cs0703136/main.bbl
1: \begin{thebibliography}{}
2: 
3: \bibitem[\protect\citeauthoryear{Aiken}{Aiken}{2008}]{Aiken2008}
4: {\sc Aiken, A.} 2008.
5: \newblock Personal communication.
6: 
7: \bibitem[\protect\citeauthoryear{Aiken et~al\mbox{.}}{Aiken
8:   et~al\mbox{.}}{2005}]{MOSS}
9: {\sc Aiken, A.} {\sc et~al\mbox{.}} 2005.
10: \newblock {Moss: A system for detecting software plagiarism}.
11: \newblock http://www.cs.berkeley.edu/\~{ }aiken/moss.html.
12: 
13: \bibitem[\protect\citeauthoryear{Baeza-Yates and Ribeiro-Neto}{Baeza-Yates and
14:   Ribeiro-Neto}{1999}]{baezayates99modern}
15: {\sc Baeza-Yates, R.~A.} {\sc and} {\sc Ribeiro-Neto, B.~A.} 1999.
16: \newblock {\em Modern Information Retrieval}.
17: \newblock ACM Press / Addison-Wesley.
18: 
19: \bibitem[\protect\citeauthoryear{Braumoeller and Gaines}{Braumoeller and
20:   Gaines}{2002}]{Braumoeller}
21: {\sc Braumoeller, B.} {\sc and} {\sc Gaines, B.} 2002.
22: \newblock {Actions Do Speak Louder than Words: Deterring Plagiarism with the
23:   Use of Plagiarism-Detection Software}.
24: \newblock {\em PS: Political Science and Politics\/}~{\em 34,\/}~04, 835--839.
25: 
26: \bibitem[\protect\citeauthoryear{Cebri{\'a}n, Alfonseca, and
27:   Ortega}{Cebri{\'a}n et~al\mbox{.}}{}]{cebrian08}
28: {\sc Cebri{\'a}n, M.}, {\sc Alfonseca, M.}, {\sc and} {\sc Ortega, A.}
29: \newblock Towards the validation of plagiarism detection tools by means of
30:   grammar evolution.
31: \newblock {\em IEEE Transactions on Evolutionary Computation. In press\/}.
32: 
33: \bibitem[\protect\citeauthoryear{Chen, Francia, Li, McKinnon, and Seker}{Chen
34:   et~al\mbox{.}}{2004}]{SID}
35: {\sc Chen, X.}, {\sc Francia, B.}, {\sc Li, M.}, {\sc McKinnon, B.}, {\sc and}
36:   {\sc Seker, A.} 2004.
37: \newblock {Shared information and program plagiarism detection}.
38: \newblock {\em Information Theory, IEEE Transactions on\/}~{\em 50,\/}~7,
39:   1545--1551.
40: 
41: \bibitem[\protect\citeauthoryear{Clare}{Clare}{2000}]{clare2000cpt}
42: {\sc Clare, J.} 2000.
43: \newblock {Computer plagiarism ``threatens the value of degrees''}.
44: \newblock {\em Daily Telegraph\/}~{\em 3,\/}~7, 2000.
45: 
46: \bibitem[\protect\citeauthoryear{Culwin, MacLeod, and Lancaster}{Culwin
47:   et~al\mbox{.}}{2001}]{culwin2001scp}
48: {\sc Culwin, F.}, {\sc MacLeod, A.}, {\sc and} {\sc Lancaster, T.} 2001.
49: \newblock {Source Code Plagiarism in UK HE Computing Schools, Issues, Attitudes
50:   and Tools}.
51: \newblock Tech. Rep. Technical Report SBUCISM-01-02, South Bank University.
52: 
53: \bibitem[\protect\citeauthoryear{Culwin and Naylor}{Culwin and
54:   Naylor}{1995}]{culwin1995pap}
55: {\sc Culwin, F.} {\sc and} {\sc Naylor, J.} 1995.
56: \newblock {Pragmatic Anti-Plagiarism}.
57: \newblock In {\em Third Conference on the Teaching of Computing}. DCU Dublin.
