[1] |
傅钢善. 教育技术发展轨迹探讨[J].电化教育研究,2005(09):22-26.
|
[2] |
HONG C M, CHEN C M, CHANG M H, et al. Intelligent web-based tutoring system with personalized learning path guidance[J]. Computers &Education, 2008, 51( 2) : 787-814.
|
[3] |
韦琳,袁泉,霍剑青,等. E-learning非结构化数据管理系统的构建与实现[J].中国科学技术大学学报,2010,40(06):623-628.
|
[4] |
黄振亚,苏喻,吴润泽,等. 一种面向教育评估的智能教育辅助平台[J].中国科学技术大学学报,2015,45(10):846-854.
|
[5] |
韩冰. 基于FTP教学平台的代码相似度检测的研究[J].计算机光盛软件与应用, 2012 (09):217-218.
|
[6] |
LECUN Y, BOTTOU L, BENGIO Y. Gradient -Based Learning Applied to Document Recognition[M]. Proceedings of the IEEE,1998.
|
[7] |
KRIZHEVSKY A, SUTSKEVER I, HINTON G E. ImageNet classification with deep convolutional neural networks[J]. Communications of the ACM , 2012:60 (2):1-9.
|
[8] |
殷丹平. 基于CNN的代码相似度检测研究与代码查重系统[D]. 北京:北京邮电大学,2018.
|
[9] |
BAXTER. Clone detection using abstract syntax trees[J]. International Conference on Software Maintenance 1998, 1998:368-377.
|
[10] |
KOSCHKE R. Clone detection using abstract syntax suffix trees[J]. Working Conference on Reverse Engineering 2006, 2006:253-262.
|
[11] |
SCHLEIMER S, WILKERSON D S, AIKEN A. Winnowing :Local algo-rithms for document fingerprinting[C]∥Proc of the 2003 ACM SIGMOD Int’ l Conf on Management of Data, 2003:76-85.
|
[12] |
KARP R M, RABIN M O. Efficient randomized pattern-matching algorithms[J]. IBM Journal of Research and Development, 1987:115-126.
|
[13] |
苏德富, 钟诚. 计算机算法设计与分析[M] .北京:电子工业出版社, 2001.
|
[14] |
张文典,任冬伟. 程序抄袭判定系统[J].小型微型计算机系统,1988(10):34-39.
|
[15] |
朱江. 基于XML的程序设计自动批改的研究[D]. 湘潭:湘潭大学,2005.
|
[16] |
王继远. 一种用于软件作业评判系统的程序结构分析算法的设计与实现[D]. 北京:北京邮电大学,2007.
|
[17] |
赵长海,晏海华,金茂忠. 基于编译优化和反汇编的程序相似性检测方法[J].北京航空航天大学学报,2008(06):711-715.
|
[18] |
张鹏,王国胤,陶春梅,等. 基于本体粗糙集的程序代码相似度度量方法[J].重庆邮电大学学报(自然科学版),2008,20(06):737-741.
|
[19] |
熊浩,晏海华,赫建营,等. 一种基于静态词法树的程序相似性检测方法[J].计算机应用研究,2009,26(04):1316-1319+1326.
|
[20] |
王春晖. 程序代码抄袭检测中串匹配算法的研究与实现[D]. 内蒙古呼和浩特:内蒙古师范大学,2008.
|
[21] |
VERCO K L, WISE M J. Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems[C]. Australasian Conference on Computer Science Education, 1996: 81-88.
|
[22] |
KOSCHKE R, FALKE R, FRENZEL P, et al. Clone Detection Using Abstract Syntax Suffix Trees[C]. Working Conference on Reverse Engineering, 2006: 253-262.
|
[23] |
KAMIYA T, KUSUMOTO S, INOUE K, et al. CCFinder: A multilinguistic token-based code clone detection system for large scale source code[J]. IEEE Transactions on Software Engineering, 2002, 28(7): 654-670.
|
[24] |
ELMATARAWY A, ELRAMLY M, BAHGAT R, et al. Code clone detection using sequential pattern mining[J].International Journal of Computer Applications, 2015, 127(2): 10-18.
|
[25] |
BAKER B S. Parameterized duplication in strings: Algorithms and an application to software maintenance[J]. SIAM Journal on Computing, 1997, 26(5): 1343-1362.
|
[26] |
Wise M J. Running karp-rabin matching and greedy string tiling[J]. Software - Practice and Experience,1993.
|
[27] |
PRECHELT L, MALPOHL G, PHILIPPSEN M. Finding plagiarisms among a set of programs with JPlag[J]. Universal Computer Science, 2000, 8(11):1016-1038.
|
[28] |
GRANVILLE A. Detecting Plagiarism in Java Code[J]. Supervisor Yorick Wilks, 2002.
|
[29] |
RAGKHITWETSAGUL C, KRINKE J, MARNETTE B, et al. A picture is worth a thousand words: Code clone detection based on image similarity[C]. International Workshop on Software Clones, 2018: 44-50.
|
[30] |
牛永洁,张成. 多种字符串相似度算法的比较研究[J].计算机与数字工程,2012,40(03):14-17.
|
[31] |
MYLES G, COLBERG C. Detecting Software Theft via Whole Program Path Birthmarks[M]. Springer Berlin Heidelberg, 2004.
|
[32] |
XIE X, LIU F L, LU B, et al. A software birthmark based on weighted k-gram [C]//2010 IEEE International Conference on Intelligent Computing and Intelligent Systems. IEEE, 2010.
|
[33] |
MATHEWS B W. Comparison of the predicted and observed secondary structure of T4 phnge lysozyme [J]. Biochim Biophys Acta, 1975, 405(2):442-451.)
|