
suspicious sources of plagiarism and filter them before submitting results to the inter-
nal part of the PDS. 
Acknowledgements  
The authors would like to acknowledge a great help from Ms. Marina Kim and Ms. 
Svetlana Kim for conducting the experiment with Crot PDS.In this study we concen-
trated on an architecture for a plagiarism detection service. 
References 
1.  A. V. ex rel. Vanderhye v. iParadigms, LLC, 562 F.3d 630, 2009 Copr.L.Dec. P 29,743, 90 
U. S. P.Q.2d 1513 (4th Cir. 2009).  
2.  A. V. v. iParadigms, LLC,  544 F.Supp.2d 473, 232 Ed. Law Rep. 176 (4th Cir. 2008) 
3.  Abbasi A. & Chen H. (2008). Writeprints: A stylometric approach to identity-level identifi-
cation and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26, 2, Article 7 (April 
2008), 29 pages. DOI=10.1145/1344411.1344413 
4.  Bennett M. G.. (2009) A Nexus of Law & Technology: Analysis and Postsecondary Impli-
cations of A.V. et al. v. iParadigms, LLC Journal of Student Conduct Administration, 2009, 
Vol. 2, no.1. p. 40-45 
5.  Burrows S., Uitdenbogerd A.L., and Turpin A. (2009). Application of Information Retriev-
al Techniques for Source Code Authorship Attribution. In Proceedings of the 14th Interna-
tional Conference on Database Systems for Advanced Applications (DASFAA '09), Xiao-
fang Zhou, Haruo Yokota, Ke Deng, and Qing Liu (Eds.). Springer-Verlag, Berlin, Heidel-
berg, 699-713. DOI=10.1007/978-3-642-00887-0_61  
6.  Butakov, S. and Shcherbinin, V. (2009) On the Number of Search Queries Required for 
Internet Plagiarism Detection. In Proceedings of the 2009 Ninth IEEE international Confe-
rence on Advanced Learning Technologies - Volume 00 (July 15 - 17, 2009). ICALT. IEEE 
Computer Society, Washington, DC, 482-483 
7.  Carter M. (2008). How to Use Google Alerts to Detect Plagiarism. Retrieved on December 
15, 2010 from http://www.suite101.com/content/how-to-use-google-alerts-for-web-writers-
a86525 
8.  Chowdhury A., Frieder O., Grossman D., and McCabe M. C.. (2002). Collection statistics 
for fast duplicate document detection. ACM Trans. Inf. Syst. 20, 2 (April 2002), 171-191. 
DOI=10.1145/506309.506311  
9.  Christen v. Iparadigms, LLC, August 4, 2010, 2010 WL 3063137, Copr.L.Dec. P 29,960, 
(E. D. Va. 2010). 
10. Culwin F., & Child M. (2010) Optimizing and Automating the Choice of Search Strings 
when Investigating Possible Plagiarism. In Proceedings of 4th International Plagiarism 
Conference, Newcastle, June 2010. Retrieved on November 20, 2010 from 
http://www.plagiarismadvice.org/  
11. Horovitz, S. (2008). Two wrongs don't negate a copyright. Florida Law Review, 60, 229. 
12. Jensen, L.A., Arnett, J.J., Feldman, S.S. & Cauffman, E. (2002), It’s wrong, but everybody 
does it: academic dishonesty among high school students, Contemporary Educational Psy-
chology, 27(2), 209-228 
130