{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:51:04Z","timestamp":1726213864120},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642408014"},{"type":"electronic","value":"9783642408021"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40802-1_6","type":"book-chapter","created":{"date-parts":[[2013,9,10]],"date-time":"2013-09-10T06:48:30Z","timestamp":1378795710000},"page":"53-58","source":"Crossref","is-referenced-by-count":9,"title":["A New Corpus for the Evaluation of Arabic Intrinsic Plagiarism Detection"],"prefix":"10.1007","author":[{"given":"Imene","family":"Bensalem","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Rosso","sequence":"additional","affiliation":[]},{"given":"Salim","family":"Chikhi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Springer Policy on Publishing Integrity. Guidelines for Journal Editors"},{"key":"6_CR2","unstructured":"Potthast, M., Stein, B., Eiselt, A., Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: Overview of the 1st International Competition on Plagiarism Detection. In: Stein, B., Rosso, P., Stamatatos, E., Koppel, M., Agirre, E. (eds.) SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 1\u20139 (2009)"},{"key":"6_CR3","unstructured":"Potthast, M., Stein, B., Barr\u00f3n-Cede\u00f1o, A., Rosso, P.: An Evaluation Framework for Plagiarism Detection. In: Huang, C.-R., Jurafsky, D. (eds.) Proceedings of the 23rd International Conference on Computational Linguistics (COLING 2010), pp. 997\u20131005. ACL (2010)"},{"key":"6_CR4","unstructured":"Potthast, M., Barr\u00f3n-cede\u00f1o, A., Eiselt, A., Stein, B., Rosso, P.: Overview of the 2nd International Competition on Plagiarism Detection. In: Braschler, M., Harman, D. (eds.) Notebook Papers of CLEF 2010 LABs and Workshops (2010)"},{"key":"6_CR5","unstructured":"Potthast, M., Eiselt, A., Barr\u00f3n-Cede\u00f1o, A., Stein, B., Rosso, P.: Overview of the 3rd International Competition on Plagiarism Detection. In: Petras, V., Forner, P., Clough, P. (eds.) Notebook Papers of CLEF 2011 LABs and Workshops (2011)"},{"key":"6_CR6","unstructured":"Potthast, M., Gollub, T., Hagen, M., Gra\u00dfegger, J., Kiesel, J., Michel, M., Oberl\u00e4nder, A., Tippmann, M., Barr\u00f3n-Cede\u00f1o, A., Gupta, P., Rosso, P., Stein, B.: Overview of the 4th International Competition on Plagiarism Detection. In: Forner, P., Karlgren, J., Womser-Hacker, C. (eds.) CLEF 2012 Evaluation Labs and Workshop \u2013Working Notes Papers (2012)"},{"key":"6_CR7","unstructured":"Juola, P.: An Overview of the Traditional Authorship Attribution Subtask Notebook for PAN at CLEF 2012. In: Forner, P., Karlgren, J., and Womser-Hacker, C. (eds.) CLEF 2012 Evaluation Labs and Workshop \u2013Working Notes Papers (2012)"},{"key":"6_CR8","unstructured":"Yakout, M.M.: Examples of Plagiarism in Scientific and Cultural Communities (in Arabic), \n                    \n                      http:\/\/www.yaqout.net\/ba7s_4.html"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/11427995_15","volume-title":"Intelligence and Security Informatics","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying Authorship Analysis to Arabic Web Content. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI 2005. LNCS, vol.\u00a03495, pp. 183\u2013197. Springer, Heidelberg (2005)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Shaker, K., Corne, D.: Authorship Attribution in Arabic using a hybrid of evolutionary search and linear discriminant analysis. In: 2010 UK Workshop on Computational Intelligence (UKCI), pp. 1\u20136. IEEE (2010)","DOI":"10.1109\/UKCI.2010.5625580"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Ouamour, S., Sayoud, H.: Authorship attribution of ancient texts written by ten arabic travelers using a SMO-SVM classifier. In: 2012 International Conference on Communications and Information Technology (ICCIT), pp. 44\u201347. IEEE (2012)","DOI":"10.1109\/ICCITechnol.2012.6285841"},{"key":"6_CR12","unstructured":"Bensalem, I., Rosso, P., Chikhi, S.: Intrinsic Plagiarism Detection in Arabic Text: Preliminary Experiments. In: Berlanga, R., Rosso, P. (eds.) 2nd Spanish Conference on Information Retrieval (CERI 2012), Valencia (2012)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-30428-6_12","volume-title":"Intelligence and Security Informatics","author":"A. Jadalla","year":"2012","unstructured":"Jadalla, A., Elnagar, A.: A Plagiarism Detection System for Arabic Text-Based Documents. In: Chau, M., Wang, G.A., Yue, W.T., Chen, H. (eds.) PAISI 2012. LNCS, vol.\u00a07299, pp. 145\u2013153. Springer, Heidelberg (2012)"},{"key":"6_CR14","unstructured":"Alzahrani, S., Salim, N.: Statement-Based Fuzzy-Set Information Retrieval versus Fingerprints Matching for Plagiarism Detection in Arabic Documents. In: 5th Postgraduate Annual Research Seminar (PARS 2009), Johor Bahru, Malaysia, pp. 267\u2013268 (2009)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.5815\/ijitcs.2012.10.10","volume":"10","author":"M.E.B. Menai","year":"2012","unstructured":"Menai, M.E.B.: Detection of Plagiarism in Arabic Documents. International Journal of Information Technology and Computer Science\u00a010, 80\u201389 (2012)","journal-title":"International Journal of Information Technology and Computer Science"},{"key":"6_CR16","first-page":"1","volume":"4","author":"M. Jaoua","year":"2011","unstructured":"Jaoua, M., Jaoua, F.K., Hadrich Belguith, L., Ben Hamadou, A.: Automatic Detection of Plagiarism in Arabic Documents Based on Lexical Chains. Arab Computer Society Journal\u00a04, 1\u201311 (2011) (in Arabic)","journal-title":"Arab Computer Society Journal"},{"key":"6_CR17","unstructured":"Potthast, M., Hagen, M., V\u00f6lske, M., Stein, B.: Crowdsourcing Interaction Logs to Understand Text Reuse from the Web. In: 51st Annual Meeting of the Association of Computational Linguistics (ACL 2013). ACM (to appear, 2013)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s10579-010-9115-y","volume":"45","author":"B. Stein","year":"2010","unstructured":"Stein, B., Lipka, N., Prettenhofer, P.: Intrinsic plagiarism analysis. Language Resources and Evaluation\u00a045, 63\u201382 (2010)","journal-title":"Language Resources and Evaluation"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Bensalem, I., Rosso, P., Chikhi, S.: Building Arabic Corpora from Wikisource. In: 10th ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA 2013). IEEE (2013)","DOI":"10.1109\/AICCSA.2013.6616474"}],"container-title":["Lecture Notes in Computer Science","Information Access Evaluation. Multilinguality, Multimodality, and Visualization"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40802-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T04:39:56Z","timestamp":1558067996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40802-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642408014","9783642408021"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40802-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}