Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 793697, 15 pages
http://dx.doi.org/10.1155/2015/793697
Research Article

Detecting Copy Directions among Programs Using Extreme Learning Machines

College of Information Science and Engineering, Northeastern University, Liaoning 110819, China

Received 21 August 2014; Revised 10 November 2014; Accepted 10 November 2014

Academic Editor: Tao Chen

Copyright © 2015 Bin Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Ferrante, K. J. Ottenstein, and J. D. Warren, “The program dependence graph and its use in optimization,” ACM Transactions on Programming Languages and Systems, vol. 9, no. 3, pp. 319–349, 1987. View at Publisher · View at Google Scholar · View at Scopus
  2. G. B. Huang, Q. Y. Zhu, and C. K. Siew, “Extreme learning machine: theory and applications,” Neurocomputing, vol. 70, no. 1–3, pp. 489–501, 2006. View at Publisher · View at Google Scholar · View at Scopus
  3. G.-B. Huang, C.-K. Siew, and L. Chen, “Universal approximation using incremental constructive feedforward networks with random hidden nodes,” IEEE Transactions on Neural Networks, vol. 17, no. 4, pp. 879–892, 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. J. W. Cao, T. Chen, and J. Fan, “Fast online learning algorithm for landmark recognition based on bow framework,” in Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications, pp. 1163–1168, June 2014.
  5. G.-B. Huang and L. Chen, “Convex incremental extreme learning machine,” Neurocomputing, vol. 70, no. 16–18, pp. 3056–3062, 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. G.-B. Huang and L. Chen, “Enhanced random search based incremental extreme learning machine,” Neurocomputing, vol. 71, no. 16-18, pp. 3460–3468, 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Cao, Z. Lin, G.-B. Huang, and N. Liu, “Voting based extreme learning machine,” Information Sciences, vol. 185, pp. 66–77, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. G.-B. Huang, X. Ding, and H. Zhou, “Optimization method based extreme learning machine for classification,” Neurocomputing, vol. 74, no. 1–3, pp. 155–163, 2010. View at Publisher · View at Google Scholar · View at Scopus
  9. G.-B. Huang, H. Zhou, X. Ding, and R. Zhang, “Extreme learning machine for regression and multiclass classification,” IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, vol. 42, no. 2, pp. 513–529, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. X. Yan and J. Han, “CloseGraph: mining closed frequent graph patterns,” in Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 286–295, Washington, DC, USA, August 2003. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Liu, C. Chen, J. Han, and P. S. Yu, “GPLAG: detection of software plagiarism by program dependence graph analysis,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06), pp. 872–881, August 2006. View at Scopus
  12. L. Prechelt, G. Malpohl, and M. Philippsen, “Finding plagiarisms among a set of programs with JPlag,” Journal of Universal Computer Science, vol. 8, no. 11, pp. 1016–1038, 2002. View at Google Scholar · View at Scopus
  13. G. Cosma and M. Joy, “An approach to source-code plagiarism detection and investigation using latent semantic analysis,” IEEE Transactions on Computers, vol. 61, no. 3, pp. 379–394, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. I. D. Baxter, A. Yahin, L. Moura, M. Sant'Anna, and L. Bier, “Clone detection using abstract syntax trees,” in Proceedings of the IEEE International Conference on Software Maintenance (ICSM '98), pp. 368–377, Bethesda, Md, USA, November 1998. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Kamiya, S. Kusumoto, and K. Inoue, “CCFinder: a multilinguistic token-based code clone detection system for large scale source code,” IEEE Transactions on Software Engineering, vol. 28, no. 7, pp. 654–670, 2002. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Johnson, “Identifying redundancy in source code using fingerprints,” in Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON '93), pp. 171–183, 1993.
  17. J. Johnson, “Visualizing textual redundancy in legacy source,” in Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research (CASCON '94), p. 32, 1994.
  18. S. Ducasse, M. Rieger, and S. Demeyer, “A language independent approach for detecting duplicated code,” in Proceedings of the IEEE International Conference on Software Maintenance (ICSM '99), pp. 109–118, September 1999. View at Scopus
  19. X. Yan, J. Han, and R. Afshar, “Clospan, Mining closed sequential patterns in large databases,” in Proceedings of the 3rd SIAM International Conference on Data Mining, pp. 166–177, San Francisco, Calif, USA, May 2003.
  20. R. Falke, P. Frenzel, and R. Koschke, “Empirical evaluation of clone detection using syntax suffix trees,” Empirical Software Engineering, vol. 13, no. 6, pp. 601–643, 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. R. Koschke, R. Falke, and P. Frenzel, “Clone detection using abstract syntax suffix trees,” in Proceedings of the 13th Working Conference on Reverse Engineering (WCRE '06), pp. 253–262, October 2006. View at Publisher · View at Google Scholar · View at Scopus
  22. L. Jiang, G. Misherghi, Z. Su, and S. Glondu, “DECKARD: scalable and accurate tree-based detection of code clones,” in Proceedings of the 29th International Conference on Software Engineering (ICSE '07), pp. 96–105, Minneapolis, Minn, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Komondoor and S. Horwitz, “Using slicing to identify duplication in source code,” in Proceedings of the 8th International Symposium on Static Analysis (SAS '01), pp. 40–56, 2001.
  24. H. Kim, Y. Jung, S. Kim, and K. Yi, “MeCC: memory comparison-based clone detector,” in Proceedings of the 33rd International Conference on Software Engineering (ICSE '11), pp. 301–310, May 2011. View at Publisher · View at Google Scholar · View at Scopus