期刊文献+

源程序与文档复制检测系统的研究 被引量:1

Research on the Copy Detection System for Program and Document
下载PDF
导出
摘要 复制检测技术在知识产权保护和信息检索中有着重要应用。该文介绍了自然语言和程序代码复制检测技术的发展,构建了一个基于匹配方法的复制检测系统,在端正学术之风和防止程序代码抄袭等方面都起到了积极作用。 Copy detection has very important application in both intellectual property protection and information retrieval.This paper in-troduces the development of natural language and program code copy detection technology,and constructs a copy detection system based on the matching methods;it plays an effective role in correcting academic style and preventing program plagiarism.
作者 刘双明 彭新光 LIU Shuang-ming,PENG Xin-guang(College of Computer and Software,Taiyuan University of Technology,Taiyuan 030024,China)
出处 《电脑知识与技术》 2010年第5期3537-3538,共2页 Computer Knowledge and Technology
关键词 自然语言 源代码 复制检测 知识产权 natural language source code copy detection intellectual property right
  • 相关文献

参考文献7

  • 1鲍军鹏,沈钧毅,刘晓东,宋擒豹.自然语言文档复制检测研究综述[J].软件学报,2003,14(10):1753-1760. 被引量:69
  • 2史彦军,滕弘飞,金博.抄袭论文识别研究与进展[J].大连理工大学学报,2005,45(1):50-57. 被引量:36
  • 3Halstead M H.Elements of software science[M].New York:North HoUand,1977.
  • 4Ottenstein,Karl J.An Algorithmic Approach to the Detection and Prevention of Plagiarism[J].ACM SICCSE Bulletin,1976,8(4):30-41.
  • 5Wise MJ.YAP3:Improved detection of similarities in computer programs and other texts.In:Proceedings of the SIGCSE 96.1996,130-134.
  • 6Shivakumar N,Garcia-Molina H.SCAM:A copy detection mechanism for digital documents.In:Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95).1995.
  • 7金博,史彦军,滕弘飞.中文文档复制检测系统研究[J].计算机工程,2005,31(19):79-81. 被引量:9

二级参考文献36

  • 1董振东,董强.面向信息处理的词汇语义研究中的若干问题[J].语言文字应用,2001(3):27-32. 被引量:36
  • 2[1]DONALD L M C. CAI research [EB/OL]. http:∥www.academicintegrity.org/cairesearch.asp., 2004-07-01.
  • 3[2]OTTENSTEIN K J. An algorithmic approach to the detection and prevention of plagiarism [J]. ACM SIGCSE Bull, 1976,8(4): 30-41.
  • 4[3]CLOUGH P. Plagiarism in natural and programming languages: An overview of current tools and technologies [A]. Research Memoranda: CS-00-05 [R]. Sheffield: Department of Computer Science, University of Sheffield, 2000. 1-31.
  • 5[5]BRODER A Z. On the resemblance and containment of documents [A]. Proceedings of Compression and Complexity of SEQUENCES [C]. Salerno: IEEE Computer Society, 1998. 21-29.
  • 6[6]MANDER U. Finding similar files in a large file system [A]. Proceedings of the USENIX Winter 1994 Technical Conference [C]. San Francisco: The Advanced Computing Systems Association, 1994. 1-10.
  • 7[7]MANDER U, BAKER B S. Deducing similarities in Java sources from bytecode [A]. USENIX 1998 Annual Technical Conference [C]. New Orleans: The Advanced Computing Systems Association, 1998. 179-190.
  • 8[8]BRIN S, DAVIS J, GARCIA-MOLINA H. Copy detection mechanisms for digital documents [A]. Proceedings of the ACM SIGMOD Annual Conference [C]. San Francisco: ACM Press, 1995. 398-409.
  • 9[9]SHIVAKUMAR N, GARCIA-MOLINA H. SCAM: a copy detection mechanism for digital documents [A]. Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries [C]. Austin: Texas A & M University, 1995. 201-210.
  • 10[10]SHIVAKUMAR N, GARCIA-MOLINA H. Building a scalable and accurate copy detection mechanism [A]. Proceedings of the 1st ACM Conference on Digital Libraries [C]. Bethesda: ACM Press, 1996. 160-168.

共引文献93

同被引文献9

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部