Patent application number | Description | Published |
20080270991 | Software tool for detecting plagiarism in computer source code - A method and system for detecting plagiarism of software source code. In one embodiment, a first set of arrays and a second set of arrays are created for a first program source code file and a second program source code file respectively. Each pair of arrays in the first and second sets has entries corresponding to program elements of a distinct program element type such as functional program code, program comments, or program code identifiers. Next, each pair of arrays from the first and second sets is compared to find similar entries, and an intermediate match score is calculated for each pair of arrays based on the similar entries. Further, the resulting intermediate match scores are combined to produce a combined match score, which is then used to provide an indication of copying with respect to the first program source code file and the second program source code file. | 10-30-2008 |
20130031573 | METHOD FOR ADVERTISERS TO SPONSOR BROADCASTS WITHOUT COMMERCIALS - A system and method that allows content to be broadcast without commercial interruption, yet lets the company or companies that sponsor the broadcast to offer advertisements and discounts and various special offers to the viewers at a later time. The amount of time a viewer spends watching a particular broadcast is recorded along with information about the sponsoring companies or organizations for the broadcast. The viewer later accesses a central database, which sends back to the viewer advertisements, coupons, discounts, contests, and other enticements to purchase products, based on the amount of time the viewer spent watching broadcasts or segments of broadcasts that were sponsored by the advertiser. | 01-31-2013 |
Patent application number | Description | Published |
20090089754 | Detecting Plagiarism In Computer Source Code - Plagiarism of software source code is a serious problem in two distinct areas of endeavor—cheating by students at schools and intellectual property theft at corporations. A number of algorithms have been implemented to check source code files for plagiarism, each with their strengths and weaknesses. This invention detects plagiarism by comparing statements within source code of a first program to comments within source code of a second program. | 04-02-2009 |
20100017777 | Method and apparatus for synthesizing a hardware system from a software - A method and an apparatus take software source code to synthesize a hardware platform for running the software. The method determines which processor is suitable for running the code and meeting the performance parameters determined by the user. The method also determines which hardware devices are accessed by software. If the hardware target is a semiconductor chip, the invention selects the appropriate IP and creates an HDL description of the chip. If the hardware target is a printed circuit board, the invention creates a schematic or netlist that includes the appropriate microprocessor, the various semiconductor chips, and the necessary interconnections. | 01-21-2010 |
20100114924 | Searching The Internet For Common Elements In A Document In Order To Detect Plagiarism - A method and system for detecting plagiarism of software source code is disclosed. In one embodiment, a database exists of program elements that have previously been found to be matching within the source code for two different programs. This embodiment searches the Internet for occurrences of these matching program elements to determine how many times they appear and thus whether they are commonly used or not. The elements and their associated number of hits are placed in a spreadsheet for further observation and manipulation. One of skill in the art will see that this invention also applies to other kinds of text documents. | 05-06-2010 |
20100325614 | DETECTING PLAGIARISM IN COMPUTER SOURCE CODE - Plagiarism is detected by comparing statements within source code of a first program to comments within source code of a second program. | 12-23-2010 |
20110125479 | USE OF HARDWARE PERIPHERAL DEVICES WITH SOFTWARE SIMULATIONS - A system and method is described for connecting a logic circuit simulation to a hardware peripheral that includes a computer running software for communicating data to and from the hardware peripheral. The software transmits the data received from the hardware peripheral to the device being simulated by the logic circuit simulation. The computer also transmits the data received from the device being simulated by the electronic circuit simulation to the hardware peripheral. This allows the user to test the device being simulated using real hardware for input and output instead of simulated hardware. | 05-26-2011 |
20120245916 | CONVEYING DATA FROM A HARDWARE DEVICE TO A CIRCUIT SIMULATION - A system and method is described for connecting a logic circuit simulation to a hardware peripheral that includes a computer running software for communicating data to and from the hardware peripheral. The software transmits the data received from the hardware peripheral to the device being simulated by the logic circuit simulation. The computer also transmits the data received from the device being simulated by the electronic circuit simulation to the hardware peripheral. This allows the user to test the device being simulated using real hardware for input and output instead of simulated hardware. | 09-27-2012 |
20130211812 | CONVEYING DATA FROM A HARDWARE DEVICE TO A CIRCUIT SIMULATION - system and method is described for connecting a logic circuit simulation to a hardware peripheral that includes a computer running software for communicating data to and from the hardware peripheral. The software transmits the data received from the hardware peripheral to the device being simulated by the logic circuit simulation. The computer also transmits the data received from the device being simulated by the electronic circuit simulation to the hardware peripheral. This allows the user to test the device being simulated using real hardware for input and output instead of simulated hardware. | 08-15-2013 |