期刊文献+

基于Zhang-Shasha算法的存储过程相似性匹配 被引量:1

Study on similarity matching of store procedure based on Zhang-Shasha algorithm
下载PDF
导出
摘要 Zhang-Shasha算法在度量有序树的距离以及相似度应用中具有独特的优势。针对学习者存储过程作业自动评估的问题,提出了一种基于Zhang-Shasha算法的存储过程相似性匹配的解决方法,关键在于如何把存储过程块转换成算法要求的有序树形式。采用词法分析和语法分析把存储过程转换成语法树,再转换成有序二叉树。通过分析转换所得的二叉树属于RB型树,Zhang-Shasha-R算法在计算此类型树的距离和相似度时具有较高的效率。分析实验结果,该方法的准确率较高,且随着实验中题量的增加,评估的准确率逐步提高。 Zhang-Shasha algorithm has a unique advantage in editing distance between ordered trees and similarity measure- ment. Aiming at the problem of automatic assessment of the learners' stored procedure assignments, the paper put forward a solution for similarity matching of stored procedure block based on Zhang-Shasha algorithm. It was the key that how to convert the stored procedure block to the form of ordered tree required by the algorithm. Through lexical analysis and syntax analysis it transformed the stored procedure block into the abstract syntax tree, and then further convert to an ordered binary tree. Ac- cording to the analysis, the resulting binary tree belonged to right branch tree. Zhang-Shasha-R algorithm has higher efficiency in calculating the distance and similarity of this kind of tree. The experimental results show that this method has a high accura- cy rate, and with the increasing number of exercises in the experiment, the accuracy of the assessment increases gradually.
出处 《计算机应用研究》 CSCD 北大核心 2014年第9期2692-2695,共4页 Application Research of Computers
关键词 Zhang—Shasha算法 存储过程 相似性匹配 Zhang-Shasha algorithm stored procedure similarity matching
  • 相关文献

参考文献1

二级参考文献69

  • 1曹羽中,金茂忠,刘超.克隆代码检测技术综述[J].计算机工程与科学,2006,28(z2):9-13. 被引量:6
  • 2Bilenko M,Mooney R J.Adaptive duplicate detection using learnable string similarity measure[C] ∥Proceeding of ninth ACM SIGKDD international conference on Knowledge disco-very and data mining.2003:39-48,.
  • 3Baker B S.On finding duplication and near duplication in large software systems[C] ∥Proceedings of 2nd Working Conference on Reverse Engineering.1995:86-95.
  • 4Mayrand J,Leblanc C,Merlo E M.Automatic detection of function clones in a software system using metrics[C] ∥Proceeding of International Conference on Software Maintenance (ICSM).1996.
  • 5Rieger M.Effective clone detection without language barriers[D].Bern University,Switzerland,2005.
  • 6Georgina C,Mike J.Source-code plagiarism:A UK academic perspective[R].RR-422.Department of computer Science,University of Warwick,2006.
  • 7Sheard J,Dick M,Markham S,et al.Cheating and plagiarism:perceptions and practices of first year it students[C] ∥Procee-dings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education.2002:183-187.
  • 8McCabe D.Levels of Cheating and Plagiarism Remain High[OL].Center for Academic Integrity.Duke University,2005.http://academicintegrity.org.
  • 9Halstead,Howard M.Elements of Software Science[Z].Elsevier,1977.
  • 10Ottenstein K J.An Algorithmic Approach to the Detection and Prevention of Plagiarism[J].SIGCSE Bulletin,1977,8(4):30-41.

共引文献22

同被引文献12

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部