-
1
-
-
78650079097
-
-
ACNP Software. Retrieved February 22, 2010
-
ACNP Software. (2010). AntiPlagiarist. Retrieved February 22, 2010, from 'http://www.anticutandpaste.com/antiplagiarist/
-
(2010)
Anti Plagiarist
-
-
-
2
-
-
33746860953
-
Factors associated with student plagiarism in a post-1992 University
-
Bennett, R. (2005). Factors associated with student plagiarism in a post-1992 University. Journal of Assessment and Evaluation in Higher Education, 30(2):137-162.
-
(2005)
Journal of Assessment and Evaluation in Higher Education
, vol.30
, Issue.2
, pp. 137-162
-
-
Bennett, R.1
-
3
-
-
76849102219
-
-
(Version 2.6). Retrieved February 22, 2010
-
Bloomfield, L. A. (2010). Software to Detect Plagiarism: WCopyfind (Version 2.6). Retrieved February 22, 2010, from 'http://www.plagiarism.phys. virginia.edu/Wsoftware.html'
-
(2010)
Software to Detect Plagiarism: WCopyfind
-
-
Bloomfield, L.A.1
-
4
-
-
85013567245
-
Using intelligent feedback to improve sourcing and integration in students' essays
-
Britt, A., Wiemer-Hastings, P., Larson, A., & Perfetti, C. (2004). Using intelligent feedback to improve sourcing and integration in students' essays. International Journal of Artificial Intelligence in Education, 14, 359-374.
-
(2004)
International Journal of Artificial Intelligence in Education
, vol.14
, pp. 359-374
-
-
Britt, A.1
Wiemer-Hastings, P.2
Larson, A.3
Perfetti, C.4
-
5
-
-
78650119256
-
-
Canexus Inc. Retrieved February 22, 2010, from
-
Canexus Inc. (2010). EVE2-Essay Verification Engine. Retrieved February 22, 2010, from >http://www.canexus.com/
-
(2010)
EVE2-Essay Verification Engine
-
-
-
6
-
-
52149104032
-
Multilingual plagiarism detection
-
Ceska, Z., Toman, M., & Jezek, K. (2008). Multilingual plagiarism detection. Lecture Notes in Computer Science, 5253, 83-92
-
(2008)
Lecture Notes in Computer Science
, vol.5253
, pp. 83-92
-
-
Ceska, Z.1
Toman, M.2
Jezek, K.3
-
7
-
-
34047230751
-
Who's at the keyboard? Authorship attribution in digital evidence investigations
-
Chaski, C. (2005). Who's at the keyboard? Authorship attribution in digital evidence investigations. International Journal of Digital Evidence, 4(1), 1-13.
-
(2005)
International Journal of Digital Evidence
, vol.4
, Issue.1
, pp. 1-13
-
-
Chaski, C.1
-
9
-
-
44449164534
-
Towards a definition of source-code plagiarism
-
Cosma, G., & Joy, M. (2008). Towards a definition of source-code plagiarism. IEEE Transactions on Education, 51(2), 195-200.
-
(2008)
IEEE Transactions on Education
, vol.51
, Issue.2
, pp. 195-200
-
-
Cosma, G.1
Joy, M.2
-
10
-
-
78650148575
-
An approach to source-code plagiarism detection and investigation using latent semantic analysis
-
To Appear
-
Cosma, G., & Joy, M. (2009a). An approach to source-code plagiarism detection and investigation using latent semantic analysis. IEEE Transactions on Computing. To appear.
-
(2009)
IEEE Transactions on Computing
-
-
Cosma, G.1
Joy, M.2
-
13
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
De Vel, O., Anderson, A., Corney, M., & Mohay, G. (2001). Mining e-mail content for author identification forensics. ACM SIGMOD, 30(4), 55-64.
-
(2001)
ACM SIGMOD
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
14
-
-
84989525001
-
Indexing by latent semantic analysis
-
Deerwester, S., Dumais, S., Landauer, T., Furnas, G., & Harshman, R. (1990). Indexing by latent semantic analysis. Journal of the American Society of Information Science, 41(6), 391-407.
-
(1990)
Journal of the American Society of Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.2
Landauer, T.3
Furnas, G.4
Harshman, R.5
-
15
-
-
34247127459
-
Addressing student cheating: Definitions and solution
-
Dick, M., Sheard, J., Bareiss, C., Carter, J., Harding, T., Joyce, D., et al. (2003). Addressing student cheating: Definitions and solution. SIGCSE Bulletin, 35(2), 172-184.
-
(2003)
SIGCSE Bulletin
, vol.35
, Issue.2
, pp. 172-184
-
-
Dick, M.1
Sheard, J.2
Bareiss, C.3
Carter, J.4
Harding, T.5
Joyce, D.6
-
16
-
-
0038604019
-
Authorship attribution with support vector machines
-
Diederich, J., Kindermann, J., Leopold, E., & Paass, G. (2003). Authorship attribution with support vector machines. Applied Intelligence, 19(1-2), 109-123.
-
(2003)
Applied Intelligence
, vol.19
, Issue.1-2
, pp. 109-123
-
-
Diederich, J.1
Kindermann, J.2
Leopold, E.3
Paass, G.4
-
17
-
-
0742306577
-
Improving the retrieval of information from external sources
-
Dumais, S. (1991). Improving the retrieval of information from external sources. Behavior Research Methods, Instruments and Computers, 23(2), 229-236.
-
(1991)
Behavior Research Methods, Instruments and Computers
, vol.23
, Issue.2
, pp. 229-236
-
-
Dumais, S.1
-
18
-
-
78650121336
-
-
Chronicle of Higher Education, May 17th, 2002, Section: Information Technology
-
Foster, A. (2002). Plagiarism-detection tool creates legal quandary. Chronicle of Higher Education, May 17th, 2002, Section: Information Technology, A37.
-
(2002)
Plagiarism-detection Tool Creates Legal Quandary
-
-
Foster, A.1
-
20
-
-
84986078192
-
Contested texts: Issues of plagiarism
-
iParadigms. TurnitIn.com. Digital assessment suite. Retrieved February 22, 2010 >
-
Hannabuss, S. (2001). Contested texts: Issues of plagiarism. Library Management, 22(6/7), 311-318. iParadigms. TurnitIn.com. Digital assessment suite. Retrieved February 22, 2010, from >http://turnitin.com
-
(2001)
Library Management
, vol.22
, Issue.6-7
, pp. 311-318
-
-
Hannabuss, S.1
-
22
-
-
78650120865
-
-
April 3. Retrieved April 26, 2010, from
-
Jones, K. C. (2007). Students Sue Anti-plagiarism Service for Copyright Infringement. InformationWeek, April 3. Retrieved April 26, 2010, from http://www.informationweek.com/news/internet/showArticle.jhtml?articleID= 198702230 http://www.informationweek.com/news/internet/showArticle.jhtml? articleID=198702230
-
(2007)
Students sue anti-plagiarism service for copyright infringement
-
-
Jones, K.C.1
-
23
-
-
0032650755
-
Plagiarism in programming assignments
-
Joy, M., & Luck, M. (1999). Plagiarism in programming assignments. IEEE Transactions on Education, 42(2), 129-133.
-
(1999)
IEEE Transactions on Education
, vol.42
, Issue.2
, pp. 129-133
-
-
Joy, M.1
Luck, M.2
-
24
-
-
76849097953
-
Hermetic and web plagiarism detection systems for student essays-An evaluation of the state-of-the-art
-
Kakkonen, T., & Mozgovoy, M. (2010). Hermetic and web plagiarism detection systems for student essays-An evaluation of the state-of-the-art. Journal of Educational Computing Research, 42(2), 135-139.
-
(2010)
Journal of Educational Computing Research
, vol.42
, Issue.2
, pp. 135-139
-
-
Kakkonen, T.1
Mozgovoy, M.2
-
25
-
-
84901760294
-
AntiPlag-A sampling-based tool for plagiarism detection in student texts
-
Bari, Italy, 2009
-
Kakkonen, T., & Myller, N. (2009) AntiPlag-A sampling-based tool for plagiarism detection in student texts. Proceedings of the 8th European Conference on e-Learning, Bari, Italy, 2009.
-
(2009)
Proceedings of the 8th European Conference on E-Learning
-
-
Kakkonen, T.1
Myller, N.2
-
26
-
-
1642403504
-
Parsing in a free word order language
-
D. Dowty, L. Karttunen, & A. Zwicky (Eds.) Cambridge, UK: Cambridge University Press
-
Karttunen, L., & Martin, K. (1985). Parsing in a free word order language. In D. Dowty, L. Karttunen, & A. Zwicky (Eds.), Natural language parsing. Cambridge, UK: Cambridge University Press.
-
(1985)
Natural Language Parsing
-
-
Karttunen, L.1
Martin, K.2
-
27
-
-
44449166568
-
Cheating in cyberspace: Maintaining quality in online education
-
Kasprzak, J., & Nixon, M. (2004). Cheating in cyberspace: Maintaining quality in online education. Association for the Advancement of Computing In Education, 12(1), 85-99.
