$3 3 5"9'!)-/%&!$96$5)'($ (.05#'(!"*(.$%))($:)"!!"*$;"-/ #+# ( (4-445 < 2017

Size: px
Start display at page:

Download "$3 3 5"9'!)-/%&!$96$5)'($ (.05#'(!"*(.$%))($:)"!!"*$;"-/ #+# ( (4-445 < 2017"

Transcription

1 «!"-#$%&'()*+"'#,$'-/!!0*#!)/')-/-» ( ) 1 23 ( «4»,"5#'-)-&(6$7)-/ 628,, ($, 2017 $3 3 5"9'!)-/%&!$96$5)'($ (05#'(!"*($%))($:)"!!"*$;"-/ #+# (,, ) %! 2017 $ ( ' 2017!, «4» % 2017 < 2017

2 ' + «$ 3 3» <: +;"#5" «#+#» (!)#) >4(!; 2017, 60, 23 ; 37 8 $3 3, 3,,, 2,, 8,, 3,,, 2 3!" #" #$% & '& 5 ()** ( ) +,- 60

3 "+%$%/!)/ 7 /,/!)/ 10 $ 10 : "? " ";6"-/@!"%"+)*$6$;"-(),/-4(-"$5%$+)$-$ 14 11" $ ' ' XML ) ( ! , 25 12, SIM Plan-X JPlag MOSS 28 7

4 125 SID %$!)"$!)/ 29 21" C Visual Basic Java C# NET 30 22" OC Windows 32 23" 33 24' ' ' ' ' "/(-)"$!)/')'-/ ' '

5 4 /$%)6$:)9')'-/ ; 45 42) /'-)"$!)/ $(%</!)/ 57 ;);%)"+$)</'()*'5)'"( 58 9

6 ) , !,? 2, 3,, 68 3, "2, (,, 3, 22!, 8 : 5 -, A, [1] 5-3 [2], (,, ), ( 2 ) [2] 5 [3] 5 -,! 10

7 2 3, 283, 3) [+ ru], 2,, 22 -,,, «$ 1?» '8 3,, AntiPlagiatru [4],, 2 ) 3 /8, 8 «$#6» [5] 1, ' 82 2,,,,! 3 3, 2,, ) 3 3,,,, )A1 8, 3-6 ;,, -, ) -, 3 3 ', 8 5, 11

8 3, ) : 3 3 3; ; ; 3 3 ; 1 ; 1 «$3 3», 28 3, 3!" #$% ' #28 :,,,, 5 3 [12] 12

9 ! & ' Accuse Donaldson[6] Fortran no Bandit West [7] no Cogger no JPlag Tichy, Malhopl, Prechelt [8] Java, C, C++, Scheme on-line MOSS Aiken [9]! yes Plague Whale [10] no Plan-X Christa Fotel, Lars Danger [11] SML: source code Sherlock Joy, Luck [12] no SID Chen, Francia, Lin, Mckinnon, Seker [13] Java, C++ Siff Udi Manber [14] Java - no source code sim Gitchell [15] C no SIM Grune [16] C, Java, Pascal, Modula2, Miranda on-line TEAMHA NDIN Culwin, Naylor [17] no YAP Wise [18] no YAP3 Wise [19] no - 1 "8 5: MOSS 283 : ', C++, Java, '#, Python, Visual Basic, Ada, Perl, TCL, Matlab, VHDL, Verilog, Spice, MIPS assembly, a8086 assembly, HCL2, Javascript, FORTRAN, ML, Haskell, Lisp, Scheme, Pascal, Modula2 13

10 1 ()*+ (), )-,)) 11 #/%'/!0 ''/ " ( ) : - (attribute-counting) '82, " 3 ' 2 ( ) 3, 3,, $ 33, ( 3 3 ) n- ( ), 3 3, 3, [20] 3, [21] 3 3 ( 3 )!,, $ , ! -, 3, 1 [113], 28 : 14

11 N-'! 1 5 n-! 1 n-, n = 5, 3 3 3, (, Accuse[6]),, n- 3,, 3 - /!,?3 33, 133,,, 5, 3 ( ) (attribute-counting systems), 3, 3 (, / ) 3 15

12 !3 n-, 3,, 13 3, 3, 83, -3,,, /8,, ", 1, 8, 233 < 22 2,, 2, 28 [22] 33 /, 3! 2,! ,, /8 < 3 2 ", 3,, 3, 3 16

13 #% 2'3, 3,,!,, 28! 1 1, 1 " 2, 3, 8, 1 n-, A 17

14 )20 3 -, for(int i = 0; i <= n; i + +) for(int j = 0; (j 1) < n; j + +), 28, 3 2, 2!, 1! 83 ', 2 2, : ( 2, (, C++, = AV, == E, class C, new NO, while CW, if IF, return R )! 18

15 , 3 3 ' 3, 3 "1 ( [23]) 3 -, (, 3,,,,, ) ( 3) 5, 3 3 1, 1 3, 33 3 (, 2,,,? 3 13,?1 ; 2 2 [23, 158] 5,,, $)(, #, 3 (, 3 ) - 3 "1 [23, 156] " 1 [24] 19

16 4 ( ) 1 8,, ( 4), 8 28,,, ,,, 282,,, Java Jscript, Visual Basic VBScript, JavaScript ECMAScript, C, C++, C#, elisp, Perl, Python, Tcl, Ruby, PHP, sed awk 2 3 3, !, 8, 28: «func1», 3: «int func1(int a)», «int b = obj- >func1(12)» 20

17 «Name1» «P»; «Name1», 3,? «int Name1» «string Name1»;, [24],, 823 1,, 3 3, 3 $ 1121 ' 5 3 [23] a b ( ) , 3,1 2 3 (, 3 a b) $, 1122 XML- 5 ( 5) ( ), (, 3 ), 3 XML ) 3 XML 83 21

18 5, 33, 3 Pascal ', 3, 1 3 XML-, 3 2, XML 5 ' ) (, (an information based sequence distance): ((3) -( 3 " 3 5 2, ((3) - 22

19 , 3, ((3 ) -, 3,, ((3); (((3) - ((3 )) - "" 3 5 2, ((3 ) - 1, ? 1 1, 2 ' 8,, ',, ) ( ) 5 : abrakadabra ( 11 ; m = 11) A- 22 k, 83 5 k -,, k = 3: abr, bra, rak, aka, kad, ada, dab, abr, bra ( k-, m n, n = (t - (k - 1)) ( n = k-, 3- (h\ hn) 33,,, 3-: 12, 35, 78, 3, 26, 48, 55, 12, 35!,, (fingerprints) 3, 23

20 1 / 3-2, 33, !?,1, 3:! 3 - i- n ", 2, 23 (, 1, 3 k-, ) [25] 33-, 3 3 ' 821, 3 3, 3 3, [26] 3-, 3 h = 0 mod, n/p (? 3, ) ", 1 3-1,, (winnowing) [27] 1 $, 333 8,

21 113 %! 30'/ 5 (, - 1 3,,! 2 ( 6) 8, 3, 3, / ) , " 3 " 25

22 23! ,, , 8 3,,, 1 12 %!" # $% 3 3 (3 3) 3 2-1! 1 3, A1 [11] 4 : 4 / Accuse n- 3 Bandit - 82 Dotpot Cogger Case Based Reasoning 3 JPlag Greedy String Tiling MOSS fingerprints winnowing Plan-X XML XMLStore Sherlock ' 28 ( 3, Plague, ( SID, EToken Compress Siff fingerprints approximate fingerprint SIM TEAMHANDIN YAP3 Greedy String Tiling 82 (- - 2, 3, SIM Plan-X 3,

23 121 SIM SIM (Software Similarity Tester) Dick Grune (Vrije Universitet) SIM 5 ', Java, Pascal, Modula-s, Miranda $ SIM 3 (ftp://ftpcsvunl/pub/dick/similarity_tester/technreport) Plan-X, XML Store - XML ' XML-, 2 XML Store 3 28, 3 HTML-! , JPlag 1996 Guido Malpohl, 3, 3 5 : C++, Java, C, Shelme 1,, 3, Greedy String Tiling [28], «12 3 Java, JPlag 3 2» 27

24 124 MOSS (Measure of Software Similarity) 1994 Alex Aiken (UC Berkley) 5 : ', C++, Java, C#, Python, Visual Basic, Javascript, FORTRAN, ML, Haskell, Lisp, Scheme, Pascal, Modula2, Ada, Perl, TCL, Matlab, VHDL, Verilog, Spice, MIPS assembly, a8086 assembly, a8086 assembly, MIPS assembly, HCL2 5 MOSS, [29] $ " "(winnowing) 3 (fingerprints)" 8 $ SID SID (Software Integrity System) ' X Chen, Francia, Mckinnon, A Seker, and Li UCSB and UW Bioinformatics groups 5 : Java C++ $ " ( TokenCompress (3-8 ) 21: )3, d(x, ) - 8, 1 TokenCompress d 4 $ SID 2, 28

25 2 21!!0'/!0 ' [11], ', 283 : Java Jscript, Visual Basic VBScript, JavaScript ECMAScript, C, C++, C#, elisp, Perl, Python, Tcl, Ruby, PHP, sed awk 211&'/!0 C++ ( [30] C++? -, C, 2 ""5 (? - ), ", 28 C++, ', 2 '8 C++, 3 - Windows, 1 212&'/!0 Visual Basic Visual Basic [31] 1, (,'"-) 33 Visual Basic, MFC, Win32 API 3 " Visual Basic +3-1, 1, 2 C++ 29

26 (1,, 3, VBNET) Visual Basic - 1?,? - 1 Visual Basic, 3, &'/!0 Java 9 Java [32] - 1 2? -, C++ 9 Java 8, C++ Java ( ), 3 '3 82 Java 2 83, 3 8, 2, 3 web-,, 2, 28 8 "3 2, Java 1 31 Java? 214&'/!0 C# '5 NET! $)( NET[33] '#[33] 5 Windows 30

27 NET 3, 3 3 ", NET 8 '" ( 83 3 ), NET, 4 1'" - 3 ' Microsoft -'# ('>) 4, Java, C++ ( ) " '# Visual Basic 60, '#, 333, C++, Java Visual Basic, '# ", NET 2 3 NET- 3 (, 3 ) 3 '#! 2, 3 NET'1 (,,, '#) 2 NET- - 3 NET, 3 + 2, '# 3 3 )3, C# 31

28 22!! '2% 221 OC Windows ) [21], NET Windows ( 8 NET, C#, Windows Microsoft Windows 10 [34] "' Windows 2, 1,, Windows 2 2, 3 3 6A NET A 2 2! 5( ( [35]) 7, 5( )3 OC Windows ( $)(, Windows Presentation Foundation[36] 32

29 Windows Presentation Foundation ( WPF) Windows 28 ' WPF 3, 83 5 Contoso Healthcare, 28 8 " Contoso Healthcare 23!!, $)( Microsoft Visual Studio Enterprise 2015 Visual Studio Microsoft ' 3, Visual Studio IntelliSense 2 3, "

30 , -, 33 Visual Studio 2 (), 2 3 (,, Subversion Visual SourceSafe), 3 (, ) 3 (, Team Explorer Team Foundation Server) 2412 '!0 ', 28, 82 UML ( 9) 34

31 9, % / 5% «6» 2 ( 10) 10 " 3! «,», Windows, 4 6 3, 35

32 , «"(» 2 «)3» ( 11) ( «"» %! 5%! 0! ( 12) 12 " 3 5 /, «()», 36

33 3 1 4 / «()», «()», , «"(» 3 «(» ()( «"» 13 ' % «!» ( 14) () 37

34 A33, 3 A 5 «5», '! 5 2 «'»,, ' 6 241, (, 2) 5 «6» 3, «( ())», 3, 13, ( 16) 38

35 , «(» ( 17)

36 25)!0 '2% 5 8 Windows! 3 23,, Windows 7 26)! ''% '$)(5(, - 3,, 5( 40

37 3,) 11)46 (2 1, 28: !! ; 3, 283 : ) 3 3 ; ' ,?, 1 3 ; $ 3 3 ; 8 ; 5 3 ; 5 32/! /!!0, 3 (3 : 41

38 )3 - N- 3211!',1 «)3», - 2, 8, 3, , # $ 1124!? ; (winnowing) [27] $ : 1 28 t, ; 2 k, 2 (5 t k 2 3 ) 5 2 k- < k,,! k k < 1 3 ( ), 3 83 (t - k + 1)

39 ) : w = (t - k + 1) hi h, 8 2! hj / 12, 5 21 t = 5, k = 2: A do run run run, a do run run 5 adorunrunrunadorunrun # 8 adoru dorun orunr runru unrun nrunr runru unrun nruna runad unado nador adoru dorun orunr runru unrun (77, 74, 42, 17) (74, 42, 17, 98) (42, 17, 98, 50) (17, 98, 50, 17) (98, 50, 17, 98) (50, 17, 98, 8) (17, 98, 8, 88) (98, 8, 88, 67) (8, 88, 67, 39) (88, 67, 39, 77) (67, 39, 77, 74) (39, 77, 74, 42) (77, 74, 42, 17) (74, 42, 17, 98), , [17, 3] [17, 6] [8, 8] [39, 11] [42, 14] [17, 15] (,, %2,, 33 8,,, 5, d- 3-, 3, 33- [27], 43

40 d = 2/(w+l) - ( ) 3231!%'/!0, n-!, 1 8 n-, n-,, 1 " 8, 3, 3 (, 3 3, 283\1 ), 3 / 8,, 22, 3, ! , 8, 33 5% 3 28:! ; # 8; # ( 221, Windows Presentation Foundation

41 4 & 11)46 5 $)( C# Visual Studio : ; ) /8, 41(!! ( ( 18) 18 ( (, : Inspection, 3 Token?, 3 45

42 Point -? n- StringFile string, 3 13, SystemObject ProductCompare? 3 Instrumets, 8, 3, SystemTextRegularExpressions FileProgram,, 82 2, 8,, Dir,, FileProgram,, 82, ResultString,? 2 5 ProductCompare:! " #$ #$% &' %!(!( ) "(!%( ) (!% (*$% +,,,, % 1 ' 46

