442
Views
5
CrossRef citations to date
0
Altmetric
Research Article

Efficient plagiarism detection for software modeling assignments

ORCID Icon, & ORCID Icon
Pages 187-215 | Received 11 Oct 2019, Accepted 01 Jan 2020, Published online: 07 Jan 2020

References

  • Babur, Ö., Cleophas, L., & van den Brand, M. (2019). Metamodel clone detection with SAMOS. Journal of Computer Languages, 51, 57–74.
  • Bejarano, A. M., García, L. E., & Zurek, E. E. (2015). Detection of source code similitude in academic environments. Computer Applications in Engineering Education, 23(1), 13–22.
  • Bézivin, J. (2005). On the unification power of models. Software & Systems Modeling, 4(2), 171–188.
  • Blum, S. D. (2009). My word!: Plagiarism and college culture. Ithaca, New York: Cornell University Press.
  • Brambilla, M., Cabot, J., & Wimmer, M. (2017). Model-driven software engineering in practice. London, U.K.: Morgan & Claypool Publishers.
  • Broder, A. Z. (1997). On the resemblance and containment of documents. In Proceedings of Compression and Complexity of Sequences (pp. 21–29). Salerno, Italy.
  • Brosch, P., Kappel, G., Seidl, M., & Wimmer, M. (2009). Teaching model engineering in the large. In Educators’ Symposium @ Models 2009., Denver, Colorado.
  • Brun, C., & Pierantonio, A. (2008). Model differences in the eclipse modeling framework. UPGRADE, the European Journal for the Informatics Professional, 9(2), 29–34.
  • Cavnar, W. B., Trenkle, J. M., & Barbeau, W. E. (1994). N-gram-based text categorization. In Proceedings of the 3rd Symposium on Document Analysis and Information Retrieval (SDAIR). Las Vegas, NV, USA.
  • Ciccozzi, F., Famelis, M., Kappel, G., Lambers, L., Mosser, S., & Paige, R. F., … others (2018). How do we teach modelling and model-driven engineering?: A survey. In Companion Proceedings of the 21st ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (MODELS) (pp. 122–129). Copenhague, Denmark.
  • Clarisó, R., & Cabot, J. (2018). Applying graph kernels to model-driven engineering problems. In Proceedings of the 1st International Workshop on Machine Learning and Software Engineering in Symbiosis (MASES@ASE) (pp. 1–5). Montpellier, France.
  • Cochez, M. (2014). Locality-sensitive hashing for massive string-based ontology matching. In Proceedings of the IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (pp. 134–140). Warsaw, Poland.
  • Constant, O. (2012). EMF Diff/Merge. Retrieved from https://wiki.eclipse .org/EMF DiffMerge)
  • Deissenboeck, F., Hummel, B., Juergens, E., Pfaehler, M., & Schaetz, B. (2010). Model clone detection in practice. In Proceedings of the 4th International Workshop on Software Clones (pp. 57–64). Cape Town, South Africa.
  • Dumas, M., García-Ban˜uelos, L., La Rosa, M., & Uba, R. (2013). Fast detection of exact clones in business process model repositories. Information Systems, 38(4), 619–633.
  • Ďuračík, M., Kršák, E., & Hrkút, P. (2017). Current trends in source code analysis, plagiarism detection and issues of analysis big datasets. Procedia Engineering, 192, 136–141.
  • Falleri, J.-R., Huchard, M., Lafourcade, M., & Nebut, C. (2008). Metamodel matching for automatic model transformation generation. In Proceedings of the International Conference on Model Driven Engineering Languages and Systems (pp. 326–340), Toulouse, France.
  • Fridrich, J., & Goljan, M. (2000). Robust hash functions for digital watermarking. In Proceedings of the International Conference on Information Technology: Coding and Computing (pp. 178–183). Las Vegas, NV, USA
  • Indyk, P., & Motwani, R. (1998). Approximate nearest neighbors: Towards removing the curse of dimensionality. In Proceedings of the 30th ACM Symposium on Theory of Computing (pp. 604–613). Chicago, IL, USA.
  • Inoue, U., & Wada, S. (2012). Detecting plagiarisms in elementary programming courses. In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) (pp. 2308–2312). Chongqing, China.
  • Jouault, F., Allilaire, F., Bézivin, J., & Kurtev, I. (2008). ATL: A model transformation tool. Science of Computer Programming, 72, 31–39.
