{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T11:40:09Z","timestamp":1744026009806,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642331848"},{"type":"electronic","value":"9783642331855"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33185-5_1","type":"book-chapter","created":{"date-parts":[[2012,8,28]],"date-time":"2012-08-28T13:42:14Z","timestamp":1346161334000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["Experiments with Filtered Detection of Similar Academic Papers"],"prefix":"10.1007","author":[{"given":"Yaakov","family":"HaCohen-Kerner","sequence":"first","affiliation":[]},{"given":"Aharon","family":"Tayeb","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1007\/s11948-002-0005-6","volume":"8","author":"M.C. Loui","year":"2002","unstructured":"Loui, M.C.: Seven Ways to Plagiarize. Science and Engineering Ethics\u00a08(4), 529\u2013539 (2002)","journal-title":"Science and Engineering Ethics"},{"issue":"2","key":"1_CR2","first-page":"36","volume":"3","author":"B. Martin","year":"1994","unstructured":"Martin, B.: Plagiarism: a Misplaced Emphasis. Journal of Information Ethics\u00a03(2), 36\u201347 (1994)","journal-title":"Journal of Information Ethics"},{"key":"1_CR3","unstructured":"Ceska, Z.: The Future of Copy Detection Techniques. In: Proceedings of the First Young Researchers Conference on Applied Sciences (YRCAS), pp. 5\u201310 (2007)"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/872757.872770","volume-title":"Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMOD 2003)","author":"S. Schleimer","year":"2003","unstructured":"Schleimer, S., Wilkerson, D.S., Aiken, A.: Winnowing: Local Algorithms for Document Fingerprinting. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMOD 2003), pp. 76\u201385. ACM, New York (2003)"},{"issue":"4","key":"1_CR5","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/1053291.1053293","volume":"48","author":"C. Collberg","year":"2005","unstructured":"Collberg, C., Kobourov, S., Louie, J., Slattery, T.: Self-Plagiarism in Computer Science. Commun. ACM\u00a048(4), 88\u201394 (2005)","journal-title":"Commun. ACM"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Sorokina, D., Gehrke, J., Warner, S., Ginsparg, P.: Plagiarism Detection in arXiv. In: ICDM, pp. 1070\u20131075 (2006)","DOI":"10.1109\/ICDM.2006.126"},{"issue":"1","key":"1_CR7","first-page":"91","volume":"1","author":"D. Keuskamp","year":"2007","unstructured":"Keuskamp, D., Sliuzas, R.: Plagiarism Prevention or Detection? The Contribution of Text-Matching Software to Education about Academic Integrity. Journal of Academic Language and Learning\u00a01(1), 91\u201399 (2007)","journal-title":"Journal of Academic Language and Learning"},{"key":"1_CR8","unstructured":"HaCohen-Kerner, Y., Tayeb, A., Ben-Dror, N.: Plagiarism Detection in Computer Science Papers. In: Proceedings of the 23rd International Conference on Computational Linguistics (COLING 2010), pp. 421\u2013429 (2010)"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1145\/236462.236525","volume":"28","author":"M.J. Wise","year":"1996","unstructured":"Wise, M.J.: YAP3: Improved Detection of Similarities in Computer Program and Other Texts. ACM SIGCSE\u00a028, 130\u2013134 (1996)","journal-title":"ACM SIGCSE"},{"key":"1_CR10","unstructured":"Burrows, S., Tahaghoghi, S., Zobel, J.: Efficient and Effective Plagiarism Detection for Large Code Repositories. In: Proceedings of the Second Australian Undergraduate Students\u2019 Computing Conference, pp. 8\u201315 (2004)"},{"issue":"7","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TIT.2004.830793","volume":"50","author":"X. Chen","year":"2004","unstructured":"Chen, X., Francia, B., Li, M., Mckinnon, B., Seker, A.: Shared Information and Program Plagiarism Detection. IEEE Trans. Information Theory\u00a050(7), 1545\u20131550 (2004)","journal-title":"IEEE Trans. Information Theory"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1504\/IJBIDM.2008.020514","volume":"3","author":"A. Jadalla","year":"2008","unstructured":"Jadalla, A., Elnagar, A.: PDE4Java: Plagiarism Detection Engine