|
[1] Z. Durić and D. Gašević, “A Source Code Similarity System for Plagiarism Detection,” The Computer Journal, 2012. [2] L. Prechelt, G. Malpohl and M. Philippsen, “Finding plagiarisms among a set of programs with JPlag,” Journal of Universal Computer Science, 8(11): 1016-1038, 2002. [3] A. Ahtiainen, S. Surakka and M. Rahikainen, “Plaggie: Gnu-licensed source code plagiarism detection engine for java exercises,” In Baltic Sea ’06: Proceedings of the 6th Baltic Sea conference on Computing education research, pp. 141–142, 2006. [4] E. Flores, A. Barron-Cedeno, P. Rosso and L. Moreno, “Towards the Detection of Cross-Language Source Code Reuse,” Natural language processing and information systems lecture notes in computer science, 6716: 250-253, 2011. [5] T.W.S. Chow and M.K.M. Rahman, “Multilayer SOM With Tree-Structured Data for Efficient Document Retrieval and Plagiarism Detection,” IEEE Transactions on Neural Networks, 20: 1385-1402, 2009. [6] J. Hage, “Programmeer plagiaatdetectie met marble,” Technical Report UU-CS-2006-062, Department of Information and Computing Sciences, Utrecht University, 2006. [7] G. Canfora, A. Cimitile, U. De Carlini and A. De Lucia, “An Extensible System for Source Code Analysis,” IEEE Transactions on Software Engineering, 24(9): 721-740, 1998. [8] X. Chen, B. Francia and M. Li, “Shared Information and Program Plagiarism Detection,” IEEE Transactions on Information Theory, vol. 50, pp. 1545-1551, 2004. [9] H. Jiang and Z. Jiang , “The Study of Plagiarism Detection for Program Code, “ Advances In Computer Science And Education Applications Communications in Computer and Information Science, 202: 128-133, 2011. [10] Z.A. Al-Khanjari, J. A. Fiaidhi, R. A. Al-Hinai and N. S. Kutt, “PlagDetect: a Java programming plagiarism detection tool,” ACM Inroads, vol. 1, pp.66-71, 2010. [11] D. Grune and M. Huntjens, “Sim,” Available from: http://www.cs.vu.nl/~dick/sim.html. [12] A. Aiken et al, “Moss,” http://theory.stanford.edu/~aiken/moss/. [13] S. Schleimer, D. S. Wilkerson and A. Aiken, “Winnowing: Local Algorithms for Document Fingerprinting”, Proceedings of the 2003 ACM SIGMOD international conference on Management of Data, June 2003. [14] J. L. Donaldson, A. Lancaster and P. H. Sposato, “A Plagiarism Detection System,” Proceedings of the twelfth SIGCSE technical symposium on Computer science education, 1981. [15] M. H Halstead, “Elements of Software Science (Operating and programming systems series),” Elsevier Science Inc, New York, USA, 1977. [16] Longman Dictionary of Contemporary English. Longman, Harlow, Essex, new edition, 1987. [17] Dictionary.com, Available from: http://dictionary.reference.com/. [18] J. A. McCart and J. Jarman, “A Technological Tool to Detect Plagiarized Projects in Microsoft Access,” IEEE Transactions on Education, 51(2): 166-174, 2008. [19] J. Y. Kuo and F. C. Huang, “Code analyzer for an online course management system,” Journal of Systems and Software, 83(12): 2478-2486, 2010. [20] D. Gitchell and N. Tran, “A utility for detecting similarity in computer programs”, In Proceedings of the 30th ACM Special Interest Group on Computer Science Education Technology Symposium, New Orleans, LA, pp. 266-270, 1998. [21] M. J. WISE, “String Similarity via Greedy String Tiling and Running Karp-Rabin Matching,” Online Preprint, Dec. 1993. Available from: http://vernix.org/marcel/share/RKR_GST.ps. [22] J. Hage, P. Rademaker and N. van Vugt, “Plagiarism detection for Java: a tool comparison,” In: Computer Science Education Research Conference, pp. 33–46, 2011. [23] C. Daly and J. Horgan. Patterns of plagiarism. In W. Dann, T. L. Naps, P. T. Tymann, and D. Baldwin, editors, Proc. of the 36th SIGCSE Technical Symposium on Computer Science Education (SIGCSE 2005), pages 383–387. ACM, 2005. [24] M. Li and P. Vit’anyi, “An introduction to Kolmogorov complexity and its applications,” 2nd Ed., Springer, New York, 1997. [25] Ziv and A. Lempel, “A universal algorithm for sequential data compression,” IEEE Trans. Inform Theory, vol. IT-23, pp. 337-343, 1977. [26] A. Cimitile and U. De Carlini, “Reverse Engineering. Algorithms for Program Graph Production,” Software—Practice and Experience, vol. 21, no. 5, pp. 519–537, 1991. [27] G. Whale, “YAP3: Improved detection of similarities in computer program and other texts,” in Proceedings 27th SCGCSE Technology Symposium, Philadelphia, PA, pp. 130-134, 1996. [28] H. Ding and M. Samadzadeh, “Extraction of Java program fingerprints for software authorship identification,” The Journal of Systems and Software, 72(1):49-57, 2004. [29] K. Ottenstein, “An algorithmic approach to the detection and prevention of plagiarism,” SIGCSE Bull., vol. 8, no. 4, pp. 30-41, 1977. [30] G. Whale, “Identification of program similarity in large populations,” Computer Journals, vol. 33, no. 2, pp. 140-146, 1990. [31] W. Wong, S. Gokhale, “Static and dynamic distance metrics for feature-based code analysis,” The Journal of Systems and Software, Vol. 74, pp. 283-295, 2005. [32] P. A. Brusilovsky, “Hypermedia user Modeling and User Adapted Interaction,” Ten Year Anniversary Issue (Alfred Kobsa, ed.) 11 (1/2), pages 87-110, 2001. [33] J. Y. Kuo and L. Chu, “Intelligent Code Analyzer for Online Course Management System,” Proceedings of the 3rd ACIS International Conference on Software Engineering Research, Management & Applications. Michigan, U.S.A, 2005. [34] G. Cosma, “An approach to source-code plagiarism detection and investigation using latent semantic analysis,” Ph.D. Thesis, University of Warwick, Department of Computer Science, 2008. [35] WinMerge, Available from: http://winmerge.org/ [36] C. Gladisch, “How C differs from Java for symbolic program execution,” In Hendrik Tews, editor, Proceedings, C/C++ Verification Workshop, Oxford, United Kingdom, Oxford, United Kingdom, July 2007. [37] P. Bothner, “Java/C++ integration - writing native Java methods in natural C++,” November 1997. [38] L. Bloomfield, WCopyfind 4.1.1, Available from: http://plagiarism.phys.virginia.edu/
|