Sciweavers

84 search results - page 14 / 17
» Plagiarism Detection in arXiv
Sort
View
ERCIMDL
2010
Springer
144views Education» more  ERCIMDL 2010»
13 years 9 months ago
Capacity-Constrained Query Formulation
Given a set of keyphrases, we analyze how Web queries with these phrases can be formed that, taken altogether, return a specified number of hits. The use case of this problem is a ...
Matthias Hagen, Benno Stein
FECS
2006
113views Education» more  FECS 2006»
13 years 10 months ago
A Lightweight Program Similarity Detection Model using XML and Levenshtein Distance
Program plagiarism is one of the most significant problems in Computer Science education. Most common plagiarism includes modifying comments, reordering statements, and changing v...
Seo-Young Noh, Sangwoo Kim, Cheonyoung Jung
DOCENG
2007
ACM
14 years 15 days ago
XML version detection
The problem of version detection is critical in many important application scenarios, including software clone identification, Web page ranking, plagiarism detection, and peer-to-...
Deise de Brum Saccol, Nina Edelweiss, Renata de Ma...
ICDAR
2009
IEEE
14 years 3 months ago
Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds
The partial copy is a kind of copy produced by cropping parts of original materials. Illegal users often use this technique for plagiarizing copyrighted materials. In addition, or...
Weihan Sun, Koichi Kise
ACSAC
2009
IEEE
14 years 3 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu