Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1999747.1999789acmconferencesArticle/Chapter ViewAbstractPublication PagesiticseConference Proceedingsconference-collections
research-article

CoMoTo: the collaboration modeling toolkit

Published: 27 June 2011 Publication History

Abstract

We are excited to introduce CoMoTo -- the Collaboration Modeling Toolkit -- a new, web-based application that expands and enhances well-known software similarity detection systems. CoMoTo is an end-to-end data management, analysis, and visualization system whose purpose is to assist instructors of courses requiring programming exercises to monitor and investigate the extent of student collaboration, both allowed and illicit. We describe CoMoTo's interface, which was designed to facilitate scrutiny of collaboration data projected along student, course, assignment, etc. attributes, and to allow for interactive visualization of pairwise similarity measures via a dynamic graph. We also elaborate on the details of CoMoTo's implementation. Finally, we briefly discuss two use cases that foreshadow CoMoTo's broad utility in student code analysis, not only for plagiarism detection, but also for investigating early student coding styles, and for evaluating software similarity detection systems, themselves.

References

[1]
B. W. Kernighan and R. Pike. The Practice of Programming. Addison-Wesley Inc, 1999.
[2]
matplotlib. http://matplotlib.sourceforge.net/.
[3]
MySQL. http://www.mysql.com/.
[4]
L. Prechelt, G. Malpohl, and M. Philippsen. Finding plagiarisms among a set of programs with jplag. 8(11):1016--1038, 2002.
[5]
L. Prechelt, G. Malpohl, and M. Phlippsen. Jplag: Finding plagiarisms among a set of programs. Technical report, 2000.
[6]
Pygments. http://pygments.org/.
[7]
pygraphviz. http://networkx.lanl.gov/pygraphviz/.
[8]
Pylons. http://pylonshq.com/.
[9]
pysvn. http://pysvn.tigris.org/.
[10]
python ldap. http://www.python-ldap.org/.
[11]
C. K. Roy and J. R. Cordy. A survey on software clone detection research. SCHOOL OF COMPUTING TR 2007-541, QUEEN'S UNIVERSITY, 115, 2007.
[12]
S. Schleimer. Winnowing: Local algorithms for document fingerprinting. In Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data 2003, pages 76--85. ACM Press, 2003.
[13]
Subversion. http://subversion.apache.org/.
[14]
M. J. Wise. Detection of similarities in student programs: Yaping may be preferable to plagueing. In SIGCSE '92: Proceedings of the twenty-third SIGCSE technical symposium on Computer science education, pages 268--271, New York, NY, USA, 1992. ACM.
[15]
M. J. Wise. Yap3: Improved detection of similarities in computer program and other texts. In SIGCSEB: SIGCSE Bulletin (ACM Special Interest Group on Computer Science Education, pages 130--134. ACM Press, 1996.

Cited By

View all
  • (2019)Plagiarism in Programming AssessmentsACM Transactions on Computing Education10.1145/337115620:1(1-28)Online publication date: 9-Dec-2019
  • (2019)Source-code Similarity Detection and Detection Tools Used in AcademiaACM Transactions on Computing Education10.1145/331329019:3(1-37)Online publication date: 21-May-2019
  • (2012)Instructor-centric source code plagiarism detection and plagiarism corpusProceedings of the 17th ACM annual conference on Innovation and technology in computer science education10.1145/2325296.2325328(122-127)Online publication date: 3-Jul-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ITiCSE '11: Proceedings of the 16th annual joint conference on Innovation and technology in computer science education
June 2011
418 pages
ISBN:9781450306973
DOI:10.1145/1999747
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. pedagogy
  2. program similarity

Qualifiers

  • Research-article

Conference

ITiCSE '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 552 of 1,613 submissions, 34%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Plagiarism in Programming AssessmentsACM Transactions on Computing Education10.1145/337115620:1(1-28)Online publication date: 9-Dec-2019
  • (2019)Source-code Similarity Detection and Detection Tools Used in AcademiaACM Transactions on Computing Education10.1145/331329019:3(1-37)Online publication date: 21-May-2019
  • (2012)Instructor-centric source code plagiarism detection and plagiarism corpusProceedings of the 17th ACM annual conference on Innovation and technology in computer science education10.1145/2325296.2325328(122-127)Online publication date: 3-Jul-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media