[1] Matthias R.Effective clone detection without language barriers .Switzerland:Institut fur Informatik und angewandte Mathematik,Bern University,2005
[2] Verco K L,Wise M J.Software for detecting suspected plagiarism: comparing structure and attribute counting systems //John R.Proceedings of 1st Australian Conference on Computer Science Education.New York:ACM,1996:81-88
[3] Baker B S,Manber U.Deducing similarities in Java sources from byte codes //Douglis F.Proceedings of Usenix Annual Technical Conference.Louisiana: USENIX,1998
[4] Tamada H,Nakamura M,Monden A.Design and evaluation of birthmarks for detecting theft of Java programs //Proceedings of the IASTED International Conference on Software Engineering.Innsbruck:IASTED,2004:569-574
[5] Parker A,Hamblen J.Computer algorithms for plagiarism detection[J].IEEE Transactions on Education,1989,32(2): 94-99
[6] Faidhi J A,Robinson S K.An empirical approach for detecting program similarity and plagiarism within a university programming environment[J].Computers and Education,1987,11(1):11-19
[7] Simian:Similarity analyser .Australia:Redhill Consulting LTD,2008 .http://www.redhillconsulting.com.au/products/simian/