The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian S. Collberg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg
    A Functional Taxonomy for Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ACSC, 2002, pp:177-186 [Conf]
  2. Christian S. Collberg
    Data Structures, Algorithms, and Software Engineering. [Citation Graph (0, 0)][DBLP]
    CSEE, 1989, pp:70-79 [Conf]
  3. Christian S. Collberg
    A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine. [Citation Graph (0, 0)][DBLP]
    Diagrams, 2002, pp:176-190 [Conf]
  4. Christian S. Collberg, Magnus G. Krampell
    A Property-Based Method for Selecting Among Multiple Implementations of Modules. [Citation Graph (0, 0)][DBLP]
    ESEC, 1987, pp:193-201 [Conf]
  5. Christian S. Collberg, Stephen G. Kobourov, Joshua Louie, Thomas Slattery
    SPLAT: A System for Self-Plagiarism Detection. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:508-514 [Conf]
  6. Christian S. Collberg, Clark D. Thomborson, Douglas Low
    Breaking Abstractions and Unstructuring Data Structures. [Citation Graph (0, 0)][DBLP]
    ICCL, 1998, pp:28-38 [Conf]
  7. Ginger Myles, Christian S. Collberg
    Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:274-293 [Conf]
  8. Christian S. Collberg, Andrew Huntwork, Edward Carter, Gregg M. Townsend
    Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:192-207 [Conf]
  9. Stephen G. Kobourov, Christian S. Collberg, Steven Kobes, Ben Smith, S. Trush, Gary V. Yee
    TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch. [Citation Graph (0, 0)][DBLP]
    INTERACT, 2003, pp:- [Conf]
  10. Kelly Heffner, Christian S. Collberg
    The Obfuscation Executive. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:428-440 [Conf]
  11. Ginger Myles, Christian S. Collberg
    Detecting Software Theft via Whole Program Path Birthmarks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:404-415 [Conf]
  12. Christian S. Collberg
    Reverse Interpretation + Mutation Analysis = Automatic Retargeting. [Citation Graph (0, 0)][DBLP]
    PLDI, 1997, pp:57-70 [Conf]
  13. Christian S. Collberg, Edward Carter, Saumya K. Debray, Andrew Huntwork, John D. Kececioglu, Cullen Linn, Michael Stepp
    Dynamic path-based software watermarking. [Citation Graph (0, 0)][DBLP]
    PLDI, 2004, pp:107-118 [Conf]
  14. Christian S. Collberg
    Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization. [Citation Graph (0, 0)][DBLP]
    Programming Languages and System Architectures, 1994, pp:282-297 [Conf]
  15. Christian S. Collberg, Clark D. Thomborson
    Software Watermarking: Models and Dynamic Embeddings. [Citation Graph (0, 0)][DBLP]
    POPL, 1999, pp:311-324 [Conf]
  16. Christian S. Collberg, Clark D. Thomborson, Douglas Low
    Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. [Citation Graph (0, 0)][DBLP]
    POPL, 1998, pp:184-196 [Conf]
  17. Ginger Myles, Christian S. Collberg
    K-gram based software birthmarks. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:314-318 [Conf]
  18. Christian S. Collberg, Stephen G. Kobourov, Suzanne Westbrook
    AlgoVista: an algorithmic search tool in an educational setting. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2004, pp:462-466 [Conf]
  19. Christian S. Collberg, Stephen G. Kobourov, Jasvir Nagra, Jacob Pitts, Kevin Wampler
    A System for Graph-Based Visualization of the Evolution of Software. [Citation Graph (0, 0)][DBLP]
    SOFTVIS, 2003, pp:77-86 [Conf]
  20. Christian S. Collberg, John H. Hartman, Sridivya Babu, Sharath K. Udupa
    SLINKY: Static Linking Reloaded. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2005, pp:309-322 [Conf]
  21. Christian S. Collberg, Sean Davey, Todd A. Proebsting
    Language-Agnostic Program Rendering for Presentation, Debugging and Visualization. [Citation Graph (0, 0)][DBLP]
    VL, 2000, pp:183-190 [Conf]
  22. Richard T. Snodgrass, Shilong (Stanley) Yao, Christian S. Collberg
    Tamper Detection in Audit Logs. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:504-515 [Conf]
  23. Christian S. Collberg, Stephen G. Kobourov, Edward Carter, Clark D. Thomborson
    Graph-Based Approaches to Software Watermarking. [Citation Graph (0, 0)][DBLP]
    WG, 2003, pp:156-167 [Conf]
  24. Christian S. Collberg, Stephen G. Kobourov
    Self-plagiarism in computer science. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:4, pp:88-94 [Journal]
  25. Christian S. Collberg, Todd A. Proebsting
    Problem identification using program checking. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:144, n:3, pp:270-280 [Journal]
  26. Ginger Myles, Christian S. Collberg
    Software watermarking via opaque predicates: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2006, v:6, n:2, pp:155-171 [Journal]
  27. Christian S. Collberg, Ginger Myles, Andrew Huntwork
    Sandmark--A Tool for Software Protection Research. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:40-49 [Journal]
  28. Christian S. Collberg, Tapas Ranjan Sahoo
    Software watermarking in the frequency domain: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:721-755 [Journal]
  29. Ginger Myles, Christian S. Collberg, Zachary V. Heidepriem, Armand Navabi
    The evaluation of two software watermarking algorithms. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2005, v:35, n:10, pp:923-938 [Journal]
  30. Christian S. Collberg
    Automatic derivation of compiler machine descriptions. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2002, v:24, n:4, pp:369-408 [Journal]
  31. Christian S. Collberg, Clark D. Thomborson
    Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2002, v:28, n:8, pp:735-746 [Journal]
  32. Christian S. Collberg, Clark D. Thomborson, Gregg M. Townsend
    Dynamic graph-based software fingerprinting. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 2007, v:29, n:6, pp:- [Journal]

  33. A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP]


  34. Barrier Slicing for Remote Software Trusting. [Citation Graph (, )][DBLP]


  35. AlambdagoVista: a tool to enhance algorithm design and understanding. [Citation Graph (, )][DBLP]


  36. Trading-off security and performance in barrier slicing for remote software entrusting. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.330secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002