@article{moussiades-clustering,
	author    = {Lefteris Moussiades and Athena Vakali},
	title     = {PDetect: A Clustering Approach for Detecting Plagiarism
		in Source Code Datasets},
	journal   = {Comput. J.},
	volume    = {48},
	number    = {6},
	year      = {2005},
	pages     = {651-661},
	ee        = {http://dx.doi.org/10.1093/comjnl/bxh119},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{son-kernels,
	author    = {Jeong Woo Son and
		Seong-Bae Park and
			Se-Young Park},
	title     = {Program Plagiarism Detection Using Parse Tree Kernels},
	booktitle = {PRICAI 2006: Proceedings of the 9th,Pacific Rim International Conference on Artificial Intelligence},
	year      = {2006},
	pages     = {1000-1004},
	ee        = {http://dx.doi.org/10.1007/11801603_122},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}


@phdthesis{cosma-phd,
	author = "Georgina Cosma",
	title = "An Approach o Source-Code Plagiarism Detection and Investigation Using Latent Semantic Analysis",
	school = "University of Warwick",
	year = "2008"
}

@inproceedings{livieri-icse,
	author    = {Simone Livieri and Yoshiki Higo and Makoto Matsushita and Katsuro Inoue},
	title     = {Very-Large Scale Code Clone Analysis and Visualization of
		Open Source Programs Using Distributed CCFinder: D-CCFinder},
	booktitle = {ICSE 2007: Proceedings of the 29th International Conference on Software Engineering},
	year      = {2007},
	pages     = {106-115},
	ee        = {http://doi.ieeecomputersociety.org/10.1109/ICSE.2007.97},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{tiarks-scam,
	author    = {Rebecca Tiarks and
		Rainer Koschke and
			Raimar Falke},
	title     = {An Assessment of Type-3 Clones as Detected by State-of-the-Art
		Tools},
	booktitle = {SCAM 2009: Proceedings of the Ninth IEEE International Working Conference on Source Code Analysis and Manipulation},
	year      = {2009},
	pages     = {67-76},
	ee        = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2009.16},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{goede-scam,
	author    = {Nils G{\"o}de},
	title     = {Evolution of Type-1 Clones},
	booktitle = {SCAM 2009: Proceedings of the Ninth IEEE International Working Conference on Source Code Analysis and Manipulation},
	year      = {2009},
	pages     = {77-86},
	ee        = {http://doi.ieeecomputersociety.org/10.1109/SCAM.2009.17},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}


@article{bellon-tse,
	author    = {Stefan Bellon and Rainer Koschke and Giuliano Antoniol and Jens Krinke and Ettore Merlo},
	title     = {Comparison and Evaluation of Clone Detection Tools},
	journal   = {IEEE Trans. Software Eng.},
	volume    = {33},
	number    = {9},
	year      = {2007},
	pages     = {577-591},
	ee        = {http://doi.ieeecomputersociety.org/10.1109/TSE.2007.70725},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}



@inproceedings{wettel-synasc,
	author    = {Richard Wettel and Radu Marinescu},
	title     = {Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments},
	booktitle = {SYNASC 2005: Proceedings of the 7th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing},
	year      = {2005},
	pages     = {63-70},
	ee        = {http://doi.ieeecomputersociety.org/10.1109/SYNASC.2005.20},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{ducasse-jsme,
	author    = {St{\'e}phane Ducasse and Oscar Nierstrasz and Matthias Rieger},
	title     = {On the effectiveness of clone detection by string matching},
	journal   = {Journal of Software Maintenance},
	volume    = {18},
	number    = {1},
	year      = {2006},
	pages     = {37-58},
	ee        = {http://dx.doi.org/10.1002/smr.317},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{kamiya-tse,
	author    = {Toshihiro Kamiya and
		Shinji Kusumoto and
			Katsuro Inoue},
	title     = {CCFinder: A Multilinguistic Token-Based Code Clone Detection
		System for Large Scale Source Code},
	journal   = {IEEE Trans. Software Eng.},
	volume    = {28},
	number    = {7},
	year      = {2002},
	pages     = {654-670},
	ee        = {http://www.computer.org:80/tse/ts2002/e0654abs.htm},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{baker-wcre,
	author    = {Brenda S. Baker},
	title     = {On Finding Duplication and Near-Duplication in Large Software Systems},
	booktitle = {WCRE 1995: Proceedings of the 2nd Working Conference on Reverse Engineering},
	year      = {1995},
	pages     = {86-95},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{kim-fse,
	author    = {Miryung Kim and Vibha Sazawal and David Notkin and Gail C. Murphy},
	title     = {An empirical study of code clone genealogies},
	booktitle = {ESEC/SIGSOFT FSE 2005: Proceedings of the 10th European Software Engineering Conference held jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering},
	year      = {2005},
	pages     = {187-196},
	ee        = {http://doi.acm.org/10.1145/1081706.1081737},
}

