摘要(英) |
After flourishing development of IC design industry, the design industry has evolved into a keen competitive industrial environment. Related enterprises thus have to get away early hardware-oriented operation mode and combine software with hardware into operation -oriented mode instead. This application-oriented conception is widely adopted and becoming the mainstream of IC design industry. Such as: chip developers of TV and smart phone have devoted considerable resources to related application software development. Application software for production and marketing in turn have major influence on the success of product sales.
Designers of chips require high frequency of teamwork code developing, retrieval and debugging. The process is then so vulnerable to plagiary or leakage. To prevent incidents of leakage or plagiary of program code, enterprises all enforce their application source code to be strictly regulated. A highly secured, convenient and strict discipline-regulated data exchange platform to meet enterprise needs is therefore essential.
In recent years, prevention of data leakage and distortion is a popular topic of enterprise information administration. The above concept is a mechanism that compares the similarity of document contents to detect and determine the risk level of security. In this study, we will apply the concept and implement an enterprise document exchange platform.
The study will utilize "Source code classification feature sampling" of "C" language integrated with weighted "Jaccard coefficient" and running the enterprise document exchange platform on FTP proxy.
|
參考文獻 |
中文文獻
[1]鍾淑艷、林進村、謝宜芳,Thinking critically About Ethics(2006)
[2]劉江彬,評威盛VS友訊商業機密的爭議,智慧財產電子報第九期(2003)
[3]黃美珠,暗藏研發資料 另開新公司 科技新貴侵權 5人吃官司,自由電子報
(2005)
[4]Hsin-Yu Luo, Evaluation of Information Retrieval Based Models for
Recommendation of Pager Reviewers,(2008)
[5]陳仕達,C程式碼比對分類(2004)
[6]殷書庸,依據強相似度為基礎之數位權利管理(2004)
[7]陳治宸,植基於個人郵件之雙層垃圾郵件過濾方法(2007)
[8]王超亮,領域本體論為基之網頁知識擷取機制設計(1996)
[9]陳彥霖,應用潛在語意分析於試題相似度比較之可行性(2006)
[10]MSDN, mdq.Similarity (Transact-SQL)
http://msdn.microsoft.com/zh-tw/library/ee633878(v=sql.105).aspx
英文文獻
[11]Salton, G. and Buckley, C.Term-weighting approaches in automatic text
retrieval. Information Processing & Management 24(5): 513–523, 1988
[12]Rabin, M. O., Fingerprinting by random Polynomails Center for
Research in Computing Technology,Harvard University, Report
TR-15-81,1981
[13]Udi Manber,Finding similar files in a large file system In
Proceedings of the USENIX Winter 1994 Technical Conference,
1994,pp.1-10
[14] Salton, G.Wong, A. and C.S.Yang,A Vector Space Model for Automatic
Indexing (1975)
[15] G. Salton and M. E. Lesk. Computer evaluation of indexing and text
processing.Journal of the ACM, 15(1):8-36, 1968.
[16] Dice, Lee R.Measures of the Amount of Ecologic Association Between
Species. Ecology 26 (3): 297–302. (1945).
[17] RFC 1321, section 3.4, Step 4. Process Message in 16-Word Blocks,
page 5.
[18] Port Stemming(http://tartarus.org/~martin/PorterStemmer/)
[19] frox, a transparent ftp proxy(http://frox.sourceforge.net/)
[20] Parse-RecDescent
(http://search.cpan.org/~jtbraun/Parse-RecDescent-1.967009/)
[21] Lingua-EN-Segmenter
(http://search.cpan.org/~splice/Lingua-EN-Segmenter-0.1/lib/Lingua/EN/StopWords.pm)
[22] Perlindex
(http://search.cpan.org/~ulpfr/perlindex-1.302/lib/Text/English.pm)
[23] Trend Micro LeakProof 5.0
(http://br.trendmicro.com/imperia/md/content/us/pdf/products/ente
rprise/leakproof/leakproof_datasheet.pdf)
|