43 5 Instrumets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

44 * (*][\ O=/;PK9S0L6/I,,, % % ) WPF 282 : 19 ( 48

45 ( ( 19), : MainWindow ( 20), 3 : «)3», «(», «( ()):», 3 24, 2! 2, «)3»,,! «(», 1,, $)( ; WPF 3 3, 3 C# XAML 5 XAML: B ^ >!_#(RB> >#^ # ( ( `aab > ^ >#^ # ( ( `aab > ^>#^ # ( ( `aac> ^>#^ # ( (+de`aab> ^>d ^!_#> ^>d ^e ( e > 49

46 ^f>> B>R g> >RB) > _>!_#>h#>iaa>b#>[aaa> T T(j jb#>e>rb#>\aa> jb#>!> jb#>e>rb#>\aa> T(j T(*j *jh#>!>*j *jh#>e>*j *jh#>!>*j *jh#>a(`e>*j T(*j TT(>[>T(*>[># ]$> >B#>\> hg!>>w!>#>"+>te> TT(*>`>T(>\>h#>\> hg!>#>w!>>"+>te> % 4 XAML! 4 $)(, " MainWindow 2 1,, AddFile ( 10), XAML: B ^ >!_#(!> >#^ # ( ( `aab > ^ >#^ # ( ( `aab > ^>#^ # ( ( `aac> ^>#^ # ( (+de`aab> ^>d ^!_#> ^f>> Be>_B> * gr>rg> _>k3m01h6/k6o0qh0>h#>[\a>b#>bla> T T(*j *jh#>a(me>*j *jh#>a(be>*j *jh#>a([e>*j *jh#>a(be>*j *jh#>e>*j T(*j T(j jb#>e> jb#>a(\e> T(j _ " ^->)]#>B#>lca>T(>`>T(*>[>R>la> hg!>>_ " " ^->)!>>k3m01k7no0qh>t(>[>t(*>[> +>)!)+>R>la>" 50

47 _ " ^->)!#>B#>lca>T(>`>T(*>\>R>la> hg!>>_ " _ "+T(>[>T(*>\>hg!>>R>l a>o164k76kl90173:0_ "+ " ^->)pq>>pq>t(>a>t(*>l> hg!>>r>aaa[a>w!>">b#>im> +>)pq)+> " ^->)>>r7l6/0>t(>[>t(*>l> hg!>>r>aaa[a>w!>">b#>im> +>))+> T B % 5 ( XAML SelectDir ( 12), XAML: B ^ >!_#(j> >#^ # ( ( `aab > ^ >#^ # ( ( `aab > ^>#^ # ( ( `aac> ^>#^ # ( (+de`aab> ^>d ^!_#> ^f>> Be>_B> * gr>rg> _>oim:07no0qhi4h98:01/6/k9>h#>[\a>b#>bla> T T(*j *jh#>a(me>*j *jh#>a(me>*j *jh#>e>*j T(*j T(j jb#>e> jb#>a(\e> T(j +]T(>`>T(*>a>p>hg> *" ^->)j>t-> pj>>oim:07n50;=> R>[al>f #+>_> >oim6:k76hsm3qo0qhk0173l07k<68;k1imk:6789;070h3g G46H6JK7t737O0QH>*" *" ^->) >T-> pj>>oim:07no0qhi> R>[al>*" +] _ " ^->)]#>B#>lca>T(>`>T(*>[>R>la> hg!>> >u468ns =7n;505;61;373:3q2:0/k9789 1IM:0//IQ6O0QHI>_ " " ^->)j>>oim:07no0qhi>t(>[>t(*>[> +>)j)+>r>la>" " ^->)pq>>pq>t(>a>t(*>\> hg!>>r>aaa[a>w!>">b#>im> +>)pq)+> " ^->)>>r7l6/0>t(>[>t(*>\> hg!>>r>aaa[a>w!>">b#>im> +>))+> T B % 6 ( XAML 51

48 LineInspect ( 21) 21 " 5 : B ^ >!_#(f > >#^ # ( ( `aab > ^ >#^ # ( ( `aab > ^>#^ # ( ( `aac> ^>#^ # ( (+de`aab> ^>d ^!_#> ^f>> Be>_B> * gr>rg> _>v:01/6/k65387:3;0l>h#>[ma>b#>\`l> T T(*j *jh#>e>*j *jh#>a(me>*j T(*j +]T(*>a>W!>> *" ^->)]>R>[a[>T->R> >w0:0l67:ksk:310//i687:3;k53=l3h<0/ks>f #+>_>*" *" ^->)>R>[a[>T->R>>v7:3;K;0; 687n>*" +] " ^->)pq>t(*>[>hg!>> W!>>>pq>B#>im>+>)pq)+> T B % 7 ( 52

49 5 )1) 5172! 1 (5") 3 3, 5" 3 3,,, 5", [37] ) 81 1!!# 5%! #/ 3 : $ ": 3, «6», 5 : 3, «6», ) 82 1! / 5% 5% #/ 3 : $ ": 3, «6», 5 : 3, «6», 53

50 ) 83 1! / 5% ''% 5%! #/ 3 : $ ": 3, «6», 5 : 3, «6», ) 84 1! / 5% ''% 5%!,! "!# 5%! #/ 3 : $ , 3 ": 3, «6»,, 40 5 : 3, «6»,, 58 52)! 5% - 3, : 5 1 "! 54

51 ) 81 ''!! #/ 5% 5%! 0!0 3 : $ 3 3 «6», 3 ": «6», 5 : ( 22) 22 ' ) 82!0 5% #/!0! 3 : $ ": «"(», 5 : ( 23) 55

52 23 ' 56

53 ,9: :2 $3 3, 28: ) C# Windows Visual Studio " ' $3 3 5, , 8 8, 3 [32] 57

54 ((7:1,+ 11, 1", ')' : «#''()*960(», ', CM 4 '5, '3, $9, (3,/; 2, )-$ [4 ] URL: 5$#6 [4 ] URL: 6 J L Donaldson, A Lancaster and! Sposato, A plagiarism detection system, ACM SIGSCI Bulletin 13(1), February 1981 pp(21-25) 7 West A Copying with plagiarism in Computer Science teaching laboratories, Computers in Teaching Conference Dublin, Prechelt L, Malpohl, G, Philippsen M, JPlag: Finding Plagiarisms among a Set of Programs, Technical Report , Fakultat fur Informatik, Universitat Karlsruhe, Schleimer S, Wilkerson D S, Aiken A Winnowing: local algorithms for document fingerprinting, Proceedings of the 2003 ACM SIGMOD international conference on Management of data San Diego, California, June 09-12, Whale G Identification of program Similarity in Large Populations, The Computer Journal, Vol33 Number 2, Fotel C, Langer L A Plagiarism Detection Tool May 19, M Joy and Michael Luck, Plagiarism in Programming Assignments, IEEE Transactions on education AMI 42, NO 2, May Chen X, Francia B, Li M, Mckonnon B, Seker A Shared information and program plagiarism detection University of California, Santa Barbara, December 13, Udi Manber and Brenda S Baker, Deducing similarities in Java sources from bytecode, 1998 USENIX Technical Conference New Orleans, June

55 15David Gitchell and Nicholas Tran, Sim: A utility for detecting simile,rity in computer programs, Wichita State Univercity 16Dick Grune, Matty Huntjens, Het detecteren van kopieen bij informaticapractica, Nov 1989, pp Culwin F and Naylor J, Pragmatic Anti-Plagiarism, Proceedings Third Conference on the Teaching of Computing DCU Dublin IE Michael J Wise, Detection of similarities in student programs: YAP ing may be prefarable to Plague ing, SIDSCI Technical Symposium Kansas City, USA, March 5-6, 1992 pp 268,271 19Michael J Wise, String similarity via Greedy Tiling and Running Karp-Rabin Matching, an unpublished paper December @! Halstead, Elements of software science, North Holland, New York, (- J McCabe, A complexity measure, IEEE Transactions on Software Engineering, SE-2 (4) December 1976 pp Verco, ( and Wise, (1996) Software for detecting suspected plagiarism: comparing structure and attribute counting systems, In Proc First Australian Conf on Computer Science Education, Sydney Australia, July 3-5, pp ACM Press, New York, USA 23$ $3, ' %, ',,,# ( :, 3 = Compilers: Principles, Techniques, and Tools 2- :, 2008 ISBN ,, = Mastering Regular Expressions '5: «5», N Heintze, Scalable document fingerprinting In 1996 USENIX Workshop on Electronic Commerce, U Manber, Finding similar files in a large file system In Proceedings of the USENIX Winter 1994 Technical Conference, pages 1-10, San Francisco, CA, USA,

56 27A Aiken, S Schleimer, D Wikerson, Winnowing: local algorithms for document fingerprinting In Proc 2003 ACMSIGMOD Int Conf on Management of Data, San Diego, CA, June 9-12, pp ACM Press, New York, USA, Prechelt L, Malpohl, G, Philippsen M, JPlag: Finding Plagiarisms among a Set of Programs, Technical Report , Fakultat fur Informatik, Universitat Karlsruhe, Saul Schleimer, Daniel S Wilkerson, Alex Aiken, Winnowing: local algorithms for document fingerprinting, Proceedings of the 2003 ACM SIGMOD international conference on Management of data, June 09-12, 2003, San Diego, California 30;A' 9 C++ = The C++ Programming Language / 5 3- '5; :! ;, ISBN (!), ISBN (; ), ISBN () 31Maureen Williams Zimmerman Microsoft Visual Basic 60 Reference Library Redmond, WA, USA: Microsoft Press, ISBN > Java 8 5, 9- = Java 8 The Complete Reference, 9th Edition :, ISBN (! C# 50 NET 45 = Professional C# 50 and NET 45 : «,», ISBN URL: 35URL: 1%D1%82%D0%B8%D0%BA%D0%B0/page-6html 36Windows Presentation Foundation [4 ] URL: 60

57 37(% + : 8 5"3 = Agile Testing: A Practical Guide for Tester and Agile Teams /%( :,

Plagiarism and its Detection in Programming Languages

Plagiarism and its Detection in Programming Languages Plagiarism and its Detection in Programming Languages Sanjay Goel, Deepak Rao et. al. Abstract Program similarity checking is an important of programming education fields. The increase of material now

More information

COMPARATIVE STUDY OF EXISTING PLAGIARISM DETECTION SYSTEMS AND DESIGN OF A NEW WEB BASED SYSTEM NEERAJA JOSHUA SAMUEL. Bachelor of Commerce

COMPARATIVE STUDY OF EXISTING PLAGIARISM DETECTION SYSTEMS AND DESIGN OF A NEW WEB BASED SYSTEM NEERAJA JOSHUA SAMUEL. Bachelor of Commerce COMPARATIVE STUDY OF EXISTING PLAGIARISM DETECTION SYSTEMS AND DESIGN OF A NEW WEB BASED SYSTEM By NEERAJA JOSHUA SAMUEL Bachelor of Commerce University of Delhi New Delhi, India 1985 Submitted to the

More information

Plagiarism detection for Java: a tool comparison

Plagiarism detection for Java: a tool comparison Plagiarism detection for Java: a tool comparison Jurriaan Hage e-mail: jur@cs.uu.nl homepage: http://www.cs.uu.nl/people/jur/ Joint work with Peter Rademaker and Nikè van Vugt. Department of Information

More information

A Comparison of Algorithms used to measure the Similarity between two documents

A Comparison of Algorithms used to measure the Similarity between two documents A Comparison of Algorithms used to measure the Similarity between two documents Khuat Thanh Tung, Nguyen Duc Hung, Le Thi My Hanh Abstract Nowadays, measuring the similarity of documents plays an important

More information

Software Plagiarism Detection Techniques: A Comparative Study

Software Plagiarism Detection Techniques: A Comparative Study Software Plagiarism Detection Techniques: A Comparative Study Divya Luke 1, Divya P.S 2, Sony L Johnson 3, Sreeprabha S 4,Elizabeth.B.Varghese 5 1 Marthoma College of Management and Technology, Perumbavoor,

More information

An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram

An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram An Approach to Source Code Plagiarism Detection Based on Abstract Implementation Structure Diagram Shuang Guo 1, 2, b 1, 2, a, JianBin Liu 1 School of Computer, Science Beijing Information Science & Technology

More information

A Similarity Detection Platform for Programming Learning

A Similarity Detection Platform for Programming Learning A Similarity Detection Platform for Programming Learning Yuanyuan Li, Yu Sheng, Lei Xiao and Fu Wang School of Information Science and Engineering, Central South University, Lushan South Road, Changsha,

More information

Languages october 22, 2017 Éric Lévénez <http://www.levenez.com/lang/> FORTRAN III end-1958 FORTRAN II FORTRAN I october 1956

Languages october 22, 2017 Éric Lévénez <http://www.levenez.com/lang/> FORTRAN III end-1958 FORTRAN II FORTRAN I october 1956 1954 1957 FORTRAN november 1954 FORTRAN I october 1956 FORTRAN II 1957 FORTRAN III end-1958 B-O 1957 Flow-Matic 1958 COBOL 1959 JOVIAL 1959 IAL 1958 ALGOL 58 1958 Lisp 1958 Lisp 1 1959 Languages october

More information

Automatic Generation of Plagiarism Detection Among Student Programs

Automatic Generation of Plagiarism Detection Among Student Programs Paper Number 165 1 Automatic Generation of Plagiarism Detection Among Student Programs Rachel Edita Roxas, Nathalie Rose Lim and Natasja Bautista Abstract A system for the automatic generation of plagiarism

More information

Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus

Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus Jonathan Y. H. Poon Kazunari Sugiyama National University of National University of Singapore Singapore Computing 1, Computing

More information

Fast Plagiarism Detection System

Fast Plagiarism Detection System Fast Plagiarism Detection System No Author Given No Institute Given Abstract. Plagiarism on programming courses has always been a difficult problem to counter; the large numbers of students following such

More information

Winnowing: Local Algorithms for Document Fingerprinting

Winnowing: Local Algorithms for Document Fingerprinting Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer MSCS University of Illinois, Chicago saul@math.uic.edu Daniel S. Wilkerson Computer Science Division UC Berkeley dsw@cs.berkeley.edu

More information

EPlag: A Two Layer Source Code Plagiarism Detection System

EPlag: A Two Layer Source Code Plagiarism Detection System EPlag: A Two Layer Source Code Plagiarism Detection System Omer Ajmal, M. M. Saad Missen, Tazeen Hashmat, M. Moosa, Tenvir Ali Dept. of Computer Science & IT The Islamia University of Bahawalpur Pakistan

