{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:48Z","timestamp":1750220508603,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:00:00Z","timestamp":1605744000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,19]]},"DOI":"10.1145\/3428029.3428065","type":"proceedings-article","created":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T20:32:05Z","timestamp":1606077125000},"page":"1-10","source":"Crossref","is-referenced-by-count":7,"title":["Preprocessing for Source Code Similarity Detection in Introductory Programming"],"prefix":"10.1145","author":[{"given":"Oscar","family":"Karnalim","sequence":"first","affiliation":[{"name":"University of Newcastle, Australia"}]},{"family":"Simon","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"William","family":"Chivers","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/FUZZ-IEEE.2015.7337935"},{"volume-title":"21st Australasian Computing Education Conference(ACE","year":"2019","author":"Ahadi Alireza","key":"e_1_3_2_1_2_1"},{"volume-title":"The Java programming language","author":"Arnold Ken","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1002\/cae.21571"},{"key":"e_1_3_2_1_5_1","first-page":"409","article-title":"Evaluating the performance of LSA for source code plagiarism detection","volume":"36","author":"Cosma Georgina","year":"2012","journal-title":"Informatica"},{"volume-title":"Search Engines: Information Retrieval in Practice","year":"2010","author":"Croft W\u00a0Bruce","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"A source code similarity system for plagiarism detection","volume":"56","author":"\u0110uri\u0107 Zoran","year":"2013","journal-title":"Computer Journal"},{"volume-title":"CHI Conference Extended Abstracts on Human Factors in Computing Systems. 1173\u20131179","year":"2016","author":"Domin Christian","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1016\/0360-1315(87)90042-X"},{"doi-asserted-by":"crossref","unstructured":"Enrique Flores Paolo Rosso Lidia Moreno and Esa\u00fa Villatoro-Tello. 2014. On the detection of Source Code re-use. In Forum for Information Retrieval Evaluation. 21\u201330. https:\/\/doi.org\/10.1145\/2824864.2824878  Enrique Flores Paolo Rosso Lidia Moreno and Esa\u00fa Villatoro-Tello. 2014. On the detection of Source Code re-use. In Forum for Information Retrieval Evaluation. 21\u201330. https:\/\/doi.org\/10.1145\/2824864.2824878","key":"e_1_3_2_1_10_1","DOI":"10.1145\/2824864.2824878"},{"volume-title":"30th SIGCSE Technical Symposium on Computer Science Education(SIGCSE","year":"1999","author":"Gitchell David","key":"e_1_3_2_1_11_1"},{"volume-title":"2011 Computer Science Education Research Conference. 33\u201346","year":"2011","author":"Hage Jurriaan","key":"e_1_3_2_1_12_1"},{"volume-title":"Sixth Computer Science Education Research Conference(CSERC 2017","year":"2017","author":"Heres Dani\u00ebl","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TSE.2015.2418777"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICTS.2016.7910274"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICoICT.2018.8528768"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.15388\/infedu.2019.15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/TALE48000.2019.9225953"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/SNPD.2014.6888733"},{"volume-title":"Computer Science Education Research Conference(CSERC","year":"2016","author":"Modiba Phatludi","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","first-page":"6","article-title":"PDetect: a clustering approach for detecting plagiarism in source code datasets","volume":"48","author":"Moussiades Lefteris","year":"2005","journal-title":"Computer Journal"},{"key":"e_1_3_2_1_22_1","article-title":"Source-code similarity detection and detection tools used in academia: a systematic review","volume":"19","author":"Novak Matija","year":"2019","journal-title":"ACM Transactions on Computing Education"},{"unstructured":"Terence Parr. 2013. The Definitive ANTLR 4 Reference. Pragmatic Bookshelf.  Terence Parr. 2013. The Definitive ANTLR 4 Reference. Pragmatic Bookshelf.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","first-page":"1016","article-title":"Finding plagiarisms among a set of programs with JPlag","volume":"8","author":"Prechelt Lutz","year":"2002","journal-title":"Journal of Universal Computer Science"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1007\/s10664-017-9564-7"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1134\/S0361768817010066","article-title":"Measuring similarity between Karel programs using character and word n-grams","volume":"43","author":"Sidorov G","year":"2017","journal-title":"Programming and Computer Software"},{"volume-title":"13th Koli Calling International Conference on Computing Education Research. 23\u201332","year":"2013","author":"Cook Beth","key":"e_1_3_2_1_27_1"},{"volume-title":"49th ACM Technical Symposium on Computer Science Education. ACM Press","year":"2018","author":"Mason Raina","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1002\/cae.22066"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/TSE.2015.2454508"},{"volume-title":"Plagiarism detection in students","year":"2018","author":"Ullah Farhan","key":"e_1_3_2_1_31_1"},{"volume-title":"Python 3 Reference Manual. CreateSpace","author":"Van\u00a0Rossum Guido","key":"e_1_3_2_1_32_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1093\/comjnl\/39.9.741"},{"volume-title":"First Australasian Computer Science Education Conference(ACE","year":"1996","author":"Verco L","key":"e_1_3_2_1_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1093\/comjnl\/33.2.140"},{"volume-title":"27th SIGCSE Technical Symposium on Computer Science Education(SIGCSE","year":"1996","author":"Wise J","key":"e_1_3_2_1_36_1"}],"event":{"acronym":"Koli Calling '20","name":"Koli Calling '20: 20th Koli Calling International Conference on Computing Education Research","location":"Koli Finland"},"container-title":["Koli Calling '20: Proceedings of the 20th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428065","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428029.3428065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:23Z","timestamp":1750195463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428029.3428065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":36,"alternative-id":["10.1145\/3428029.3428065","10.1145\/3428029"],"URL":"https:\/\/doi.org\/10.1145\/3428029.3428065","relation":{},"subject":[],"published":{"date-parts":[[2020,11,19]]}}}