  • Joy, M., & Luck, M. (1999). Plagiarism in programming assignments. IEEE Transactions on Education, 42(2), 129–133.
  • Kinneer, C., & Herzig, S. J. (2018). Dissimilarity measures for clustering space mission architectures. In Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (pp. 392–402). Copenhagen, Denmark.
  • Kolovos, D. S. (2009). Establishing correspondences between models with the Epsilon comparison language. In Proceedings of the European Conference on Model Driven Architecture- Foundations and Applications (pp. 146–157). Enschede, The Netherlands.
  • La Rosa, M., Dumas, M., Ekanayake, C. C., García-Ban˜uelos, L., Recker, J., & Ter Hofstede, A. H. (2015). Detecting approximate clones in business process model repositories. Information Systems, 49, 102–125.
  • Lancaster, T., & Culwin, F. (2004). A comparison of source code plagiarism detection engines. Computer Science Education, 14(2), 101–112.
  • Lee, S.-H., & Kwon, K.-R. (2012). Robust 3D mesh model hashing based on feature object. Digital Signal Processing, 22(5), 744–759.
  • Leskovec, J., Rajaraman, A., & Ullman, J. D. (2014). Mining of massive datasets. Cambridge, U.K.: Cambridge University Press.
  • Liu, C., Chen, C., Han, J., & Yu, P. S. (2006). GPLAG: Detection of software plagiarism by program dependence graph analysis. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 872–881). Philadelphia, Pennsylvania.
  • Martínez, S., Gérard, S., & Cabot, J. (2018). Robust hashing for models. In Proceedings of the 21th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems (pp. 312–322). Copenhagen, Denmark.
  • Narayanan, S., & Simi, S. (2012). Source code plagiarism detection and performance analysis using fingerprint based distance measure method. In Proceedings of the 7th International Conference on Computer Science & Education (ICCSE) (pp. 1065–1068). London, U.K.
  • Object Management Group. (2003). OCL Specification 2.0. OMG Adopted Specification (ptc/03-10-14).
  • Pham, N. H., Nguyen, H. A., Nguyen, T. T., Al-Kofahi, J. M., & Nguyen, T. N. (2009). Complete and accurate clone detection in graph-based models. In Proceedings of the 31st International Conference on Software Engineering (ICSE) (pp. 276–286). Vancouver, Canada.
  • Reddy, R., France, R., Ghosh, S., Fleurey, F., & Baudry, B. (2005). Model composition-a signature-based approach. In Aspect Oriented Modeling (AOM) Workshop, Montego Bay, Jamaica.
  • Rosales, F., García, A., Rodríguez, S., Pedraza, J. L., Méndez, R., & Nieto, M. M. (2008). Detection of plagiarism in programming assignments. IEEE Transactions on Education, 51(2), 174–183.
  • Sendall, S., & Kozaczynski, W. (2003). Model transformation: The heart and soul of model driven software development. IEEE Software, 20(5), 42–45.
  • Starovoytova, D., & Namango, S. S. (2016). Viewpoint of undergraduate engineering students on plagiarism. Journal of Education and Practice, 7(31), 48–65.
  • Steinberg, D., Budinsky, F., Paternostro, M., & Merks, E. (2008). EMF: Eclipse modeling framework (2nded.). Addison-Wesley Professional. The Eclipse Series, Boston, Massachusetts, United States.
  • Steinebach, M., Klöckner, P., Reimers, N., Wienand, D., & Wolf, P. (2013). Robust Hash Algorithms for Text. In Proceedings of the 14th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS) (pp. 135–144). Magdeburg, Germany: Springer.
  • Störrle, H. (2015). Effective and efficient model clone detection. In LNCS (Ed.), Software, services, and systems ((Vol. 8950, pp. 440–457). Springer.
  • Strüber, D., Acre¸toaie, V., & Plöger, J. (2017). Model clone detection for rule-based model transformation languages. Software & Systems Modeling, 18(2), 1–22.
  • Toulmé, A. (2006). Presentation of EMF compare utility. In Eclipse Modeling Symposium (pp. 1–8). Esslingen, Germany, October, 2006.
  • Whittle, J., Hutchinson, J., & Rouncefield, M. (2014). The state of practice in model-driven engineering. IEEE Software, 31(3), 79–85.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.