-
(2004)
Association for the Advancement of Computing in Education
, vol.12
, Issue.1
, pp. 85-99
-
-
Kasprzak, J.1
Nixon, M.2
-
31
-
-
33646033855
-
Using freely available tools to produce a partially automated plagiarism detection process
-
Perth, Australia
-
Lancaster, T., & Culwin, F. (2004). Using freely available tools to produce a partially automated plagiarism detection process. Proceedings of the 21st ASCILITE Conference, Perth, Australia.
-
(2004)
Proceedings of the 21st ASCILITE Conference
-
-
Lancaster, T.1
Culwin, F.2
-
32
-
-
0000600219
-
A solution to Plato's problem: The latent semantic analysis theory of the acquisition, induction, and representation of knowledge
-
Landauer, T., & Dumais, S. (1997). A solution to Plato's problem: The latent semantic analysis theory of the acquisition, induction, and representation of knowledge. Psychological Review, 104(2), 211-240.
-
(1997)
Psychological Review
, vol.104
, Issue.2
, pp. 211-240
-
-
Landauer, T.1
Dumais, S.2
-
33
-
-
84899001179
-
Learning human-like knowledge by singular value decomposition: A progress report
-
Massachusetts: The MIT Press
-
Landauer, T., Laham, D., & Foltz, P. (1998). Learning human-like knowledge by singular value decomposition: A progress report. In Advances in neural information processing systems (Vol. 10). Massachusetts: The MIT Press.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Landauer, T.1
Laham, D.2
Foltz, P.3
-
34
-
-
3042587122
-
Simulating text understanding for educational applications with latent semantic analysis: Introduction to LSA
-
Landauer, T., & Psotka, J. (2004). Simulating text understanding for educational applications with latent semantic analysis: Introduction to LSA. Interactive Learning Environments, 8(2), 72-86.
-
(2004)
Interactive Learning Environments
, vol.8
, Issue.2
, pp. 72-86
-
-
Landauer, T.1
Psotka, J.2
-
39
-
-
33748759334
-
Plagiarism-A survey
-
Maurer, H., Kappe, F., & Zaka B. (2006). Plagiarism-A survey. Journal of Universal Computer Science, 12(8), 1050-1083.
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.8
, pp. 1050-1083
-
-
Maurer, H.1
Kappe, F.2
Zaka, B.3
-
40
-
-
76849091569
-
-
Mediaphor Software Entertainment AG. Retrieved February 22, 2010, from
-
Mediaphor Software Entertainment AG. (2010). Plagiarism-Finder. Retrieved February 22, 2010, from http://www.m4-software.com/
-
(2010)
Plagiarism-Finder
-
-
-
41
-
-
78650106626
-
-
Miller, G. A. (2010). Princeton University. Retrieved February 22, 2010, from
-
Miller, G. A. (2010). WordNet. Princeton University. Retrieved February 22, 2010, from http://wordnet.princeton.edu
-
-
-
-
43
-
-
78650127860
-
The use of machine semantic analysis in plagiarism detection
-
Aizu-Wakamatsu, Japan
-
Mozgovoy, M., Tusov, V., & Klyuev, V. (2006). The use of machine semantic analysis in plagiarism detection. Proceedings of the 9th International Conference on Humans and Computers, Aizu-Wakamatsu, Japan (pp. 72-77).
-
(2006)
Proceedings of the 9th International Conference on Humans and Computers
, pp. 72-77
-
-
Mozgovoy, M.1
Tusov, V.2
Klyuev, V.3
-
44
-
-
10244220702
-
Questioning author(ity): ESL/EFL, science, and teaching about plagiarism
-
Myers, S. (1998). Questioning author(ity): ESL/EFL, science, and teaching about plagiarism. Teaching English as a Second or Foreign Language (TESL-EJ), 3(2), 11-20.
-
(1998)
Teaching English As A Second or Foreign Language (TESL-EJ)
, vol.3
, Issue.2
, pp. 11-20
-
-
Myers, S.1
-
45
-
-
73249131049
-
Academic misconduct by university students: Faculty perceptions and responses
-
Nadelson, S. (2007). Academic misconduct by university students: Faculty perceptions and responses. Plagiary, 2(2), 1-10.