for Java Source Code: A Clustering Approach. International Journal of Business Intelligence and Data Mining (IJBIDM)\u00a03(2), 121\u2013135 (2008)","journal-title":"International Journal of Business Intelligence and Data Mining (IJBIDM)"},{"key":"1_CR13","unstructured":"Manber, U.: Finding Similar Files in a Large File System. In: USENIX Technical Conference on USENIX Winter, San Francisco, CA, pp. 1\u201310 (1994)"},{"key":"1_CR14","unstructured":"Heintze, N.: Scalable Document Fingerprinting. In: USENIX Workshop on Electronic Commerce (1996)"},{"key":"1_CR15","unstructured":"Shivakumar, N., G-Molina, H.: SCAM: A Copy Detection Mechanism for Digital Documents. In: Proceedings of the Second Annual Conference on the Theory and Practice of Digital Libraries, vol.\u00a024(2), pp. 398\u2013409 (1995)"},{"key":"1_CR16","unstructured":"Broder, A.Z.: On the Resemblance and Containment of Document. In: Compression and Complexity of Sequences (SEQUENCES 1997), pp. 21\u201329 (1997)"},{"key":"1_CR17","unstructured":"Lyon, C., Malcolm, J., Dickerson, B.: Detecting Short Passages of Similar Text in Large Document Collections. In: Proceedings of Conference on Empirical Methods in Natural Language Processing, pp. 118\u2013125 (2001)"},{"issue":"3","key":"1_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1002\/asi.10170","volume":"54","author":"T.C. Hoad","year":"2003","unstructured":"Hoad, T.C., Zobel, J.: Methods for Identifying Versioned and Plagiarised Documents. Journal of the American Society for Information Science and Technology\u00a054(3), 203\u2013215 (2003)","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-46043-8_4","volume-title":"Computational Science - ICCS 2002","author":"K. Monostori","year":"2002","unstructured":"Monostori, K., Finkel, R., Zaslavsky, A., Hod\u00e1sz, G., Pataki, M.: Comparison of Overlap Detection Techniques. In: Sloot, P.M.A., Tan, C.J.K., Dongarra, J., Hoekstra, A.G. (eds.) ICCS 2002, Part I. LNCS, vol.\u00a02329, pp. 51\u201360. Springer, Heidelberg (2002)"},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-540-30213-1_6","volume-title":"String Processing and Information Retrieval","author":"Y. Bernstein","year":"2004","unstructured":"Bernstein, Y., Zobel, J.: A Scalable System for Identifying Co-derivative Documents. In: Apostolico, A., Melucci, M. (eds.) SPIRE 2004. LNCS, vol.\u00a03246, pp. 55\u201367. Springer, Heidelberg (2004)"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"Forman, G., Eshghi, K., Chiocchetti, S.: Finding Similar Files in Large Document Repositories. In: KDD 2005: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, New York, NY, USA, pp. 394\u2013400 (2005)","DOI":"10.1145\/1081870.1081916"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Muthitacharoen, A., Chen, B., Mazieres, D.: A Low-Bandwidth Network File System. In: Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP 2001), Banff, Canada, pp. 174\u2013187 (2001)","DOI":"10.1145\/502059.502052"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Ponzetto, S.P., Strube, M.: Semantic Role Labeling for Coreference Resolution. In: Companion Volume to the Proceedings of the 11th Conference of the European Chapter of the Association for Computational Linguistics, Trento, Italy, April 3-7, pp. 143\u2013146 (2006)","DOI":"10.3115\/1608974.1608993"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Ponzetto, S.P., Strube, M.: Exploiting Semantic Role Labeling, WordNet and Wikipedia for Coreference Resolution. In: Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics, New York, N.Y., June 4-9, pp. 192\u2013199 (2006)","DOI":"10.3115\/1220835.1220860"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence: Methodology, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33185-5_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T11:21:12Z","timestamp":1744024872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33185-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642331848","9783642331855"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33185-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}