Citation: | Li Hu, Liu Chao, Liu Nan, et al. Method and its system of Java source and byte code plagiarism detection[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(4): 424-428. (in Chinese) |
[1] Matthias R.Effective clone detection without language barriers .Switzerland:Institut fur Informatik und angewandte Mathematik,Bern University,2005 [2] Verco K L,Wise M J.Software for detecting suspected plagiarism: comparing structure and attribute counting systems //John R.Proceedings of 1st Australian Conference on Computer Science Education.New York:ACM,1996:81-88 [3] Baker B S,Manber U.Deducing similarities in Java sources from byte codes //Douglis F.Proceedings of Usenix Annual Technical Conference.Louisiana: USENIX,1998 [4] Tamada H,Nakamura M,Monden A.Design and evaluation of birthmarks for detecting theft of Java programs //Proceedings of the IASTED International Conference on Software Engineering.Innsbruck:IASTED,2004:569-574 [5] Parker A,Hamblen J.Computer algorithms for plagiarism detection[J].IEEE Transactions on Education,1989,32(2): 94-99 [6] Faidhi J A,Robinson S K.An empirical approach for detecting program similarity and plagiarism within a university programming environment[J].Computers and Education,1987,11(1):11-19 [7] Simian:Similarity analyser .Australia:Redhill Consulting LTD,2008 .
|