咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 5 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 11 篇 工学
    • 10 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 2 篇 控制科学与工程
    • 1 篇 信息与通信工程
    • 1 篇 软件工程
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 理学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 13 篇 source-code
  • 3 篇 plagiarism
  • 2 篇 datasets
  • 2 篇 detection
  • 2 篇 authorship-ident...
  • 2 篇 plagiarism detec...
  • 1 篇 storage model
  • 1 篇 tools
  • 1 篇 branch and bound
  • 1 篇 plagiarsim
  • 1 篇 longest common s...
  • 1 篇 systematic revie...
  • 1 篇 zdrojový kód
  • 1 篇 deep features
  • 1 篇 programming
  • 1 篇 github
  • 1 篇 education
  • 1 篇 detekce
  • 1 篇 similarity
  • 1 篇 příznaky

机构

  • 1 篇 uam azcapotzalco...
  • 1 篇 iiit hyderabad h...
  • 1 篇 univ warwick dep...
  • 1 篇 key laboratory o...
  • 1 篇 first research i...
  • 1 篇 faculty of compu...
  • 1 篇 network and info...
  • 1 篇 duquesne univ pi...
  • 1 篇 jordan universit...
  • 1 篇 univ warwick dep...
  • 1 篇 nottingham trent...
  • 1 篇 universitat poli...
  • 1 篇 henan agr univ c...
  • 1 篇 key laboratory o...
  • 1 篇 staffordshire un...
  • 1 篇 brno university ...
  • 1 篇 univ zagreb fac ...
  • 1 篇 school of comput...
  • 1 篇 duquesne univers...
  • 1 篇 usc informat sci...

作者

  • 2 篇 joy mike
  • 1 篇 chen zhong
  • 1 篇 campos r. a. cas...
  • 1 篇 purini suresh
  • 1 篇 novak matija
  • 1 篇 charles clarke
  • 1 篇 jawahar c. v.
  • 1 篇 andreou margarit...
  • 1 篇 cosma georgina
  • 1 篇 martinez f. j. z...
  • 1 篇 skoupilová alena
  • 1 篇 kermek dragutin
  • 1 篇 al-ayyoub mahmou...
  • 1 篇 shen qingni
  • 1 篇 yasaswi jitendra
  • 1 篇 boyatt russell
  • 1 篇 elhadj benkhelif...
  • 1 篇 piech chris
  • 1 篇 mahmoud al-ayyou...
  • 1 篇 paolo rosso

