Tamada, M Tsunoda, K Matsumoto
Proceedings of the 2006 international workshop on Mining software …, 2006
92006
Dynamic software birthmarks based on API calls
K Okamoto, H Tamada, M Nakamura, A Monden, K Matsumoto
IEICE Transactions on Information and Systems 89 (8), 1751-1763, 2006
92006
Obfuscation device for generating a set of obfuscated instructions, processing device, method, program, and integrated circuit thereof
T Sato, T Haga, K Matsumoto, A Monden, H Tamada
US Patent 8,225,077, 2012
82012
Mining quantitative rules in a software project data set
S Morisaki, A Monden, H Tamada, T Matsumura, K Matsumoto
Information and Media Technologies 2 (4), 999-1008, 2007
82007
Robot helps teachers for education of the c language beginners
H Tamada, A Ogino, H Ueda
International Conference on Human-Computer Interaction, 377-384, 2009
72009
AddTracer, Injecting tracers into Java class files for dynamic analysis
H TAMADA
http://se. aist-nara. ac. jp/addtracer/, 2004
62004
The system can't perform the operation now. Try again later.
Articles 1–20