A Token-based Illicit Copy Detection Method Using Complexity for a Program Exercise
The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous...
Saved in:
Published in | 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications pp. 575 - 580 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English Japanese |
Published |
IEEE
01.10.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The conducts to copy using other person's source codes and submit as reports are regarded as a problem for program exercises of programming subjects in universities or colleges. An automatic detection algorithm to detect illicit copies is required in these educational organizations. In previous researches, these methods based on the detection standard of the token length have been proposed. These methods use the threshold simply using the character length. In these cases, miss detections occur in the case of the simple program such as the sequence of the print statement or the case that token sequences appear in the middle of a statement. This paper proposes the detection method using the program complexity and the complete token sequence. As the results of experiments, our method can improve the recall R adopting the complexity as the detection standard and the precision P adopting the complete token sequence for exercise programs submitted by students. |
---|---|
DOI: | 10.1109/BWCCA.2013.100 |