||After flourishing development of IC design industry, the design industry has evolved into a keen competitive industrial environment. Related enterprises thus have to get away early hardware-oriented operation mode and combine software with hardware into operation -oriented mode instead. This application-oriented conception is widely adopted and becoming the mainstream of IC design industry. Such as: chip developers of TV and smart phone have devoted considerable resources to related application software development. Application software for production and marketing in turn have major influence on the success of product sales.|
Designers of chips require high frequency of teamwork code developing, retrieval and debugging. The process is then so vulnerable to plagiary or leakage. To prevent incidents of leakage or plagiary of program code, enterprises all enforce their application source code to be strictly regulated. A highly secured, convenient and strict discipline-regulated data exchange platform to meet enterprise needs is therefore essential.
In recent years, prevention of data leakage and distortion is a popular topic of enterprise information administration. The above concept is a mechanism that compares the similarity of document contents to detect and determine the risk level of security. In this study, we will apply the concept and implement an enterprise document exchange platform.
The study will utilize "Source code classification feature sampling" of "C" language integrated with weighted "Jaccard coefficient" and running the enterprise document exchange platform on FTP proxy.
鍾淑艷、林進村、謝宜芳,Thinking critically About Ethics(2006)
黃美珠,暗藏研發資料 另開新公司 科技新貴侵權 5人吃官司,自由電子報
Hsin-Yu Luo, Evaluation of Information Retrieval Based Models for
Recommendation of Pager Reviewers,(2008)
MSDN, mdq.Similarity (Transact-SQL)
Salton, G. and Buckley, C.Term-weighting approaches in automatic text
retrieval. Information Processing & Management 24(5): 513–523, 1988
Rabin, M. O., Fingerprinting by random Polynomails Center for
Research in Computing Technology,Harvard University, Report
Udi Manber,Finding similar files in a large file system In
Proceedings of the USENIX Winter 1994 Technical Conference,
 Salton, G.Wong, A. and C.S.Yang,A Vector Space Model for Automatic
 G. Salton and M. E. Lesk. Computer evaluation of indexing and text
processing.Journal of the ACM, 15(1):8-36, 1968.
 Dice, Lee R.Measures of the Amount of Ecologic Association Between
Species. Ecology 26 (3): 297–302. (1945).
 RFC 1321, section 3.4, Step 4. Process Message in 16-Word Blocks,
 Port Stemming(http://tartarus.org/~martin/PorterStemmer/)
 frox, a transparent ftp proxy(http://frox.sourceforge.net/)
 Trend Micro LeakProof 5.0