Search the dblp DataBase
Christian S. Collberg :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jasvir Nagra , Clark D. Thomborson , Christian S. Collberg A Functional Taxonomy for Software Watermarking. [Citation Graph (0, 0)][DBLP ] ACSC, 2002, pp:177-186 [Conf ] Christian S. Collberg Data Structures, Algorithms, and Software Engineering. [Citation Graph (0, 0)][DBLP ] CSEE, 1989, pp:70-79 [Conf ] Christian S. Collberg A Fuzzy Visual Query Language for a Domain-Specific Web Search Engine. [Citation Graph (0, 0)][DBLP ] Diagrams, 2002, pp:176-190 [Conf ] Christian S. Collberg , Magnus G. Krampell A Property-Based Method for Selecting Among Multiple Implementations of Modules. [Citation Graph (0, 0)][DBLP ] ESEC, 1987, pp:193-201 [Conf ] Christian S. Collberg , Stephen G. Kobourov , Joshua Louie , Thomas Slattery SPLAT: A System for Self-Plagiarism Detection. [Citation Graph (0, 0)][DBLP ] ICWI, 2003, pp:508-514 [Conf ] Christian S. Collberg , Clark D. Thomborson , Douglas Low Breaking Abstractions and Unstructuring Data Structures. [Citation Graph (0, 0)][DBLP ] ICCL, 1998, pp:28-38 [Conf ] Ginger Myles , Christian S. Collberg Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:274-293 [Conf ] Christian S. Collberg , Andrew Huntwork , Edward Carter , Gregg M. Townsend Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2004, pp:192-207 [Conf ] Stephen G. Kobourov , Christian S. Collberg , Steven Kobes , Ben Smith , S. Trush , Gary V. Yee TetraTetris: A Study of Multi-User Touch-Based Interaction Using DiamondTouch. [Citation Graph (0, 0)][DBLP ] INTERACT, 2003, pp:- [Conf ] Kelly Heffner , Christian S. Collberg The Obfuscation Executive. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:428-440 [Conf ] Ginger Myles , Christian S. Collberg Detecting Software Theft via Whole Program Path Birthmarks. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:404-415 [Conf ] Christian S. Collberg Reverse Interpretation + Mutation Analysis = Automatic Retargeting. [Citation Graph (0, 0)][DBLP ] PLDI, 1997, pp:57-70 [Conf ] Christian S. Collberg , Edward Carter , Saumya K. Debray , Andrew Huntwork , John D. Kececioglu , Cullen Linn , Michael Stepp Dynamic path-based software watermarking. [Citation Graph (0, 0)][DBLP ] PLDI, 2004, pp:107-118 [Conf ] Christian S. Collberg Distributed High-Level Module Binding for Flexible Encapsulation and Fast Inter-Modular Optimization. [Citation Graph (0, 0)][DBLP ] Programming Languages and System Architectures, 1994, pp:282-297 [Conf ] Christian S. Collberg , Clark D. Thomborson Software Watermarking: Models and Dynamic Embeddings. [Citation Graph (0, 0)][DBLP ] POPL, 1999, pp:311-324 [Conf ] Christian S. Collberg , Clark D. Thomborson , Douglas Low Manufacturing Cheap, Resilient, and Stealthy Opaque Constructs. [Citation Graph (0, 0)][DBLP ] POPL, 1998, pp:184-196 [Conf ] Ginger Myles , Christian S. Collberg K-gram based software birthmarks. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:314-318 [Conf ] Christian S. Collberg , Stephen G. Kobourov , Suzanne Westbrook AlgoVista: an algorithmic search tool in an educational setting. [Citation Graph (0, 0)][DBLP ] SIGCSE, 2004, pp:462-466 [Conf ] Christian S. Collberg , Stephen G. Kobourov , Jasvir Nagra , Jacob Pitts , Kevin Wampler A System for Graph-Based Visualization of the Evolution of Software. [Citation Graph (0, 0)][DBLP ] SOFTVIS, 2003, pp:77-86 [Conf ] Christian S. Collberg , John H. Hartman , Sridivya Babu , Sharath K. Udupa SLINKY: Static Linking Reloaded. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2005, pp:309-322 [Conf ] Christian S. Collberg , Sean Davey , Todd A. Proebsting Language-Agnostic Program Rendering for Presentation, Debugging and Visualization. [Citation Graph (0, 0)][DBLP ] VL, 2000, pp:183-190 [Conf ] Richard T. Snodgrass , Shilong (Stanley) Yao , Christian S. Collberg Tamper Detection in Audit Logs. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:504-515 [Conf ] Christian S. Collberg , Stephen G. Kobourov , Edward Carter , Clark D. Thomborson Graph-Based Approaches to Software Watermarking. [Citation Graph (0, 0)][DBLP ] WG, 2003, pp:156-167 [Conf ] Christian S. Collberg , Stephen G. Kobourov Self-plagiarism in computer science. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2005, v:48, n:4, pp:88-94 [Journal ] Christian S. Collberg , Todd A. Proebsting Problem identification using program checking. [Citation Graph (0, 0)][DBLP ] Discrete Applied Mathematics, 2004, v:144, n:3, pp:270-280 [Journal ] Ginger Myles , Christian S. Collberg Software watermarking via opaque predicates: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2006, v:6, n:2, pp:155-171 [Journal ] Christian S. Collberg , Ginger Myles , Andrew Huntwork Sandmark--A Tool for Software Protection Research. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:40-49 [Journal ] Christian S. Collberg , Tapas Ranjan Sahoo Software watermarking in the frequency domain: Implementation, analysis, and attacks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:721-755 [Journal ] Ginger Myles , Christian S. Collberg , Zachary V. Heidepriem , Armand Navabi The evaluation of two software watermarking algorithms. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2005, v:35, n:10, pp:923-938 [Journal ] Christian S. Collberg Automatic derivation of compiler machine descriptions. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2002, v:24, n:4, pp:369-408 [Journal ] Christian S. Collberg , Clark D. Thomborson Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2002, v:28, n:8, pp:735-746 [Journal ] Christian S. Collberg , Clark D. Thomborson , Gregg M. Townsend Dynamic graph-based software fingerprinting. [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 2007, v:29, n:6, pp:- [Journal ] A semi-dynamic multiple watermarking schemefor java applications. [Citation Graph (, )][DBLP ] Barrier Slicing for Remote Software Trusting. [Citation Graph (, )][DBLP ] AlambdagoVista: a tool to enhance algorithm design and understanding. [Citation Graph (, )][DBLP ] Trading-off security and performance in barrier slicing for remote software entrusting. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs