A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Virtual Laboratory Model for Encouraging Undergraduate Research
2006
ACM SIGCSE Bulletin
As an extension of earlier research into team-based software engineering education, the Applied Computing Technology Laboratory was formed to provide an authentic and engaging experience in realworld computer ...
Figure 3 . 3 The SNITCH plagiarism detection tool.
Figure 4 . 4 Close up of game play in the Labyrinth computer game design framework. ...
The SNITCH program uses a plagiarism detection algorithm that analyzes a student paper, finding a number of potential instances of plagiarism based on word length and complexity, and then searches for ...
doi:10.1145/1124706.1121406
fatcat:wk22ynxvbnfghevzejdnof7tky
A Virtual Laboratory Model for Encouraging Undergraduate Research
2006
Proceedings of the 37th SIGCSE technical symposium on Computer science education - SIGCSE '06
As an extension of earlier research into team-based software engineering education, the Applied Computing Technology Laboratory was formed to provide an authentic and engaging experience in realworld computer ...
Figure 3 . 3 The SNITCH plagiarism detection tool.
Figure 4 . 4 Close up of game play in the Labyrinth computer game design framework. ...
The SNITCH program uses a plagiarism detection algorithm that analyzes a student paper, finding a number of potential instances of plagiarism based on word length and complexity, and then searches for ...
doi:10.1145/1121341.1121406
dblp:conf/sigcse/Way06
fatcat:zvwwwswovbeilctjh4ctyb2mvi
Information and Communications Technology in Teaching Marketing: Benefits and Problems
2008
International Education Studies
At the same time there is software for detecting cheating in education which has gone some way in detecting the culprits and that had had a significant effect in reducing the proliferation of education ...
Where the systems for guarding against plagiarism are not thorough there is widespread abuse of the learning process. ...
of plagiarism detecting software will go a long way in warning the student and thereby discouraging such acts and identifying it where it takes place (2) Educational institutions should put in place strict ...
doi:10.5539/ies.v1n1p2
fatcat:gkf7ivbesrfhnaim26p4bsexli
Self-Plagiarism or Appropriate Textual Re-use?
2009
Journal of Academic Ethics
Based on the practical experience of the authors in identifying academics' self-plagiarism using both electronic detection and manual analysis, a simple model is proposed for identifying self-plagiarism ...
This paper explores the whole notion of self-plagiarism by academics and distinguishes between appropriate and inappropriate textual re-use in academic publications, while considering research on other ...
We thank them for their insights. Thanks also to the anonymous reviewers for providing valuable feedback. ...
doi:10.1007/s10805-009-9092-1
fatcat:pnw5ijxk3bfhrpzvk725skwi5a
Supervision and Control of Students during Online Assessments Applying Computer Vision Techniques: A Systematic Literature Review
2021
Universal Journal of Educational Research
What techniques have been used to detect plagiarism in online evaluations? What machine vision algorithms are used? ...
The research questions allowed us to investigate problems of academic dishonesty, ease of committing plagiarism, online assessment control techniques, plagiarism detection techniques, object tracking algorithms ...
of its superior performance in small hand detection from large images. [55] presents hand-gesture detection using Deep learning as an interaction mean for VR-virtual reality-acquiring real world images ...
doi:10.13189/ujer.2021.090513
fatcat:j4pytewiojegthcn2msprtjmja
Online Judging Platform Utilizing Dynamic Plagiarism Detection Facilities
2021
Computers
When considering this fact, in this paper, we present an online judging framework that is capable of automatic scoring of codes by detecting plagiarized contents and the level of accuracy of codes efficiently ...
Traditional online judging platforms are not ideally suitable for programming labs, as they do not support partial scoring and efficient detection of plagiarized codes. ...
We can also agree that this plagiarism detection system can be extended to any programming competition. ...
doi:10.3390/computers10040047
fatcat:ysklym6ijrdf5g2jvx5gxmwwuy
Staff Use of Technology-Enhanced Assessment in Higher Education: A Systematic Review
2018
Figshare
Staff Use of Technology-Enhanced Assessment in Higher Education: A Systematic Review ...
information world. ...
Other trialled or suggested approaches to reduce cheating and plagiarism included time limits/website restrictions for online exams, use of a virtual proctor, use of biometrics for identification and binding ...
doi:10.6084/m9.figshare.7182467.v1
fatcat:ccqc7k3bmjdmrh3gehdb4lo2ve
Software Similarity Detection Scheme Exploiting Executable Fingerprint
2017
International Journal of Grid and Distributed Computing
In this paper, we propose a novel scheme for software plagiarism detection for Windows executables. Our technique exploits both the extended basic block concept and the Linux command objdump. ...
