A Token-based Illicit Copy Detection Method using Complexity for a Program Exercise

被引:1
|
作者
Iwamoto, Mai [1 ]
Oshima, Shunsuke [2 ]
Nakashima, Takuo [3 ]
机构
[1] Kumamoto Natl Coll Technol, Ctr Tech & Educ Support, 2,627 Hirayama Shinmachi, Yatsushiro, Kumamoto 8668501, Japan
[2] Kumamoto Natl Coll Technol, ICT Ctr Learning Support, Yatsushiro, Kumamoto 8668501, Japan
[3] Tokai Univ, Dept Electron Engn & Comp Sci, Kumamoto 862, Japan
关键词
copy detection; code clone; programming exercise; token-based; complexity;
D O I
10.1109/BWCCA.2013.100
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall.. adopting the complexity as the detection standard and the precision.. adopting the complete token sequence for exercise programs submitted by students.
引用
收藏
页码:575 / 580
页数:6
相关论文
共 50 条
  • [21] Metadata Discovery of Heterogeneous Biomedical Datasets Using Token-Based Features
    Wen, Jingran
    Gouripeddi, Ramkiran
    Facelli, Julio C.
    IT CONVERGENCE AND SECURITY 2017, VOL 1, 2018, 449 : 60 - 67
  • [22] Token-based Approach for Real-time Plagiarism Detection in Digital Designs
    Wan, Han
    Liu, Kangxu
    Gao, Xiaopeng
    2018 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2018,
  • [23] Blockchain Token-Based Wild-Simulated Ginseng Quality Management Method
    Sung, Youngjun
    Yu, Sunghyun
    Won, Yoojae
    SENSORS, 2022, 22 (14)
  • [24] Inter-provider AAA and billing of VoIP users with token-based method
    Polito, Silvana Greco
    Schulzrinne, Henning
    Forte, Andrea
    2007 FIRST INTERNATIONAL GLOBAL INFORMATION INFRASTRUCTURE SYMPOSIUM, 2007, : 159 - +
  • [25] Improving Quality of Code Review Datasets - Token-Based Feature Extraction Method
    Staron, Miroslaw
    Meding, Wilhelm
    Soder, Ola
    Ochodek, Miroslaw
    SOFTWARE QUALITY: FUTURE PERSPECTIVES ON SOFTWARE ENGINEERING QUALITY, SWQD 2021, 2021, 404 : 81 - 93
  • [26] Efficient token circulation strategies against misers in device-to-device relay using token-based incentive mechanisms
    Wang, You-Chiun
    Chang, Fu-Chun
    IET COMMUNICATIONS, 2022, 16 (06) : 710 - 724
  • [27] A fault-tolerant token-based mutual exclusion algorithm using a dynamic tree
    Sopena, J
    Arantes, L
    Bertier, M
    Sens, P
    EURO-PAR 2005 PARALLEL PROCESSING, PROCEEDINGS, 2005, 3648 : 654 - 663
  • [28] CCFinder: A multilinguistic token-based code clone detection system for large scale source code
    Kamiya, T
    Kusumoto, S
    Inoue, K
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (07) : 654 - 670
  • [29] Male pelvic multi-organ segmentation using token-based transformer Vnet
    Pan, Shaoyan
    Lei, Yang
    Wang, Tonghe
    Wynne, Jacob
    Chang, Chih-Wei
    Roper, Justin
    Jani, Ashesh B.
    Patel, Pretesh
    Bradley, Jeffrey D.
    Liu, Tian
    Yang, Xiaofeng
    PHYSICS IN MEDICINE AND BIOLOGY, 2022, 67 (20):
  • [30] Optimization customized token-based production control systems using cross-entropy
    Gonzalez-R, Pedro L.
    Framinan, Jose M.
    Dopfer, Andreas
    Ruiz-Usano, Rafael
    DIGITAL ENTERPRISE TECHNOLOGY: PERSPECTIVES AND FUTURE CHALLENGES, 2007, : 123 - +