58: 
59: \bibitem[\protect\citeauthoryear{Cunningham and Mikoyan}{Cunningham and
60:   Mikoyan}{1993}]{cunningham1993uct}
61: {\sc Cunningham, P.} {\sc and} {\sc Mikoyan, A.} 1993.
62: \newblock {\em {Using CBR Techniques to Detect Plagiarism in Computing
63:   Assignments}}.
64: \newblock Trinity College, Dept. of Computer Science.
65: 
66: \bibitem[\protect\citeauthoryear{Freire}{Freire}{2007}]{clover}
67: {\sc Freire, M.} 2007.
68: \newblock An approach to the visualization of adaptive hypermedia structures
69:   and other small-world networks based on hierarchically clustered graphs.
70: \newblock Ph.D. thesis, Escuela Polit{\'e}cnica Superior, Universidad
71:   Aut{\'o}noma de Madrid.
72: 
73: \bibitem[\protect\citeauthoryear{Freire}{Freire}{2008}]{freire-avi08}
74: {\sc Freire, M.} 2008.
75: \newblock Visualizing program similarity in the {AC} plagiarism detection
76:   system.
77: \newblock In {\em Proceedings of Advanced Visual Interfaces (AVI)}. ACM Press,
78:   New York, NY, USA, 404--407.
79: 
80: \bibitem[\protect\citeauthoryear{Freire and Cebri{\'a}n}{Freire and
81:   Cebri{\'a}n}{2008}]{ac-whitepaper-08}
82: {\sc Freire, M.} {\sc and} {\sc Cebri{\'a}n, M.} 2008.
83: \newblock Design of the ac academic plagiarism detection system.
84: \newblock Tech. rep., Escuela Polit{\'e}cnica Superior, Universidad
85:   Aut{\'o}noma de Madrid, Madrid, Spain. Nov.
86: 
87: \bibitem[\protect\citeauthoryear{Grune and Vakgroep}{Grune and
88:   Vakgroep}{1989}]{SIM}
89: {\sc Grune, D.} {\sc and} {\sc Vakgroep, M.} 1989.
90: \newblock {Detecting copied submissions in computer science workshops}.
91: \newblock Tech. rep., Informatica Faculteit Wiskunde \& Informatica, Vrije
92:   Universiteit.
93: 
94: \bibitem[\protect\citeauthoryear{Hampel}{Hampel}{1985}]{hampel1985bpm}
95: {\sc Hampel, F.} 1985.
96: \newblock {The Breakdown Points of the Mean Combined with Some Rejection
97:   Rules}.
98: \newblock {\em Technometrics\/}~{\em 27,\/}~2, 95--107.
99: 
100: \bibitem[\protect\citeauthoryear{Harris}{Harris}{1994}]{harris1994pcs}
101: {\sc Harris, J.} 1994.
102: \newblock {Plagiarism in computer science courses}.
103: \newblock In {\em Proceedings of the conference on Ethics in the computer age}.
104:   ACM Press New York, NY, USA, 133--135.
105: 
106: \bibitem[\protect\citeauthoryear{Irving}{Irving}{2000}]{irving2000pde}
107: {\sc Irving, R.} 2000.
108: \newblock {Plagiarism Detection: Experiences and Issues}.
109: \newblock In {\em JISC Fifth Information Strategies Conference, Focus on Access
110:   and Security}.
111: 
112: \bibitem[\protect\citeauthoryear{Jones}{Jones}{2001}]{jones2001mbp}
113: {\sc Jones, E.} 2001.
114: \newblock {Metrics based plagiarism monitoring}.
115: \newblock In {\em Proceedings of the Sixth Annual CCSC Northeastern
116:   Conference}. 1--8.
117: 
118: \bibitem[\protect\citeauthoryear{Joy}{Joy}{2008}]{Joy2008}
119: {\sc Joy, M.} 2008.
120: \newblock Personal communication.
121: 
122: \bibitem[\protect\citeauthoryear{Joy and Luck}{Joy and Luck}{1999}]{joy1999ppa}
123: {\sc Joy, M.} {\sc and} {\sc Luck, M.} 1999.
124: \newblock {Plagiarism in Programming Assignments}.
125: \newblock {\em IEEE Transactions on Education\/}~{\em 42,\/}~2, 129.
