Mapping Similarity Detectors of Code Clone to Academic Integrity in Programming

被引:0
作者
Pangestu, Muftah Afrizal [1 ]
Karnalim, Oscar [1 ]
Simon [1 ]
机构
[1] Univ Newcastle, Callaghan, NSW, Australia
来源
2021 IEEE WORLD CONFERENCE ON ENGINEERING EDUCATION (EDUNINE) | 2021年
关键词
code similarity detection; code clone; academic integrity; programming; computing education; PLAGIARISM DETECTION;
D O I
10.1109/EDUNINE51952.2021.9429164
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
When dealing with academic integrity in programming, code similarity detectors are often used to raise suspicion of student programs with undue similarity. However, it appears that only detectors designed for that purpose are discussed in computing education publications, although similarity detectors for other purposes might also be beneficial, both to foster research and to avoid 'reinventing the wheel'. This paper maps similarity detectors used to identify code clones, repeated code segments in a software system, to the classifications used for academic integrity purposes. It will help academic integrity researchers to understand code clone similarity detectors and to read papers from that area. While there are other reviews of code clone detection, ours should be easier for computing educators to read as it uses the terminologies of academic integrity.
引用
收藏
页数:6
相关论文
共 57 条
[1]  
Acampora G., 2015, 2015 IEEE INT C FUZZ, P1, DOI [10.1109/FUZZ-IEEE.2015.7337935, DOI 10.1109/FUZZ-IEEE.2015.7337935]
[2]   Sherlock N-overlap: Invasive Normalization and Overlap Coefficient for the Similarity Analysis Between Source Code [J].
Allyson, Franca B. ;
Danilo, Maciel L. ;
Jose, Soares M. ;
Giovanni, Barroso C. .
IEEE TRANSACTIONS ON COMPUTERS, 2019, 68 (05) :740-751
[3]  
Antony EP, 2013, WORK CONF REVERSE EN, P472, DOI 10.1109/WCRE.2013.6671325
[4]   Language-Independent Clone Detection Applied to Plagiarism Detection [J].
Brixtel, Romain ;
Fontaine, Mathieu ;
Lesner, Boris ;
Bazin, Cyril ;
Robbes, Romain .
2010 10TH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, 2010, :77-86
[5]   Efficient plagiarism detection for large code repositories [J].
Burrows, Steven ;
Tahaghoghi, S. M. M. ;
Zobel, Justin .
SOFTWARE-PRACTICE & EXPERIENCE, 2007, 37 (02) :151-175
[6]   Detecting Pervasive Source Code Plagiarism through Dynamic Program Behaviours [J].
Cheers, Hayden ;
Lin, Yuqing ;
Smith, Shamus P. .
PROCEEDINGS OF THE TWENTY-SECOND AUSTRALASIAN COMPUTING EDUCATION CONFERENCE, ACE'20, 2020, :21-30
[7]   The NiCad Clone Detector [J].
Cordy, James R. ;
Roy, Chanchal K. .
2011 IEEE 19TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2011, :219-+
[8]  
Croft WB, 2010, Search engines: information retrieval in practice, V520
[9]   Current trends in source code analysis, plagiarism detection and issues of analysis big datasets [J].
Duracik, Michal ;
Krsak, Emil ;
Hrkut, Patrik .
12TH INTERNATIONAL SCIENTIFIC CONFERENCE OF YOUNG SCIENTISTS ON SUSTAINABLE, MODERN AND SAFE TRANSPORT, 2017, 192 :136-141
[10]  
El Bachir Menai M., 2010, 2010 5th International Conference on Computer Science & Education (ICCSE 2010), P356, DOI 10.1109/ICCSE.2010.5593613