More information

Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus

Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus Instructor-Centric Source Code Plagiarism Detection and Plagiarism Corpus Jonathan Y. H. Poon, Kazunari Sugiyama, Yee Fan Tan, Min-Yen Kan National University of Singapore Introduction Plagiarism in undergraduate

More information

Principles in Programming: Orientation & Lecture 1. SWE2004: Principles in Programming Spring 2014 Euiseong Seo

Principles in Programming: Orientation & Lecture 1. SWE2004: Principles in Programming Spring 2014 Euiseong Seo Principles in Programming: Orientation & Lecture 1 1 Course Objectives Introduce various subjects in computer science through puzzles and problems Most problems came from ICPC 2 Textbook Programming Challenges

More information

An XML Plagiarism Detection Model for Procedural Programming Languages

An XML Plagiarism Detection Model for Procedural Programming Languages Computer Science Technical Reports Computer Science 2003 An XML Plagiarism Detection Model for Procedural Programming Languages Seo-Young Noh Iowa State University Follow this and additional works at:

More information

Plagiarism Detection: An Architectural and Semantic Approach. Matthew Salisbury. Computing. Session 2009

Plagiarism Detection: An Architectural and Semantic Approach. Matthew Salisbury. Computing. Session 2009 Plagiarism Detection: An Architectural and Semantic Approach Matthew Salisbury Computing Session 2009 The candidate confirms that the work submitted is their own and the appropriate credit has been given

More information

SOURCE CODE AND TEXT PLAGIARISM DETECTION STRATEGIES

SOURCE CODE AND TEXT PLAGIARISM DETECTION STRATEGIES SOURCE CODE AND TEXT PLAGIARISM DETECTION STRATEGIES ABSTRACT Plagiarism and collusion among students may be facilitated by the preponderance of material in electronic format and the ability to submit

More information

Plagiarism Detection. Lucia D. Krisnawati

Plagiarism Detection. Lucia D. Krisnawati Plagiarism Detection Lucia D. Krisnawati Overview Introduction to Automatic Plagiarism Detection (PD) External PD Intrinsic PD Evaluation Framework Have You Heard, Seen or Used These? The Available PD

More information

Discovering Computers Chapter 13 Programming Languages and Program Development

Discovering Computers Chapter 13 Programming Languages and Program Development Discovering Computers 2009 Chapter 13 Programming Languages and Program Development Chapter 13 Objectives Differentiate between machine and assembly languages Identify and discuss the purpose of procedural

More information

PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets

PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets The Computer Journal Advance Access published June 24, 2005 The Author 2005. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please

More information

Principles in Programming: Orientation & Lecture 1. SWE2004: Principles in Programming Spring 2015 Euiseong Seo

Principles in Programming: Orientation & Lecture 1. SWE2004: Principles in Programming Spring 2015 Euiseong Seo Principles in Programming: Orientation & Lecture 1 1 Course Objectives Introduce various subjects in computer science through puzzles and problems Most problems came from ICPC 2 Introduction Instructor:

More information

SOURCE CODE PLAGIARISM DETECTION FOR PHP LANGUAGE

SOURCE CODE PLAGIARISM DETECTION FOR PHP LANGUAGE SOURCE CODE PLAGIARISM DETECTION FOR PHP LANGUAGE Richard Všianský 1, Dita Dlabolová 1, Tomáš Foltýnek 1 1 Mendel University in Brno, Czech Republic Volume 3 Issue 2 ISSN 2336-6494 www.ejobsat.com ABSTRACT

More information

AUTOMATED EVALUATION OF STUDENT DESIGNS IN DIGITAL SYSTEM DESIGN LABORATORIES. Mark C. Johnson

AUTOMATED EVALUATION OF STUDENT DESIGNS IN DIGITAL SYSTEM DESIGN LABORATORIES. Mark C. Johnson AUTOMATED EVALUATION OF STUDENT DESIGNS IN DIGITAL SYSTEM DESIGN LABORATORIES Mark C. Johnson Purdue University, West Lafayette, Indiana; Email: mcjohnso@purdue.edu ABSTRACT Rigorous evaluation of the

More information

SSID: A User-Centric Plagiarism Checking System

SSID: A User-Centric Plagiarism Checking System Title B. Comp. Dissertation SSID: A User-Centric Plagiarism Checking System By Poon Yan Horn Jonathan Department of Computer Science School of Computing National University of Singapore 2009/2010 Title

More information

Classifications of plagiarism detection engines

Classifications of plagiarism detection engines Innovation in Teaching and Learning in Information and Computer Sciences ISSN: (Print) 1473-7507 (Online) Journal homepage: http://www.tandfonline.com/loi/rhep14 Classifications of plagiarism detection

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Last Activity Recorded: March 12, 2009 Microsoft Certified Professional NEAL WALTERS 1770 PLUMMER DR ROCKWALL, TX 75087 US nwalters@sprynet.com Microsoft Certification Status Credential Microsoft Certified

More information

Introduction to Computer Science I

Introduction to Computer Science I Introduction to Computer Science I CSE 1020 www.cse.yorku.ca/course/1020 Programming Contests in September and October Everyone is welcome to participate in these contests. The students who will represent

More information

CSCI 3136 Principles of Programming Languages

CSCI 3136 Principles of Programming Languages CSCI 3136 Principles of Programming Languages Summer 2013 Faculty of Computer Science Dalhousie University 1 / 100 CSCI 3136 Principles of Programming Languages Summer 2013 Aminul Islam Faculty of Computer

More information

Computer Science. Computer Science 211. Degrees and Certificates Awarded. A.S. Computer Science Degree Requirements. Program Student Outcomes

Computer Science. Computer Science 211. Degrees and Certificates Awarded. A.S. Computer Science Degree Requirements. Program Student Outcomes Computer Science 211 Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface

More information

Modern Stored Procedures Using GraalVM

Modern Stored Procedures Using GraalVM Modern Stored Procedures Using raalvm Oracle Labs Matthias Brantner Safe Harbor Statement The following is intended to outline our general product direction. t is intended

More information

Introduction to Engineering Using Robotics Experiments. Dr. Yinong Chen

Introduction to Engineering Using Robotics Experiments. Dr. Yinong Chen Introduction to Engineering Using Robotics Experiments Dr. Yinong Chen Outline Historical Perspective Programming Language Generations Programming Language Paradigms Imperative Programming Paradigm Writing

More information

Welcome to Introduction to Computer Science I

Welcome to Introduction to Computer Science I Welcome to Introduction to Computer Science I CSE 1020 moodle.yorku.ca Instructor Name: Franck van Breugel Email: franck@cse.yorku.ca Please use your EECS or York account to send me email Office: Lassonde

More information

Outline. Introduction to Programming (in C++) Introduction. First program in C++ Programming examples

Outline. Introduction to Programming (in C++) Introduction. First program in C++ Programming examples Outline Introduction to Programming (in C++) Introduction Programming examples Algorithms, programming languages and computer programs Jordi Cortadella, Ricard Gavaldà, Fernando Orejas Dept. of Computer

More information

Concepts in Programming Languages

Concepts in Programming Languages Concepts in Programming Languages Marcelo Fiore Computer Laboratory University of Cambridge 2012 2013 (Easter Term) 1 Practicalities Course web page: with lecture

More information

Using Data Science to deliver Workforce & Labour Market Insights. Gary Gan Co-Founder, JobKred

Using Data Science to deliver Workforce & Labour Market Insights. Gary Gan Co-Founder, JobKred Using Data Science to deliver Workforce & Labour Market Insights Gary Gan Co-Founder, JobKred Collection of Data Online Sources Skills, Education, Experience AI-powered Career Development Platform Cloud-based

More information

Topic I. Introduction and motivation References: Chapter 1 of Concepts in programming languages by J. C. Mitchell. CUP, 2003.