@inproceedings{baxter-icsm,
	author    = {Ira D. Baxter and Andrew Yahin and Leonardo Mendon\c{c}a de Moura and Marcelo Sant'Anna and Lorraine Bier},
	title     = {Clone Detection Using Abstract Syntax Trees},
	booktitle = {ICSM 1998: Proceedings of the 12th International Conference on Software Maintenance},
	year      = {1998},
	pages     = {368-377},
	ee        = {http://computer.org/proceedings/icsm/8779/87790368abs.htm},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@inproceedings{krinke-wcre,
	author    = {Jens Krinke},
	title     = {Identifying Similar Code with Program Dependence Graphs},
	booktitle = {WCRE 2001: Proceedings of the 8th Working Conference on Reverse Engineering},
	year      = {2001},
	pages     = {301-309},
	ee        = {http://computer.org/proceedings/wcre/1303/13030301abs.htm},
	bibsource = {DBLP, http://dblp.uni-trier.de}
}

@article{urvoy-tws,
 author = {Urvoy, T. and Chauveau, E. and Filoche, P. and Lavergne, T.},
 title = {Tracking Web spam with HTML style similarities},
 journal = {ACM Trans. Web},
 volume = {2},
 number = {1},
 year = {2008},
 issn = {1559-1131},
 pages = {1--28},
 doi = {http://doi.acm.org/10.1145/1326561.1326564},
 publisher = {ACM},
 address = {New York, USA}
}

@conference{cosma-scp,
  title={{Source-code plagiarism: A UK academic perspective}},
  author={Cosma, G. and Joy, M.},
  booktitle={Proc. 7th Annu. Conf. Higher Education Academy Network for Information and Computer Sciences},
  year={2006},
  pages={29--31}
}

@article{zeidman-dscp,
  title={{Detecting source-code plagiarism}},
  author={Zeidman, B.},
  journal={DOCTOR DOBBS JOURNAL},
  volume={29},
  pages={57--60},
  year={2004},
  publisher={CMP MEDIA LLC}
}

@article{whale-ips,
  title={{Identification of program similarity in large populations}},
  author={Whale, G.},
  journal={The Computer Journal},
  volume={33},
  number={2},
  pages={140--146},
  year={1990},
  publisher={Br Computer Soc}
}

@article{wise-yid,
  title={{YAP3: Improved detection of similarities in computer program and other texts}},
  author={Wise, M.J.},
  journal={Twenty-Seventh SIGCSE Technical Symposium},
  pages={130--134},
  year={1996},
  address = {Philadelphia,  USA}
}

@conference{schleimer-wla,
  title={{Winnowing: local algorithms for document fingerprinting}},
  author={Schleimer, S. and Wilkerson, D.S. and Aiken, A.},
  booktitle={Proceedings of the 2003 ACM SIGMOD},
  pages={76--85},
  year={2003},
  organization={ACM New York, NY, USA}
}

@article{clough-pna,
  title={{Plagiarism in natural and programming languages: an overview of current tools and technologies}},
  author={Clough, P.},
  journal={Research Memoranda: CS-00-05, Department of Computer Science, University of Sheffield},
  year={2000}
}