Therefore, software similarity analysis systems for Windows OS are highly useful for software plagiarism detection and copyright protection. ...
In this paper, we proposed a fingerprint technique to detect software plagiarism for binary executables in the Windows OS environment. ...
doi:10.14257/ijgdc.2017.10.12.12
fatcat:rtka5722orbj7ji7qukwdbifdi
Recent Trends in E-Learning and Technologies
2021
Asian journal of applied science and technology
progress, as well as the detection of plagiarism. ...
VR can be classified into: virtual worlds, augmented reality (AR), mixed reality (MR), and extended reality (XR). ...
Consent for publication Author declares that he/she consented for the publication of this research work. ...
doi:10.38177/ajast.2021.5405
fatcat:got3zfg2hbebzadtpgw27r7hhy
Cyber Security Threats detection in Internet of Things using Deep Learning approach
2019
IEEE Access
The IoT (Internet of Things) connect systems, applications, data storage, and services that may be a new gateway for cyber-attacks as they continuously offer services in the organization. ...
Then, the deep learning approach is used to detect source code plagiarism. The dataset is collected from Google Code Jam (GCJ) to investigate software piracy. ...
GitHub framework • This framework trains the model automatically based on input, hidden and output layers with different activation functions. • It offers reliable services while updating and extending ...
doi:10.1109/access.2019.2937347
fatcat:l5fhaizpbfee3gv4jlyhw7e2b4
Improving the Reproducibility of PAN's Shared Tasks:
[chapter]
2014
Lecture Notes in Computer Science
This paper reports on the PAN 2014 evaluation lab which hosts three shared tasks on plagiarism detection, author identification, and author profiling. ...
readily available for further analysis. ...
Moreover, we thank our student assistants Anna Beyer and Matthias Busse for helping with maintaining TIRA. Our special thanks go to all of PAN's participants. ...
doi:10.1007/978-3-319-11382-1_22
fatcat:anztewljlbgznjdipotoxcdp2q
Role of Librarians and Information Scientists in Plagiarism Control A Study of NIRF Ranked Engineering Institutions Ranked in 2020
2021
DESIDOC Journal of Library & Information Technology
that their institutions have plagiarism policy, and most of the institutions are using Turnitin and/or Urkund Anti-Plagiarism detection tool as well. ...
The study was conducted to ascertain the role played by librarians and information scientists in controlling plagiarism in NIRF ranked engineering institutions ranked in 2020. ...
extended research questions: To recognise the role played by librarians and information • scientists in controlling plagiarism. ...
doi:10.14429/djlit.41.03.16716
fatcat:wlsgzhy6uvbzzhna7noo6h2fxq
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection
2015
IEEE Transactions on Software Engineering
We show how the values can be extracted and refined to expose the critical values and how we can apply this runtime property to help solve problems in software plagiarism detection. ...
code from being detected. ...
ACKNOWLEDGMENTS The authors would like to thank Jonas Maebe of University of Ghent for his help in compiling and using Loco and Diablo; Semantic Designs, Inc. for donating C/C++ obfuscators. ...
doi:10.1109/tse.2015.2418777
fatcat:uc2n42syy5fi7msp7lbfk4g2au
An Adaptive Image-based Plagiarism Detection Approach
2018
Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries - JCDL '18
To improve the detection capabilities for disguised forms of academic plagiarism, we analyze the images in academic documents as text-independent features. ...
We propose an adaptive, scalable, and extensible image-based plagiarism detection approach suitable for analyzing a wide range of image similarities that we observed in academic documents. ...
A technical challenge to the detection effectiveness of the proposed PD approach in the real-world detection settings we imposed for our experiments is OCR effectiveness. ...
doi:10.1145/3197026.3197042
dblp:conf/jcdl/MeuschkeGSBKG18
fatcat:uesb4oemsjdrre5kyn7q5sle6u
IRRODL Volume 7, Number 1
2006
International Review of Research in Open and Distance Learning
The authors would like to thank Rob Murray and Nazanin Naraghi for their assistance and two anonymous reviewers for their helpful comments. ...
Acknowledgements This research was conducted with support from National Science Foundation's Digital Libraries in the Classroom program, grant # 0229210. ...
Differences in the types of plagiarism detected may account for some of the variation in plagiarism rates obtained in the three studies. ...
doi:10.19173/irrodl.v7i1.1093
fatcat:dmkredeqrngzbd5nx5rpmoh7vy
« Previous
Showing results 1 — 15 out of 2,466 results