2017 12th International Conference on Computer Science and Education (ICCSE) 2017
DOI: 10.1109/iccse.2017.8085456
|View full text |Cite
|
Sign up to set email alerts
|

A unified approach to automate the usage of plagiarism detection tools in programming courses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The institution may also choose to use a reactive method like plagiarism detection combined with disciplinary action to limit future plagiarism. Both proactive and reactive approaches and their respective techniques applied to prevent or detect plagiarism, present problems that need to be examined and addressed (Ganguly et al, 2018;Haskins & Pieterse, 2016;Louw & Pieterse, 2015;Portillo-Dominguez et al, 2017).…”
Section: Research Problemmentioning
confidence: 99%
“…The institution may also choose to use a reactive method like plagiarism detection combined with disciplinary action to limit future plagiarism. Both proactive and reactive approaches and their respective techniques applied to prevent or detect plagiarism, present problems that need to be examined and addressed (Ganguly et al, 2018;Haskins & Pieterse, 2016;Louw & Pieterse, 2015;Portillo-Dominguez et al, 2017).…”
Section: Research Problemmentioning
confidence: 99%
“…Some works extend existing techniques instead of directly proposing new ones, such as a meta-tool which combines several source code plagiarism detection techniques (Portillo-Dominguez et al, 2017). A technique requiring steps for detecting (and investigating) source code plagiarism is expected to form guidance for examiners (Kermek & Novak, 2016).…”
Section: A Review Of Automated Source Code Plagiarism Detectionmentioning
confidence: 99%
“…Works in [25], [26], for example, proposed a mechanism to replace method invocations with their respective contents so that the effectiveness of the detection tool can be improved. A work in [27] proposed a meta-tool which combines several existing detection tools. A work in [28] proposed dynamic thresholding mechanisms to mitigate the number of false results.…”
Section: Literature Reviewmentioning
confidence: 99%