{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:11:31Z","timestamp":1729617091615,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1109\/icdim.2007.4444250","type":"proceedings-article","created":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T13:49:26Z","timestamp":1216820966000},"page":"362-367","source":"Crossref","is-referenced-by-count":0,"title":["Source code management system for E-learning based programming education"],"prefix":"10.1109","author":[{"family":"Jeong-Hoon Ji","sequence":"first","affiliation":[]},{"family":"Su-Hyun Park","sequence":"additional","affiliation":[]},{"family":"Gyun Woo","sequence":"additional","affiliation":[]},{"family":"Hwan-Gue Cho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/13.28038"},{"key":"ref11","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"prechelt","year":"2002","journal-title":"Journal of Universal Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-540-27801-6_26","article-title":"Quadratic time algorithms for finding common intervals in two and more sequences","author":"schmidt","year":"2004","journal-title":"Proceedings of the 13th Annual Symposium on Combinatorial Pattern Matching"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(81)90087-5"},{"key":"ref15","first-page":"1000","article-title":"Program plagiarism detection using parse tree kernels","author":"son","year":"2006","journal-title":"PRICAI 2006"},{"key":"ref16","first-page":"130","article-title":"Software for detecting suspected plagiarism: Comparing structure and attribute-counting systems","author":"verco","year":"1996","journal-title":"Proceedings of the 1st Australian Conference on Computer Science Education"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/236452.236525"},{"key":"ref18","article-title":"Detecting source-code plagiarism","author":"zeidman","year":"2004","journal-title":"Dr Dobb's Journal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/299649.299783"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxh139"},{"key":"ref6","first-page":"171","article-title":"Identifying redundancy in source code using fingerprints","author":"johnson","year":"1993","journal-title":"CASCON'93"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1269900.1268807"},{"key":"ref8","first-page":"143","article-title":"Similarity and originality in code: plagiarism and normal variation in student assignments","volume":"52","author":"mann","year":"2006","journal-title":"Proceedings on Eighth Australasian Computing Education Conference"},{"key":"ref7","first-page":"229","article-title":"Plagiarism monitoring and detection-towards an open discussion","volume":"16","author":"jones","year":"2001","journal-title":"Journal of the Consortium for Computing in Small Colleges"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.830793"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738528"},{"key":"ref9","first-page":"539","article-title":"Source code retrieval using conceptual similarity","author":"mishne","year":"2004","journal-title":"Proceedings RIAO 2004"}],"event":{"name":"2007 2nd International Conference on Digital Information Management","start":{"date-parts":[[2007,10,28]]},"location":"Lyon, France","end":{"date-parts":[[2007,10,31]]}},"container-title":["2007 2nd International Conference on Digital Information Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4444189\/4444190\/04444250.pdf?arnumber=4444250","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:17:12Z","timestamp":1497781032000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4444250\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icdim.2007.4444250","relation":{},"subject":[],"published":{"date-parts":[[2007]]}}}