-
(2007)
Plagiary
, vol.2
, Issue.2
, pp. 1-10
-
-
Nadelson, S.1
-
47
-
-
78650081341
-
-
OUT-LAW News. Retrieved February 22, 2010, from
-
OUT-LAW News. (2006). Google cache does not breach copyright, says court. Retrieved February 22, 2010, from http://www.out-law.com/page-6572
-
(2006)
Google Cache Does Not Breach Copyright, Says Court
-
-
-
50
-
-
1442310235
-
Finding plagiarisms among a set of programs with JPlag
-
Prechelt, L., Malpohl, G., & Philippsen, M. (2002). Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science, 8(11), 1016-1038.
-
(2002)
Journal of Universal Computer Science
, vol.8
, Issue.11
, pp. 1016-1038
-
-
Prechelt, L.1
Malpohl, G.2
Philippsen, M.3
-
51
-
-
79957825685
-
Advanced text authorship detection methods and their application to biblical texts
-
Putnin , T., Signoriello, D. J., Jain, S., Berryman, M. J., & Abbott, D. (2005). Advanced text authorship detection methods and their application to biblical texts. Proceedings of the SPIE, Brisbane, Australia.
-
(2005)
Proceedings of the SPIE, Brisbane, Australia
-
-
Putnin, T.1
Signoriello, D.J.2
Jain, S.3
Berryman, M.J.4
Abbott, D.5
-
52
-
-
84937178858
-
Using latent semantic analysis to assess knowledge: Some technical considerations
-
Rehder, B., Schreiner, M., Wolfe, M., Lahaml, D., Kintsch, W., & Landauer, T. (1998). Using latent semantic analysis to assess knowledge: Some technical considerations. Discourse Processes, 25, 337-354.
-
(1998)
Discourse Processes
, vol.25
, pp. 337-354
-
-
Rehder, B.1
Schreiner, M.2
Wolfe, M.3
Lahaml, D.4
Kintsch, W.5
Landauer, T.6
-
53
-
-
0038893412
-
Internet plagiarism among college students
-
Scanlon, P., & Neumann, D. (2002). Internet plagiarism among college students. Journal of College Student Development, 43(3), 374-385.
-
(2002)
Journal of College Student Development
, vol.43
, Issue.3
, pp. 374-385
-
-
Scanlon, P.1
Neumann, D.2
-
54
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
San Diego, California
-
Schleimer, S., Wilkerson, D. S., & Aiken, A. (2003). Winnowing: Local algorithms for document fingerprinting. Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. San Diego, California (pp. 76-85).
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
55
-
-
78650083147
-
-
2010, Sciworth Inc. Retrieved February 22, 2010
-
Sciworth Inc. (2010). MyDropBox. Retrieved February 22, 2010, from http://www.mydropbox.com
-
-
-
-
56
-
-
78650161583
-
-
SeeSources.com. Retrieved February 22, 2010
-
SeeSources.com. (2010). Instant, Automatic & Free Text Analysis. Retrieved February 22, 2010, from http://seesources.com/<
-
(2010)
Instant, Automatic & Free Text Analysis
-
-
-
57
-
-
85050214833
-
Automatic authorship attribution
-
Bergen, Norway
-
Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (1999). Automatic authorship attribution. Proceedings of the 9th Conference of the European Chapter of the Association for Computational Linguistics. Bergen, Norway
-
(1999)
Proceedings of the 9th Conference of the European Chapter of the Association for Computational Linguistics.
-
-
Stamatatos, E.1
Fakotakis, N.2
Kokkinakis, G.3
-
58
-
-
57349087444
-
Near similarity search and plagiarism analysis
-
Magdeburg, Germany
-
Stein, B., & zu Eissen, S. M. (2006). Near similarity search and plagiarism analysis. Selected Papers from the 29th Annual Conference of the German Classification Society. Magdeburg, Germany
-
(2006)
Selected Papers from the
, vol.29
-
-
Stein, B.1
Zu Eissen, S.M.2
-
60
-
-
0029701640
-
YAP3: Improved detection of similarities in computer program and other texts
-
Wise, M. (1996). YAP3: Improved detection of similarities in computer program and other texts. SIGCSE Bulletin, 28(1), 130-134
-
(1996)
SIGCSE Bulletin
, vol.28
, Issue.1
, pp. 130-134
-
-
Wise, M.1
-
61
-
-
84937182086
-
Learning from text: Matching reader and text by latent semantic analysis
-
Wolfe, M., Schreiner, M., Rehder, R., Laham, D., Foltz, P., Landauer, T., et al. (1998). Learning from text: Matching reader and text by latent semantic analysis. Discourse Processes, 25, 309-336
-
(1998)
Discourse Processes
, vol.25
, pp. 309-336
-
-
Wolfe, M.1
Schreiner, M.2
Rehder, R.3
Laham, D.4
Foltz, P.5
Landauer, T.6
|