Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A plagiarism detection system

Published: 01 February 1981 Publication History

Abstract

The problem of plagiarism in programming assignments by students in computer science courses has caused considerable concern among both faculty and students. There are a number of methods which instructors use in an effort to control the plagiarism problem. In this paper we describe a plagiarism detection system which was recently implemented in our department. This system is being used to detect similarities in student programs.

References

[1]
Shaw, M., Jones, A., Kneuven, P., McDermott, J., Miller, P., and Notkin, D., "Cheating Policy in a Computer Science Department," ACM SIGCSE Bulletin 12, 2 (July, 1980), 72-76.]]
[2]
Ottenstein, K.J., "An Algorithmic Approach to the Detection and Prevention of Plagiarism", CSD-TR 200, Purdue University (August, 1976).]]
[3]
Robinson, S. and Soffa, M., "An Instructional Aid for Student Programs", ACM SIGCSE Bulletin 12, 1 (February, 1980), 118-127.]]

Cited By

View all
  • (2024)A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settingsFrontiers in Computer Science10.3389/fcomp.2024.13937236Online publication date: 13-Jun-2024
  • (2024)VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation LearningACM Transactions on Privacy and Security10.1145/366990127:3(1-37)Online publication date: 20-Jul-2024
  • (2024)Poisoning medical knowledge using large language modelsNature Machine Intelligence10.1038/s42256-024-00899-3Online publication date: 20-Sep-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCSE Bulletin
ACM SIGCSE Bulletin  Volume 13, Issue 1
Proceedings of the 12th SIGCSE symposium on Computer science education
February 1981
265 pages
ISSN:0097-8418
DOI:10.1145/953049
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 1981
Published in SIGCSE Volume 13, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)257
  • Downloads (Last 6 weeks)38
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Support Vector Machine based approach for plagiarism detection in Python code submissions in undergraduate settingsFrontiers in Computer Science10.3389/fcomp.2024.13937236Online publication date: 13-Jun-2024
  • (2024)VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation LearningACM Transactions on Privacy and Security10.1145/366990127:3(1-37)Online publication date: 20-Jul-2024
  • (2024)Poisoning medical knowledge using large language modelsNature Machine Intelligence10.1038/s42256-024-00899-3Online publication date: 20-Sep-2024
  • (2023)SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship VerificationIEEE Transactions on Software Engineering10.1109/TSE.2022.317722849:4(1426-1442)Online publication date: 1-Apr-2023
  • (2023)Dataset Characteristics for Reliable Code Authorship AttributionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313870020:1(506-521)Online publication date: 1-Jan-2023
  • (2022)The Robots Are Coming: Exploring the Implications of OpenAI Codex on Introductory ProgrammingProceedings of the 24th Australasian Computing Education Conference10.1145/3511861.3511863(10-19)Online publication date: 14-Feb-2022
  • (2021)Optimization to the RescueProceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks10.1145/3465413.3488574(1-10)Online publication date: 19-Nov-2021
  • (2020)LCCSSProceedings of the 14th Brazilian Symposium on Software Components, Architectures, and Reuse10.1145/3425269.3425283(91-100)Online publication date: 19-Oct-2020
  • (2019)Source-code Similarity Detection and Detection Tools Used in AcademiaACM Transactions on Computing Education10.1145/331329019:3(1-37)Online publication date: 21-May-2019
  • (2018)Calibration of source-code similarity detection tools for objective comparisons2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)10.23919/MIPRO.2018.8400147(0794-0799)Online publication date: May-2018
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media