2018 13th International Conference on Computer Science &Amp; Education (ICCSE) 2018
DOI: 10.1109/iccse.2018.8468817
|View full text |Cite
|
Sign up to set email alerts
|

A Search of Verilog Code Plagiarism Detection Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…RKRGST converts the student programs to token strings and then measure the similarities via running Karp-Rabin greedy string tiling [25], a common string-matching algorithm for code similarity detection techniques [32]. Structure works similarly but the token strings are the result of linearising the syntax trees in a pre-order manner, inspired from two former studies [26], [27]. These tokens are expected to be more resistant to surface modification as most of them cannot be modified directly at source code level.…”
Section: Methodsmentioning
confidence: 99%
“…RKRGST converts the student programs to token strings and then measure the similarities via running Karp-Rabin greedy string tiling [25], a common string-matching algorithm for code similarity detection techniques [32]. Structure works similarly but the token strings are the result of linearising the syntax trees in a pre-order manner, inspired from two former studies [26], [27]. These tokens are expected to be more resistant to surface modification as most of them cannot be modified directly at source code level.…”
Section: Methodsmentioning
confidence: 99%
“…Instead of applying heuristics in comparing abstract syntax tree, a technique in [31] converts the syntax trees to token strings through pre-order visit and therefore compares them with a string matching algorithm. This was followed by [32] but with hashing mechanism involved.…”
Section: Related Workmentioning
confidence: 99%
“…These techniques rely on various structures for comparison. Some of the structures are source code token strings [8,29,41], abstract syntax trees [20,30,53], parse trees [48], program dependency graphs [32], and low-level token strings [25,42].…”
Section: Related Workmentioning
confidence: 99%