A Plagiarism Detection Technique for Source Codes Considering Data Structures


KIPS Transactions on Computer and Communication Systems, Vol. 3, No. 6, pp. 189-196, Jun. 2014
10.3745/KTCCS.2014.3.6.189,   PDF Download:

Abstract

Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
K. H. Lee, Y. N. Kim, G. Woo, "A Plagiarism Detection Technique for Source Codes Considering Data Structures," KIPS Transactions on Computer and Communication Systems, vol. 3, no. 6, pp. 189-196, 2014. DOI: 10.3745/KTCCS.2014.3.6.189.

[ACM Style]
Ki Hwa Lee, Yeo Neo Kim, and Gyun Woo. 2014. A Plagiarism Detection Technique for Source Codes Considering Data Structures. KIPS Transactions on Computer and Communication Systems, 3, 6, (2014), 189-196. DOI: 10.3745/KTCCS.2014.3.6.189.