Topic I. Introduction and motivation References: Chapter 1 of Concepts in programming languages by J. C. Mitchell. CUP, 2003. Topic I Introduction and motivation References: Chapter 1 of Concepts in programming languages by J. C. Mitchell. CUP, 2003. Chapter 1 of Programming languages: Design and implementation (3RD EDITION)

More information

224 Computer Science. A.S. Degree Requirements. Department Offices. Faculty and Offices. Emeritus Faculty. Degrees and Certificates Awarded

224 Computer Science. A.S. Degree Requirements. Department Offices. Faculty and Offices. Emeritus Faculty. Degrees and Certificates Awarded 224 Computer Science Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface

More information

Full version is >>> HERE <<<

Full version is >>> HERE <<< database programming language definition; iphone programming language objective c; groovy programming language books; programming language knowledge Full version is >>> HERE

More information

Computer Science 209. A.S. Degree Requirements. Department Offices. Faculty & Offices. Emeritus Faculty. Degrees & Certificates Awarded

Computer Science 209. A.S. Degree Requirements. Department Offices. Faculty & Offices. Emeritus Faculty. Degrees & Certificates Awarded Computer Science 209 Computer Science (See Computer Information Systems section for additional computer courses.) We are in the Computer Age. Virtually every occupation in the world today has an interface

More information

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116

ISSN: [Keswani* et al., 7(1): January, 2018] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AUTOMATIC TEST CASE GENERATION FOR PERFORMANCE ENHANCEMENT OF SOFTWARE THROUGH GENETIC ALGORITHM AND RANDOM TESTING Bright Keswani,

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Last Activity Recorded: November 06, 2009 Microsoft Certified Professional PETER MARIAN GORLICKI Holstenstr. 96 Kiel 24103 DE peter.gorlicki@tcp4it.de Microsoft Certification Status Credential Certification

More information

Release Notes. UCC v Copyright (C) University of Southern California. Center for Systems and Software Engineering

Release Notes. UCC v Copyright (C) University of Southern California. Center for Systems and Software Engineering Release Notes UCC v.2013.04 Copyright (C) 1998-2014 University of Southern California Center for Systems and Software Engineering 1 Introduction This document provides the release notes for the UCC v.2013.04.

More information

Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments Informatics in Education, 2016, Vol. 15, No. 1, 103 126 2016 Vilnius University DOI: 10.15388/infedu.2016.06 103 Process Model Improvement for Source Code Plagiarism Detection in Student Programming Assignments

More information

CSc 520. Course Outline (Subject to change) Course Outline (Subject to change)... Principles of Programming Languages. Christian Collberg

CSc 520. Course Outline (Subject to change) Course Outline (Subject to change)... Principles of Programming Languages. Christian Collberg Slide 0 2 Course Outline (Subject to change) This course will define, analyze and evaluate important concepts found in current programming languages. Its goals are to build an ability to evaluate and compare

More information

Emmanuel Huna. Employment History

Emmanuel Huna. Employment History Emmanuel Huna http://www.ehuna.org jobs@ehuna.org San Mateo, CA 94402 (877) 598-0468 This version of the resume was updated on Saturday, July 22, 2002. For more detailed and up-to-date information, please

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Brian F. Cooper. Distributed systems, digital libraries, and database systems

Brian F. Cooper. Distributed systems, digital libraries, and database systems Brian F. Cooper Home Office Internet 2240 Homestead Ct. #206 Stanford University cooperb@stanford.edu Los Altos, CA 94024 Gates 424 http://www.stanford.edu/~cooperb/app/ (408) 730-5543 Stanford, CA 94305

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

C# Programming: From Problem Analysis To Program Design (Introduction To Programming) By Barbara Doyle READ ONLINE

C# Programming: From Problem Analysis To Program Design (Introduction To Programming) By Barbara Doyle READ ONLINE C# Programming: From Problem Analysis To Program Design (Introduction To Programming) By Barbara Doyle READ ONLINE Only Doyle's C# PROGRAMMING: FROM PROBLEM ANALYSIS TO PROGRAM DESIGN, 4E brilliantly balances

More information

EFFICIENT AND EFFECTIVE PLAGIARISM DETECTION FOR LARGE CODE REPOSITORIES

EFFICIENT AND EFFECTIVE PLAGIARISM DETECTION FOR LARGE CODE REPOSITORIES EFFICIENT AND EFFECTIVE PLAGIARISM DETECTION FOR LARGE CODE REPOSITORIES Steven Burrows 1, Seyed M. M. Tahaghoghi 1 & Justin Zobel 1 1 School of Computer Science and Information Technology, RMIT University

More information

CGT 456 Lecture 1. Introduction to Computers & Programming

CGT 456 Lecture 1. Introduction to Computers & Programming CGT 456 Lecture 1 Introduction to Computers & Programming Some, not all, information pulled from these books: Deitel & Deitel. (2009 Third Edition). Visual C# 2008 How to Program. ISBN-10: 0-13-605322-X.

More information

Low-Level Languages. Computer Programs and Programming Languages

Low-Level Languages. Computer Programs and Programming Languages Computer Programs and Programming Languages What is a computer program? Set of instructions that directs computer to perform tasks Programming used to write instructions 1 Computer Programs and Programming

More information

Tales from the Workshops

Tales from the Workshops Tales from the Workshops Dr Russel Winder email: russel@winder.org.uk twitter: @russel_winder Web: http://www.russel.org.uk 1 Agile is the new black. 2 Aims, goals, objectives 3 Aims, goals, objectives

More information

Control Flow Graph based Framework for effective Evaluation of Source Code

Control Flow Graph based Framework for effective Evaluation of Source Code Control Flow Graph based Framework for effective Evaluation of Source Code Sandeep Jain, Raju Pal, Anindya Srivastava Department of Computer Science & Engineering Jaypee Institute of Information Technology

More information

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights

Interested in learning more? Global Information Assurance Certification Paper. Copyright SANS Institute Author Retains Full Rights Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

Microsoft Certified Professional Transcript. Microsoft Office Project Server

Microsoft Certified Professional Transcript. Microsoft Office Project Server Last Activity Recorded: May 21, 2009 Microsoft Certified Professional WILLIAM F SLATER 1337 N. Ashland Ave. Unit 2 Chicago, IL 60622 US slater@billslater.com Microsoft Certification Status Credential Microsoft

More information

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs

Evaluating the Effect of Inheritance on the Characteristics of Object Oriented Programs Journal of Computer Science 2 (12): 872-876, 26 ISSN 1549-3636 26 Science Publications Evaluating the Effect of Inheritance on the Characteristics of Object Oriented 1 Thabit Sultan Mohammed and 2 Hayam

More information

3D Support for Business Process Simulation

3D Support for Business Process Simulation 3D Support for Business Process Simulation Institute of Applied Informatics and Formal Description Methods Universität Karlsruhe (TH) Daniel Eichhorn, Agnes Koschmider, Yu Li, Andreas Oberweis, Peter Stürzel,

More information

Read & Download (PDF Kindle) A First Book Of C++ (Introduction To Programming)

Read & Download (PDF Kindle) A First Book Of C++ (Introduction To Programming) Read & Download (PDF Kindle) A First Book Of C++ (Introduction To Programming) Gary Bronson's A FIRST BOOK OF C++, Fourth Edition, takes a hands-on, applied approach to the first programming language course

More information

CURRICULUM VITÆ. Naama Kraus B.Sc. in Computer Science and Mathematics, Bar-Ilan University, Cum Laude GPA: 90.

