Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 2 dokumen yang sesuai dengan query
cover
"This research focuses on finding influence of Neutralization Technique element such as Denial of Responsibility, Denial of Injury, Denial of Victim, Condemnation of Condemner, Appeal to a Higher Loyalties, Metaphor of The Ledger, Claim of Normalcy, Denial of Negative Intent, and Claim of Relative Acceptability toward the use of pirated software in collage. These quantitative explanative research use method of survey as its data collecting method. The result of this research show correlation and influence of Denial of Responsibility, Denial of Injury, dan Appeal to a Higher Loyalties toward the use of pirated software in collage. There are correlations but no influence between Condemnation of Condemner dan Denial of Negative Intent toward the use of pirated software. Finally, there are no correlation and influence between Denial of Victim, Metaphor of Ledger, Claim of Normalcy, dan Claim of Relative Acceptability toward the use of pirated sofware in college."
Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2010
pdf
Artikel Jurnal  Universitas Indonesia Library
cover
Cesare, Silvio
"Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book."
London: Springer, 2012
e20407717
eBooks  Universitas Indonesia Library