Maintaining Academic Integrity in Programming: Locality-Sensitive Hashing and Recommendations
Not many efficient similarity detectors are employed in practice to maintain academic integrity. Perhaps it is because they lack intuitive reports for investigation, they only have a command line interface, and/or they are not publicly accessible. This paper presents SSTRANGE, an efficient similarit...
Saved in:
Main Author: | Oscar Karnalim (Author) |
---|---|
Format: | Book |
Published: |
MDPI AG,
2023-01-01T00:00:00Z.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Software Protection by Combining Hash Function with Hardware Identifications
by: ایاد عبد القھار عبد السلام فاتن صادق خزعل
Published: (2019) -
"HASH"ing out pancreatitis: the new increasingly common culprit
by: Joel Chandy, et al.
Published: (2019) -
APPLYING DIGITAL SIGNATURE TO PRINTOUT FOR TRUSTWORTHY VERIFICATION USING IMAGE HASH
by: Paradorn Athichitsakul
Published: (2016) -
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD (AES) DAN HASH UNTUK IDENTIFIKASI KEASLIAN IJAZAH
by: Moh. Mulki Ridho, -
Published: (2016) -
Butane hash oil and dabbing: insights into use, amateur production techniques, and potential harm mitigation
by: Al-Zouabi I, et al.
Published: (2018)