CURRICULUM VITÆ. Naama Kraus B.Sc. in Computer Science and Mathematics, Bar-Ilan University, Cum Laude GPA: 90. CURRICULUM VITÆ Naama Kraus naamakraus@gmail.com Personal Information Home Address: 6 Trumpeldor Ave., Haifa, 32582, Israel Phone (Home): +972 4 8328216 Phone (Mobile): +972 55 6644563 Date of Birth: 29-APR-1974

More information

DBPowder-web: Web Application Development Framework with RDBMS

DBPowder-web: Web Application Development Framework with RDBMS DEWS2006 4A-o4 DBPowder-web: RDBMS 305 0801 1 1 E-mail: tadashi.murakami@kek.jp DBPowder-web RDBMS RDBMS RDBMS CRUD (Create,Read,Update,Delete) DBPowder-web CRUD DBPowder-web DBPowder-web Web,, DB,,, DBPowder-web:

More information

General Concepts. Abstraction Computational Paradigms Implementation Application Domains Influence on Success Influences on Design

General Concepts. Abstraction Computational Paradigms Implementation Application Domains Influence on Success Influences on Design General Concepts Abstraction Computational Paradigms Implementation Application Domains Influence on Success Influences on Design 1 Abstractions in Programming Languages Abstractions hide details that

More information

COMP 201: Principles of Programming

COMP 201: Principles of Programming COMP 201: Principles of Programming 1 Learning Outcomes To understand what computing entails and what the different branches of computing are. To understand the basic design of a computer and how it represents

More information

SKILL AREA 304: Review Programming Language Concept. Computer Programming (YPG)

SKILL AREA 304: Review Programming Language Concept. Computer Programming (YPG) SKILL AREA 304: Review Programming Language Concept Computer Programming (YPG) 304.1 Demonstrate an Understanding of Basic of Programming Language 304.1.1 Explain the purpose of computer program 304.1.2

More information

Jun Li, Ph.D. School of Computing and Information Sciences Phone:

Jun Li, Ph.D. School of Computing and Information Sciences Phone: Jun Li, Ph.D. School of Computing and Information Sciences Phone: + 1-305-348-4964 Florida International University Email: junli @ cs. fiu. edu 11200 SW 8th St, ECS 380, Miami, FL 33199 Web: http://users.cs.fiu.edu/

More information

Compilation 2012 The What and Why of Compilers

Compilation 2012 The What and Why of Compilers Compilation 2012 The What and Why of Compilers Jan Midtgaard Michael I. Schwartzbach Aarhus University What is a Compiler? A program that: tralates from one programming language to another preserves the

More information

Type Inference. Prof. Clarkson Fall Today s music: Cool, Calm, and Collected by The Rolling Stones

Type Inference. Prof. Clarkson Fall Today s music: Cool, Calm, and Collected by The Rolling Stones Type Inference Prof. Clarkson Fall 2016 Today s music: Cool, Calm, and Collected by The Rolling Stones Review Previously in 3110: Interpreters: ASTs, evaluation, parsing Formal syntax Formal semantics

More information

Using the Computer Programming Environment

Using the Computer Programming Environment Information sheet EN064 Overview C2k has developed an environment to allow GCSE and A-Level students to undertake computer programming from within the C2k Managed Service. This environment will deliver

More information

1551 Mount Eagle Pl. Alexandria, VA 22302

1551 Mount Eagle Pl. Alexandria, VA 22302 Objective Obtain a position utilizing my computer background. Very interested in application software design, project management or development, Also interested in network system administration and Internet

More information

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington

Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington Dr. Spencer Sevilla Postdoctoral Researcher, University of Washington email: sevilla@cs.washington.edu Research Interests Computer networks, Host mobility, Web technology, Content caching Education University

More information

James Hollingshead SUMMARY

James Hollingshead SUMMARY James Hollingshead Phone: 740-707-5876 james@jameshollingshead.com SUMMARY Software developer with 13 years of experience in system analysis, requirements gathering, business analysis, architecture, design,

More information

Discovering Computers 2008

Discovering Computers 2008 Discovering Computers 2008 Chapter 13 (a) Programming Languages and Program Development 1 Chapter 13 Objectives Differentiate between machine and assembly languages Identify and discuss the purpose of

More information

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213

J I N G H A I R A O. Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 J I N G H A I R A O Institute for Software Research School of Computer Science Carnegie Mellon University 5000 Forbes Ave Pittsburgh, PA 15213 Office: +1 412 268 1357 Fax: +1 412 268 7287 Mobile: +1 412

More information

Detecting source code reuse across programming languages

Detecting source code reuse across programming languages Detecting source code reuse across programming languages Detección de reutilización de código fuente entre lenguajes de programación Enrique Flores, Alberto Barrón-Cedeño, Paolo Rosso and Lidia Moreno

More information

University of Texas Administration Building Room Guadalupe Street Austin, TX Phone: (479)

University of Texas Administration Building Room Guadalupe Street Austin, TX Phone: (479) Islam Akef Ebeid University of Texas Administration Building Room 5.556 http://www.i3akef.com School of Information https://www.linkedin.com/in/i3akef University of Texas at Austin islam.akef@gmail.com

More information

Undergraduate Admission File

Undergraduate Admission File Undergraduate Admission File June 13, 2007 Information Resources and Communications Office of the President University of California Overview Population The Undergraduate Admission File contains data on

More information

SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA ABSTRACT

SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA ABSTRACT SOFTWARE COMPLEXITY MEASUREMENT USING MULTIPLE CRITERIA Bhaskar Raj Sinha, Pradip Peter Dey, Mohammad Amin and Hassan Badkoobehi National University, School of Engineering, Technology, and Media 3678 Aero

More information

P R O F E S S I O N A L R E S U M E J O S É C A R L O S C U É L L A R D O M É N E C H

P R O F E S S I O N A L R E S U M E J O S É C A R L O S C U É L L A R D O M É N E C H P R O F E S S I O N A L R E S U M E J O S É C A R L O S C U É L L A R D O M É N E C H PERSONAL INFORMATION Married. Age: 42. Place of birth: Alicante. Current address: C/Els Poblets, 10 esc. 9 2º Q 03015

More information

Software Engineer Development of the Agent Support Tool (AST) for Instant Ink, applying TDD in Ruby on Rails.

