1 |
J. H. Johnson, "Identifying redundancy in source code using fingerprints," Conference of the Centre for Advanced Studies on Collaborative research, IBM Press pp.171-183, 1993.
|
2 |
J. H. Johnson, "Substring matching for clone detection and change tracking," International Conference on Software Maintenance, IEEE Computer Society Press pp.120-126, 1994.
|
3 |
B. S. Baker, "On finding duplication and near-duplication in large software systems," Second Working Conference on Reverse Engineering, Los Alamitos, California, IEEE Computer Society Press pp. 86-95, 1995.
|
4 |
K. A. Kontogiannis, R. Demori, E. Merlo, M. Galler, M. Bernstein," Pattern matching for clone and concept detection.", Automated Software Engineering Vol. 3, No. 1/2, pp.79-108, 1996.
|
5 |
I. D. Baxter, A. Yahin, L. Moura, M. Sant''Anna, L. Bier, "Clone Detection Using Abstract Syntax Trees," International Conference on Software Maintenance, IEEE Computer Society Press pp.368-378, 1998.
|
6 |
W. Yang, "Identifying syntactic differences between two programs," Software-Practice and Experience Vol. 21, No. 7, pp.739-755, 1991.
DOI
|
7 |
R. Koschke, R. Falke, P. Frenzel, "Clone detection using abstract syntax suffix trees," Working Conference on Reverse Engineering, IEEE Computer Society Press, 2006.
|
8 |
M. J. Wise, "Detection of Similarities in Student Programs: YAP'ing may be Preferable to Plague'ing," ACM SIGSCE Bulletin, In Proc. of 23rd SIGCSE Technical Symp., Vol. 24, No. 1, pp.268-271, March 1992.
|
9 |
A. Aiken, "MOSS(Measure Of Software Similarity) Plagiarism detection system," Available at http://www.cs.berkeley.edu/-moss/, University of Berkeley, CA, Apr. 2000.
|
10 |
L. Prechelt, G. Malpohl & M. Philppsen, "JPlag: Finding Plagiarism Among a Set of Programs," available at http://wwwipd.ira.uka.de/EIR/ D-76128 Karlsruhe, Germany, Technical Report 2000-1, March 2000.
|
11 |
강승식, 권혁일, 김동렬, "한국어 자동 색인을 위한 형태소 분석 기능," 한국정보과학회, 학술발표논문집 제22권 제1호, 929-932쪽, 1995년 4월
|
12 |
J. H. Jonson, "Identifying Redundancy in Source Code using Fingerprints," In Proc. of CASCON 93, pp.171-183, 1993.
|
13 |
D. L. McCabe, L. K. Trevino, & K. D. Butterfield, "Cheating in academic institutions: A decade of research," Ethics & Behavior, 11(3), pp.219-232. 2001.
DOI
|
14 |
Y. C. Kim, S. K. Kim, S. H. Yeom, J. M. Choi &C. W. Yoo. "A Program-Plagiarism Checker using Abstract Syntax Tree," KISS(Korea Information Science Society), Vol. 30, No. 8, Aug. 2003.
과학기술학회마을
|
15 |
김수영, "표절과 올바른 인용 방법," 가정의학회지, 167-174쪽, 2008년
과학기술학회마을
|
16 |
P. J. Larkham, & Manns, "S. Plagiarism and its treatment in higher education," Journal of Further and Higher Education, 26(4), pp.339-349. 2002.
DOI
|
17 |
J. H. Jonson, "Identifying Redundancy in Source Code using Fingerprints," In proc. of CASCON 93, pp.171-183, 1993.
|
18 |
http://www.plagiarism.org/learning_center/what_is_plagiarism.html
|
19 |
http://www.canexus.com/eve/index.shtml
|
20 |
http://www.turnitin.com/
|
21 |
http://www.copycatch.freeserve.co.uk/
|
22 |
S. Ducasse, M. Rieger, S. Demeyer, "A Language Independent Approach for Detecting Duplicated Code," International Conference on Software Maintenance. pp.109-118, 1999.
|