{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:22:03Z","timestamp":1725798123243},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319088518"},{"type":"electronic","value":"9783319088525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08852-5_3","type":"book-chapter","created":{"date-parts":[[2014,7,17]],"date-time":"2014-07-17T14:03:23Z","timestamp":1405605803000},"page":"21-30","source":"Crossref","is-referenced-by-count":2,"title":["A Fuzzy R Code Similarity Detection Algorithm"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Bartoszuk","sequence":"first","affiliation":[]},{"given":"Marek","family":"Gagolewski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Aiken, A.: MOSS (Measure of software similarity) plagiarism detection system, \n                    \n                      http:\/\/theory.stanford.edu\/~aiken\/moss\/"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"1871","DOI":"10.1016\/j.scico.2012.11.008","volume":"78","author":"M. Chilowicz","year":"2013","unstructured":"Chilowicz, M., Duris, E., Roussel, G.: Viewing functions as token sequences to highlight similarities in source code. Science of Computer Programming\u00a078, 1871\u20131891 (2013)","journal-title":"Science of Computer Programming"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/363958.363994","volume":"7","author":"F.J. Damerau","year":"1964","unstructured":"Damerau, F.J.: A technique for computer detection and correction of spelling errors. Communications of the ACM\u00a07(3), 171\u2013176 (1964)","journal-title":"Communications of the ACM"},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J. Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program Lang. Syst.\u00a09(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program Lang. Syst."},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Fodor, J., Roubens, M.: Fuzzy Preference Modelling and Multicriteria Decision Support. Springer (1994)","DOI":"10.1007\/978-94-017-1648-2"},{"issue":"9","key":"3_CR6","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1016\/j.ijar.2011.01.010","volume":"52","author":"M. Gagolewski","year":"2011","unstructured":"Gagolewski, M., Grzegorzewski, P.: Possibilistic analysis of arity-monotonic aggregation operators and its relation to bibliometric impact assessment of individuals. International Journal of Approximate Reasoning\u00a052(9), 1312\u20131324 (2011)","journal-title":"International Journal of Approximate Reasoning"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Grabisch, M., Marichal, J.L., Mesiar, R., Pap, E.: Aggregation functions. Cambridge University Press (2009)","DOI":"10.1017\/CBO9781139644150"},{"issue":"2","key":"3_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1002\/j.1538-7305.1950.tb00463.x","volume":"29","author":"R.W. Hamming","year":"1950","unstructured":"Hamming, R.W.: Error detecting and error correcting codes. Bell System Technical Journal\u00a029(2), 147\u2013160 (1950)","journal-title":"Bell System Technical Journal"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/TIT.1958.1057446","volume":"4","author":"C.Y. Lee","year":"1958","unstructured":"Lee, C.Y.: Some properties of nonbinary error-correcting codes. IRE Transactions on Information Theory\u00a04(2), 77\u201382 (1958)","journal-title":"IRE Transactions on Information Theory"},{"issue":"8","key":"3_CR10","first-page":"707","volume":"10","author":"I. Levenshtein","year":"1966","unstructured":"Levenshtein, I.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady\u00a010(8), 707\u2013710 (1966)","journal-title":"Soviet Physics Doklady"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Liu, C., Chen, C., Han, J., Yu, P.S.: GPLAG: Detection of Software Plagiarism by Program Dependence Graph Analysis. In: Proc. 12th ACM SIGKDD Intl. Conf. Knowledge Discovery and Data Mining (KDD 2006), pp. 872\u2013881 (2006)","DOI":"10.1145\/1150402.1150522"},{"issue":"1","key":"3_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G. Navarro","year":"2001","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Computing Surveys\u00a033(1), 31\u201388 (2001)","journal-title":"ACM Computing Surveys"},{"issue":"11","key":"3_CR13","first-page":"1016","volume":"8","author":"L. Prechelt","year":"2002","unstructured":"Prechelt, L., Malpohl, G., Philippsen, M.: Finding plagiarisms among a set of programs with JPlag. Journal of Universal Computer Science\u00a08(11), 1016\u20131038 (2002)","journal-title":"Journal of Universal Computer Science"},{"key":"3_CR14","unstructured":"Prechelt, L., Malpohl, G., Phlippsen, M.: JPlag: Finding plagiarisms among a set of programs. Tech. rep. (2000)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1016\/j.ins.2010.04.022","volume":"259","author":"W. Qu","year":"2014","unstructured":"Qu, W., Jia, Y., Jiang, M.: Pattern mining of cloned codes in software systems. Information Sciences\u00a0259, 544\u2013554 (2014)","journal-title":"Information Sciences"},{"key":"3_CR16","unstructured":"R Core Team: R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria (2014), \n                    \n                      http:\/\/www.R-project.org\/"},{"key":"3_CR17","unstructured":"Winkler, W.E.: String Comparator Metrics and Enhanced Decision Rules in the Fellegi-Sunter Model of Record Linkage. In: Proc. Section on Survey Research Methods (ASA), pp. 354\u2013359 (1990)"},{"key":"3_CR18","unstructured":"Wise, M.J.: String similarity via greedy string tiling and running Karp-Rabin matching. Tech. rep., Dept. of Computer Science, University of Sydney (1993)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management of Uncertainty in Knowledge-Based Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08852-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T11:13:12Z","timestamp":1558955592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08852-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319088518","9783319088525"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08852-5_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}