A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise

Broadband and Wireless Computing, Communication and Applications(2013)

引用 3|浏览0
暂无评分
摘要
The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall R adopting the complexity as the detection standard and the precision P adopting the complete token sequence for exercise programs submitted by students.
更多
查看译文
关键词
complete token sequence,detection method,automatic detection algorithm,program exercise,program complexity,token sequence,token-based illicit copy detection,character length,simple program,token length,exercise program,detection standard,programming,software metrics
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要