语言

  • 12 篇 英文
  • 1 篇 中文
检索条件"主题词=source-code"
13 条 记 录,以下是1-10 订阅
排序:
source-code Similarity Detection and Detection Tools Used in Academia: A Systematic Review
收藏 引用
ACM TRANSACTIONS ON COMPUTING EDUCATION 2019年 第3期19卷 27-27页
作者: Novak, Matija Joy, Mike Kermek, Dragutin Univ Zagreb Fac Org & Informat Pavlinska 2 Varazhdin 42000 Croatia Univ Warwick Dept Comp Sci Coventry CV4 7AL W Midlands England
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfu... 详细信息
来源: 评论
Overview of the PAN@FIRE 2020 Task on the Authorship Identification of source code  12
Overview of the PAN@FIRE 2020 Task on the Authorship Identif...
收藏 引用
12th Annual Meeting of the Forum-for-Information-Retrieval-Evaluation (FIRE)
作者: Fadel, Ali Musleh, Husam Tuffaha, Ibraheem Al-Ayyoub, Mahmoud Jararweh, Yaser Benkhelifa, Elhadj Jordan Univ Sci & Technol Irbid Jordan Duquesne Univ Pittsburgh PA 15219 USA Staffordshire Univ Stoke On Trent Staffs England
Authorship identification is essential to the detection of undesirable deception of others' content misuse or exposing the owners of some anonymous malicious content. While it is widely studied for natural languag... 详细信息
来源: 评论
Human Languages in source code: Auto-Translation for Localized Instruction  20
Human Languages in Source Code: Auto-Translation for Localiz...
收藏 引用
7th Conference on Learning at Scale
作者: Piech, Chris Abu-El-Haija, Sami Stanford Univ Stanford CA 94305 USA USC Informat Sci Inst Marina Del Rey CA USA
Computer science education has promised open access around the world, but access is largely determined by what human language you speak. As younger students learn computer science it is less appropriate to assume that... 详细信息
来源: 评论
Overview of the [email protected] 2020 Task on the Authorship Identification of source code  20
Overview of the [email protected] 2020 Task on the Authorshi...
收藏 引用
Proceedings of the 12th Annual Meeting of the Forum for Information Retrieval Evaluation
作者: Ali Fadel Husam Musleh Ibraheem Tuffaha Mahmoud Al-Ayyoub Yaser Jararweh Elhadj Benkhelifa Paolo Rosso Jordan University of Science and Technology Jordan Duquesne University USA Staffordshire University UK Universitat Politècnica de València Spain
Authorship identification is essential to the detection of undesirable deception of others’ content misuse or exposing the owners of some anonymous malicious content. While it is widely studied for natural languages,... 详细信息
来源: 评论
Calibration of source-code similarity detection tools for objective comparisons  41
Calibration of source-code similarity detection tools for ob...
收藏 引用
41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
作者: Novak, M. Kermek, D. Joy, M. Univ Zagreb Fac Org & Informat Varazhdin Croatia Univ Warwick Dept Comp Sci Coventry W Midlands England
Today there are many source-code similarity detection tools. These tools are used for many purposes and one of them is plagiarism detection, in which context this paper is written. Every time a new tool is developed a... 详细信息
来源: 评论
Perceptual Comparison of source-code Plagiarism within Students from UK, China, and South Cyprus Higher Education Institutions
收藏 引用
ACM TRANSACTIONS ON COMPUTING EDUCATION 2017年 第2期17卷 8-8页
作者: Cosma, Georgina Joy, Mike Sinclair, Jane Andreou, Margarita Zhang, Dongyong Cook, Beverley Boyatt, Russell Nottingham Trent Univ Sch Sci & Technol Nottingham England Univ Warwick Dept Comp Sci Warwick England PA Coll Dept Business Comp Larnax Cyprus Henan Agr Univ Coll Informat & Management Sci Zhengzhou Peoples R China
Perspectives of students on what constitutes source-code plagiarism may differ based on their educational background. Surveys have been conducted with home students undertaking computing and joint computing subject de... 详细信息
来源: 评论
Energy-Aware GPU Programming at source-code Levels
收藏 引用
Tsinghua Science and Technology 2012年 第3期17卷 278-286页
作者: Changyou Zhang Kun Huang Xiang Cui Yifeng Chen Key Laboratory of High Confidence Software Technologies(Peking University)School of Electronics Engineering and Computer Science Peking UniversityBeijing 100871China
To enhance the energy efficiency and performance of algorithms with Graphics Processing Unit (GPU) accelerators in source-code development, we consider the power efficiency based on data transfer bandwidth and power... 详细信息
来源: 评论
Batch source-code Plagiarism Detection Using an Algorithm for the Bounded Longest Common Subsequence Problem
Batch Source-Code Plagiarism Detection Using an Algorithm fo...
收藏 引用
9th International Conference on Electrical Engineering, Computing Science and Automatic Control
作者: Campos, R. A. Castro Martinez, F. J. Zaragoza UAM Azcapotzalco Dept Sistemas Mexico City DF Mexico
source-code plagiarism detection is an unfortunate but necessary activity when reviewing assignments of programming courses. While being reasonably easy to fool, string-based comparisons offer a high degree of accurac... 详细信息
来源: 评论
Plagiarism Detection in Programming Assignments Using Deep Features  4
Plagiarism Detection in Programming Assignments Using Deep F...
收藏 引用
4th IAPR Asian Conference on Pattern Recognition (ACPR)
作者: Yasaswi, Jitendra Purini, Suresh Jawahar, C. V. IIIT Hyderabad Hyderabad India
This paper proposes a method for detecting plagiarism in source-codes using deep features. The embeddings for programs are obtained using a character-level Recurrent Neural Network (char-RNN), which is pre-trained on ... 详细信息
来源: 评论
Towards a source-code Oriented Attestation
收藏 引用
China Communications 2009年 第4期6卷 82-87页
作者: Ruan Anbang Shen Qingni Wang Li Qin Chao Gu Liang Chen Zhong School of Software and Microelectronics Peking University Beijing 102600 China Network and Information Security Laboratory Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing 100871 China First Research Institute of Ministry of Public Security of China Beijing 100048 China
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... 详细信息
来源: 评论