- Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
January 12, 2015 System for designing and creating computer programs using finite state machines
The methods commonly used to develop computer software are very difficult, time consuming and error prone. Many software projects are canceled due to cost and time overruns. It is common for projects to fail to deliver all of the anticipated benefits.
database software development Computer Programming Object Oriented Programming Transaction Processing Finite State Machine Publish and Subscribe Internet of Things Eclipse Rich Client Plugin RCP
October 20, 2014 Discovering Code Cloning in Software Source Code by Fingerprinting
This document describes a simple code clone detection method that extracts string constants and other idenfitiers (function names, method names, variable names, etc.) from source code and compares these identifiers to a knowledgebase with identifiers extracted from publicly available open source software with the aim of finding copied code.
Linux FreeBSD Unix software software development *BSD Android Java open source code clone detection
April 07, 2014 Discovering, verifying and visualizing dependencies between dynamically linked software components for researching build configuration, open source license compliance and security
The method in this document describes how these dependencies can be found for binaries that use the ELF format (Executable and Linking Format), which is the binary format used on the Unix(-like) systems mentioned before.
security visualization Linux FreeBSD BSD Unix QNX Solaris ELF software software development dynamic linking open source license compliance defect discovery reverse engineering