Author of the publication

High Level Features for Detecting Source Code Plagiarism across Programming Languages.

, , , , , and . FIRE Workshops, volume 1587 of CEUR Workshop Proceedings, page 10-14. CEUR-WS.org, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sistema multiagente integrador de bibliotecas digitales., , , , and . Research in Computing Science, (2015)Pertinence of Lexical and Structural Features for Plagiarism Detection in Source Code., , , , and . Research in Computing Science, (2014)A document is known by the company it keeps: neighborhood consensus for short text categorization., , , and . Language Resources and Evaluation, 47 (1): 127-149 (2013)Agrupamiento de textos cortos en dominios cruzados., , , , and . Research in Computing Science, (2016)Measuring Critical Reception in Kids Through Consumption of Risky Challenges Videos in YouTube., , , , , , and . HCI (33), volume 1032 of Communications in Computer and Information Science, page 331-338. Springer, (2019)Enhancing Text Classification by Information Embedded in the Test Set., , and . CICLing, volume 6008 of Lecture Notes in Computer Science, page 627-637. Springer, (2010)Towards Automatic Detection of User Influence in Twitter by Means of Stylistic and Behavioral Features., , , and . MICAI (1), volume 8856 of Lecture Notes in Computer Science, page 245-256. Springer, (2014)UAMCLyR at RepLab 2014: Author Profiling Task., , , , , and . CLEF (Working Notes), volume 1180 of CEUR Workshop Proceedings, page 1547-1558. CEUR-WS.org, (2014)From Dialogue Corpora to Dialogue Systems: Generating a Chatbot with Teenager Personality for Preventing Cyber-Pedophilia., , , and . TSD, volume 9924 of Lecture Notes in Computer Science, page 531-539. Springer, (2016)Using String Information for Malware Family Identification., , , , , and . IBERAMIA, volume 8864 of Lecture Notes in Computer Science, page 686-697. Springer, (2014)