126: 
127: \bibitem[\protect\citeauthoryear{Lancaster and Culwin}{Lancaster and
128:   Culwin}{2001}]{YAP}
129: {\sc Lancaster, T.} {\sc and} {\sc Culwin, F.} 2001.
130: \newblock Towards an error free plagarism detection process.
131: \newblock In {\em ITiCSE '01: Proceedings of the 6th annual conference on
132:   Innovation and technology in computer science education}. ACM Press, New
133:   York, NY, USA, 57--60.
134: 
135: \bibitem[\protect\citeauthoryear{Lancaster and Culwin}{Lancaster and
136:   Culwin}{2004}]{lancaster2004csc}
137: {\sc Lancaster, T.} {\sc and} {\sc Culwin, F.} 2004.
138: \newblock {A Comparison of Source Code Plagiarism Detection Engines}.
139: \newblock {\em Computer Science Education\/}~{\em 14,\/}~2, 101--112.
140: 
141: \bibitem[\protect\citeauthoryear{Liu, Chen, Han, and Yu}{Liu
142:   et~al\mbox{.}}{2006}]{liu2006gds}
143: {\sc Liu, C.}, {\sc Chen, C.}, {\sc Han, J.}, {\sc and} {\sc Yu, P.} 2006.
144: \newblock {GPLAG: detection of software plagiarism by program dependence graph
145:   analysis}.
146: \newblock In {\em Proceedings of the 12th ACM SIGKDD international conference
147:   on Knowledge discovery and data mining}. ACM New York, NY, USA, 872--881.
148: 
149: \bibitem[\protect\citeauthoryear{Martin}{Martin}{1994}]{martin1994pme}
150: {\sc Martin, B.} 1994.
151: \newblock {Plagiarism: a misplaced emphasis}.
152: \newblock {\em Journal of Information Ethics\/}~{\em 3,\/}~2, 36--47.
153: 
154: \bibitem[\protect\citeauthoryear{Popyack, Herrmann, Zoski, Char, Cera, and
155:   Lass}{Popyack et~al\mbox{.}}{2003}]{popyack2003adh}
156: {\sc Popyack, J.}, {\sc Herrmann, N.}, {\sc Zoski, P.}, {\sc Char, B.}, {\sc
157:   Cera, C.}, {\sc and} {\sc Lass, R.} 2003.
158: \newblock {Academic dishonesty in a high-tech environment}.
159: \newblock {\em ACM SIGCSE Bulletin\/}~{\em 35,\/}~1, 357--358.
160: 
161: \bibitem[\protect\citeauthoryear{Prechelt, Malpohl, and Philippsen}{Prechelt
162:   et~al\mbox{.}}{2002}]{prechelt2002fpa}
163: {\sc Prechelt, L.}, {\sc Malpohl, G.}, {\sc and} {\sc Philippsen, M.} 2002.
164: \newblock {Finding plagiarisms among a set of programs with JPlag}.
165: \newblock {\em Journal of Universal Computer Science\/}~{\em 8,\/}~11,
166:   1016--1038.
167: 
168: \bibitem[\protect\citeauthoryear{Ribler and Abrams}{Ribler and
169:   Abrams}{2000}]{ribler5uvd}
170: {\sc Ribler, R.~L.} {\sc and} {\sc Abrams, M.} 2000.
171: \newblock Using visualization to detect plagiarism in computer science classes.
172: \newblock {\em infovis\/}~{\em 00}, 173.
173: 
174: \bibitem[\protect\citeauthoryear{Roy and Cordy}{Roy and
175:   Cordy}{2007}]{cordyroy2007survey}
176: {\sc Roy, C.~K.} {\sc and} {\sc Cordy, J.~R.} 2007.
177: \newblock A survey on software clone detection research.
178: \newblock Tech. rep., School of Computing, Queen's University at Kinston.
179: 
180: \bibitem[\protect\citeauthoryear{Saxon}{Saxon}{2000}]{saxon2000cpd}
181: {\sc Saxon, S.} 2000.
182: \newblock {Comparison of plagiarism detection techniques applied to student
183:   code, Part II}.
184: \newblock Tech. rep., Trinity College, Cambridge.
185: 
186: \end{thebibliography}
187: