{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:39:45Z","timestamp":1725565185284},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220640"},{"type":"electronic","value":"9783540247753"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24775-3_63","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T23:48:20Z","timestamp":1284162500000},"page":"529-538","source":"Crossref","is-referenced-by-count":7,"title":["Semantic Sequence Kin: A Method of Document Copy Detection"],"prefix":"10.1007","author":[{"given":"Jun-Peng","family":"Bao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun-Yi","family":"Shen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Dong","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hai-Yan","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Di","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"63_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/BFb0026683","volume-title":"Machine Learning: ECML-98","author":"T. Joachims","year":"1998","unstructured":"Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: N\u00e9dellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol.\u00a01398, pp. 137\u2013142. Springer, Heidelberg (1998)"},{"key":"63_CR2","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1162\/153244303322533197","volume":"3","author":"N. Cancedda","year":"2003","unstructured":"Cancedda, N., Gaussier, E., Goutte, C., Renders, J.M.: Word-Sequence Kernels. Journal of Machine Learning Research\u00a03, 1059\u20131082 (2003)","journal-title":"Journal of Machine Learning Research"},{"key":"63_CR3","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1162\/153244302760200687","volume":"2","author":"H. Lodhi","year":"2002","unstructured":"Lodhi, H., Saunders, C., Shawe-Taylor, J., Cristianini, N., Watkins, C.: Text Classification using String Kernels. Journal of Machine Learning Research\u00a02, 419\u2013444 (2002)","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"crossref","unstructured":"Brin, S., Davis, J., Garcia-Molina, H.: Copy detection mechanisms for digital documents. In: Proceedings of the ACM SIGMOD Annual Conference, San Francisco, USA (1995)","key":"63_CR4","DOI":"10.1145\/223784.223855"},{"doi-asserted-by":"crossref","unstructured":"Broder, A.Z., Glassman, S.C., Manasse, M.S.: Syntactic Clustering of the Web. In: Proceedings of the Sixth International Web Conference, Santa Clara, California (1997)","key":"63_CR5","DOI":"10.1016\/S0169-7552(97)00031-7"},{"unstructured":"Heintze, N.: Scalable Document Fingerprinting. In: Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland, California (1996)","key":"63_CR6"},{"unstructured":"Shivakumar, N., Garcia-Molina, H.: SCAM: A copy detection mechanism for digital documents. In: Proceedings of 2nd International Conference in Theory and Practice of Digital Libraries, Austin, Texas (1995)","key":"63_CR7"},{"unstructured":"Monostori, K., Zaslavsky, A., Schmidt, H.: MatchDetectReveal: Finding Overlapping and Similar Digital Documents. In: Proceedings of Information Resources Management Association International Conference, Alaska (2000)","key":"63_CR8"},{"doi-asserted-by":"crossref","unstructured":"Si, A., Leong, H.V., Lau, R.W.H.: CHECK: A Document Plagiarism Detection System. In: Proceedings of ACM Symposium for Applied Computing, pp. 70\u201377 (1997)","key":"63_CR9","DOI":"10.1145\/331697.335176"},{"key":"63_CR10","first-page":"121","volume":"38","author":"S. Qinbao","year":"2001","unstructured":"Qinbao, S., Junyi, S.: On illegal coping and distributing detection mechanism for digital goods. Journal of Computer Research and Development\u00a038, 121\u2013125 (2001)","journal-title":"Journal of Computer Research and Development"},{"key":"63_CR11","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1108\/eb046814","volume":"14","author":"M.F. Porter","year":"1980","unstructured":"Porter, M.F.: An algorithm for suffix stripping. Program\u00a014, 130\u2013137 (1980)","journal-title":"Program"},{"doi-asserted-by":"crossref","unstructured":"Denning, P.J.: Editorial: Plagiarism in the web. Communications of the ACM 38 (1995)","key":"63_CR12","DOI":"10.1145\/219663.219675"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24775-3_63.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:56:34Z","timestamp":1605761794000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24775-3_63"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220640","9783540247753"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24775-3_63","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}