Defensive Publications are a method for the open source community to prevent the issuance of low quality software
patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the
technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are
effective in protecting the freedom to create, invent and operate.
January 12, 2015
System for designing and creating computer programs using finite state machines
The methods commonly used to develop computer software are very difficult, time consuming and error prone. Many software projects are canceled due to cost and time overruns. It is common for projects to fail to deliver all of the anticipated benefits.
Object Oriented Programming
Finite State Machine
Publish and Subscribe
Internet of Things
Eclipse Rich Client Plugin RCP
October 20, 2014
Discovering Code Cloning in Software Source Code by Fingerprinting
This document describes a simple code clone detection method that extracts string constants and other idenfitiers (function names, method names, variable names, etc.) from source code and compares these identifiers to a knowledgebase with identifiers extracted from publicly available open source software with the aim of finding copied code.
code clone detection
April 07, 2014
Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before.
open source license compliance