Software Engineer Development of the Agent Support Tool (AST) for Instant Ink, applying TDD in Ruby on Rails. CV_3616 Technical Lead at Hewlett-Packard Summary I've started reading and writing by myself at the age of 3, then focused on electronics at 5 and later moved to computers at 7, when I found what I wanted

More information

Teaching and Learning Graph Algorithms Using Animation

Teaching and Learning Graph Algorithms Using Animation Teaching and Learning Graph Algorithms Using Animation Y. Daniel Liang Department of Computer Science Georgia Southern University Savannah Campus, GA 31419 y.daniel.liang@gmail.com ABSTRACT Graph algorithms

More information

Fachhochschule Frankfurt am Main, Key topics:

Fachhochschule Frankfurt am Main, Key topics: Résumé Personal Information Name Markus M. May Address Wingert Str. 9 60316 Frankfurt / Main Contact Telephone: +49 173 53 40 964 email: mmay@gmx.net Date of Birth November 20, 1974 Place of Birth Nationality

More information

CS383 PROGRAMMING LANGUAGES. Kenny Q. Zhu Dept. of Computer Science Shanghai Jiao Tong University

CS383 PROGRAMMING LANGUAGES. Kenny Q. Zhu Dept. of Computer Science Shanghai Jiao Tong University CS383 PROGRAMMING LANGUAGES Kenny Q. Zhu Dept. of Computer Science Shanghai Jiao Tong University KENNY Q. ZHU Research Interests: Programming Languages Probabilistic Programming Data Processing Concurrency

More information

2 Haskell. Haskell (629) 59. Haskell. B. Curry. 1.2, 1.3, Haskell 98 [16] 1. Haskell. Haskell. ( Haskell.

2 Haskell. Haskell (629) 59. Haskell. B. Curry. 1.2, 1.3, Haskell 98 [16] 1. Haskell. Haskell. (  Haskell. (629) 59 Haskell 1 Haskell Haskell Hugs GHC 2 Haskell 2.1 Haskell 1987 FPCA (Functional Programming Languages and Computer Architechture) Programming Language Haskell and Systems Yoshiyuki ONOUE,, Graduate

More information

Microsoft Certified Professional Transcript

Microsoft Certified Professional Transcript Microsoft Certified Professional Transcript Last Activity Recorded December 05, 2013 Microsoft Certification ID 213748 STEVE WILSON F1 Computing Systems Ltd 3 Kelso Place Upper Bristol Road Bath BA1 3AU

More information

Language Translation, History. CS152. Chris Pollett. Sep. 3, 2008.

Language Translation, History. CS152. Chris Pollett. Sep. 3, 2008. Language Translation, History. CS152. Chris Pollett. Sep. 3, 2008. Outline. Language Definition, Translation. History of Programming Languages. Language Definition. There are several different ways one

More information

Deprogramming Large Software Systems

Deprogramming Large Software Systems Deprogramming Large Software Systems Yohann Coppel and George Candea École Polytechnique Fédérale de Lausanne (EPFL), Switzerland {yohann.coppel, george.candea@epfl.ch Abstract Developers turn ideas, designs

More information

ASSOCIATE DEGREE REQUIREMENTS

ASSOCIATE DEGREE REQUIREMENTS A Course of Study for COMPUTER SCIENCE The field of computer science leads to a variety of careers that all require core computer science skills. These skills include theory courses such as Computer Hardware,

More information

COSC Software Engineering. Lecture 23: Multilingual and Component Programming

COSC Software Engineering. Lecture 23: Multilingual and Component Programming COSC345 2013 Software Engineering Lecture 23: Multilingual and Component Programming Isolation Scale Change Errors These are core issues in Software Engineering Isolation is our main way to deal with them

More information

DETECTION OF LOGICAL CLONE IN CODE USING DATA DEPENDENCY AND EXPRESSION LIST

DETECTION OF LOGICAL CLONE IN CODE USING DATA DEPENDENCY AND EXPRESSION LIST DETECTION OF LOGICAL CLONE IN CODE USING DATA DEPENDENCY AND EXPRESSION LIST 1 SYED MOHDFAZALULHAQUE, 2 V SRIKANTH, 3 E. SREENIVASA REDDY 1 Maulana Azad National Urdu University, fazal.manuu@gmail.com

More information

Chapter 11 Program Development and Programming Languages

Chapter 11 Program Development and Programming Languages Chapter 11 Program Development and Programming Languages permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use. Programming

More information

Programming in HTML5 with JavaScript and CSS3

Programming in HTML5 with JavaScript and CSS3 20480 - Programming in HTML5 with JavaScript and CSS3 Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This training course provides an introduction

More information

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805)

John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA (805) Curriculum Vitae Contact Information Education John Clements Department of Computer Science Cal Poly State University 1 Grand Street San Luis Obispo, CA 93407 (805)756-6528 clements@brinckerhoff.org 2005

More information

Lecture 1: Course Introduction

Lecture 1: Course Introduction Lecture 1: Course Introduction CS164: Programming Languages and Compilers P. N. Hilfinger, 787 Soda Fall 2013 Acknowledgement. Portions taken from CS164 notes by G. Necula. Last modified: Thu Aug 29 16:03:34

More information

Today. An Animated Introduction to Programming. Prerequisites. Computer programming

Today. An Animated Introduction to Programming. Prerequisites. Computer programming Today 1 2 3 4 Computer programming What is this course about? We re making several assumptions about you as a student. In particular, we assume that you have: Never taken a programming course before. Have

More information

CS A331 Programming Language Concepts

CS A331 Programming Language Concepts CS A331 Programming Language Concepts Lecture 4 Programming Language Semantics and Code Generation February 3, 2014 Sam Siewert PLP Companion Materials CD-ROM is On-Line: http://booksite.elsevier.com/9780123745149/?isbn=978

More information

EZ-Metrix V User Guide

EZ-Metrix V User Guide EZ-Metrix V4.1.0.3 User Guide Table 1 Revision History Date Version Author Reason 5/19/04 0.1 James T. Heires Original 6/24/04 0.2 James T. Heires Demo feedback 7/3/04 0.3 James T. Heires Added support

More information

Center for Systems and Software Engineering University of Southern California. Center for Systems And Software Engineering. UCC v.2011.

Center for Systems and Software Engineering University of Southern California. Center for Systems And Software Engineering. UCC v.2011. Center for Systems And Software Engineering UCC v.2011.10b Release Notes Page 1 of 7 1. Introduction This document provides the release notes for the UCC v.2011.10b. Unified CodeCount (UCC) is a code counting

More information

Introduction to Scripting Languages. October 2017

Introduction to Scripting Languages. October 2017 Introduction to Scripting Languages damien.francois@uclouvain.be October 2017 1 Goal of this session: Advocate the use of scripting languages and help you choose the most suitable for your needs 2 Agenda

More information

Introduction to.net, C#, and Visual Studio. Part I. Administrivia. Administrivia. Course Structure. Final Project. Part II. What is.net?

Introduction to.net, C#, and Visual Studio. Part I. Administrivia. Administrivia. Course Structure. Final Project. Part II. What is.net? Introduction to.net, C#, and Visual Studio C# Programming Part I Administrivia January 8 Administrivia Course Structure When: Wednesdays 10 11am (and a few Mondays as needed) Where: Moore 100B This lab

More information