@article{urvoy-trackingWebSpamWithHiddenStyleSimilarity,
  title={{Tracking web spam with hidden style similarity}},
  author={Urvoy, T. and Lavergne, T. and Filoche, P.},
  journal={AIRWeb 2006 Program},
  pages={25},
  year={2006}
}

@article{denoeud-distanceDeTransfert,
  title={{Maximum de la distance de transfert {\`a} une partition donn{\'e}e}},
  author={Charon, I. and Denoeud, L. and Hudry, O. and others},
  journal={Mathematiques et Sciences humaines},
  pages={45--86},
  year={2007},
  publisher={Paris: Centre d'analyse et de mathematique sociales, Ecole des hautes etudes en sciences sociales}
}

@misc{malpohl-jplag,
  author = {Guido Malpohl},
  title = {{Jplag, Detecting Software Plagiarism}},
  howpublished = "\url{http://www.ipd.uni-karlsruhe.de/jplag/}"
}

@misc{wassner-baldr,
  author = {Hubert Wassner},
  title = {{Baldr, l'outil anti-fraude/anti-plagiat}},
  howpublished = "\url{http://professeurs.esiea.fr/wassner/?2007/06/15/75-baldr-l-outil-anti-fraude-anti-plagiat}"
}

@misc{iacs-plagiarism,
  author = {Cosma, G. and Joy, M. and White, D. and Yau, J.},
  title = {{Plagiarism prevention and detection}},
  howpublished = "\url{http://www.ics.heacademy.ac.uk/resources/assessment/plagiarism/index.html}"
}

@article{kuhn-methodeHongroise,
    author={Kuhn, H.W.},
    year={1955},
    title={The Hungarian method for the assignment problem},
    journal={Naval Res. Logist. Quart.},
    volume={2}, 
    pages={83--97}
}

@article{levenshtein-distance,
    author={Levenshtein}, 
    title={Binary codes capable of correcting deletions, insertions, and reversals},
    journal={Soviet Physics Doklady},
    volume={10},
    year={1966},
    pages={707--710}
}


@article{cilibrasi2005clustering,
  title={{Clustering by compression}},
  author={Cilibrasi, R. and Vitanyi, PMB},
  journal={IEEE Transactions on Information theory},
  volume={51},
  number={4},
  pages={1523--1545},
  year={2005}
}

@techreport{joy-plagiarismInProgrammingAssignments,
 author = {Joy, Mike and Luck, Michael},
 title = {Plagiarism in Programming Assignments},
 year = {1998},
 source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Awarwick_cs%3Ancstrl.warwick_cs%2F%2FCS-RR-345},
 publisher = {University of Warwick},
 address = {Coventry, UK, UK},
 }

@article{daly-patternsOfPlagiarism,
 author = {Daly, Charlie and Horgan, Jane},
 title = {Patterns of plagiarism},
 journal= {Proceedings of the 36th SIGCSE technical symposium on Computer science education},
 pages = {383--387},
 year = {2005},
 publisher = {ACM},
 address = {Saint Louis, Missouri, USA},
 }

@article{prechelt-findingPlagiarismsJPlag,
  author =     "L. Prechelt and G. Malpohl and M. Philippsen",
  title =      "Finding Plagiarisms among a Set of Programs with JPlag",
  journal =    "Journal of Universal Computer Science",
  year =       "2002",
  volume =     "8",
  number =     "11",
  pages =      "1016--1038",
}

@techreport{freire2008design,
  title={{Design of the ac academic plagiarism detection system}},
  author={Freire, M. and Cebrian, M.},
  year={2008},
  institution={Technical report, Tech. rep., Escuela Politecnica Superior, Universidad Autonoma de Madrid, Madrid, Spain}
}

@article{veronis2000rosetta,
  title={{From the Rosetta stone to the information society}},
  author={V{\'e}ronis, J.},
  journal={Parallel Text Processing-Alignment and Use of Translation Corpora},
  pages={1--24},
  year={2000}
}
