{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T05:44:58Z","timestamp":1771652698323,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,9]],"date-time":"2019-05-09T00:00:00Z","timestamp":1557360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,9]]},"DOI":"10.1145\/3300115.3309515","type":"proceedings-article","created":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T14:29:00Z","timestamp":1556893740000},"page":"164-170","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Automatic Clustering of Different Solutions to Programming Assignments in Computing Education"],"prefix":"10.1145","author":[{"given":"Lei","family":"Gao","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Bo","family":"Wan","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Cheng","family":"Fang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Yangyang","family":"Li","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Chen","family":"Chen","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2019,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_2_1","volume-title":"WASTK: A Weighted Abstract Syntax Tree Kernel Method for Source Code Plagiarism Detection. Scientific Programming,2017,(2017-02--13)","author":"Fu Deqiang","year":"2017"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699751"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556325.2567865"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192387"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950363"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019480"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709424.1709460"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1404520.1404531"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-007-9033-z"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462476.2462505"},{"key":"e_1_3_2_1_12_1","volume-title":"TBCNN: A Tree-Based Convolutional Neural Network for Programming Language Processing. Eprint Arxiv","author":"Mou Lili","year":"2014"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/13.28038"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9564-7"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1597849.1384328"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595496.1562893"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Neural Information Processing Systems (NIPS) Workshops. Citeseer.","author":"Tsironis Serafeim","year":"2013"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/353519.343090"},{"key":"e_1_3_2_1_19_1","unstructured":"Jiujie Zhang Chunhui Wang Liping Zhang Min Hou and Dongsheng Liu. 2015. Clone code detection based on Levenshtein distance of token. Journal of Computer Applications (2015).  Jiujie Zhang Chunhui Wang Liping Zhang Min Hou and Dongsheng Liu. 2015. Clone code detection based on Levenshtein distance of token. Journal of Computer Applications (2015)."},{"key":"e_1_3_2_1_20_1","first-page":"327","article-title":"Introduction to artificial neural network (ANN) methods: what they are and how to use them","volume":"41","author":"Zupan Jure","year":"1994","journal-title":"Acta Chimica Slovenica"}],"event":{"name":"CompEd '19: ACM Global Computing Education Conference 2019","location":"Chengdu,Sichuan China","acronym":"CompEd '19","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the ACM Conference on Global Computing Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300115.3309515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3300115.3309515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:22Z","timestamp":1750206322000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3300115.3309515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,9]]},"references-count":20,"alternative-id":["10.1145\/3300115.3309515","10.1145\/3300115"],"URL":"https:\/\/doi.org\/10.1145\/3300115.3309515","relation":{},"subject":[],"published":{"date-parts":[[2019,5,9]]},"assertion":[{"value":"2019-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}