{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T21:54:50Z","timestamp":1649022890796},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2005,4,6]],"date-time":"2005-04-06T00:00:00Z","timestamp":1112745600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2006,1]]},"DOI":"10.1007\/s00500-005-0463-2","type":"journal-article","created":{"date-parts":[[2005,4,5]],"date-time":"2005-04-05T11:16:02Z","timestamp":1112699762000},"page":"41-46","source":"Crossref","is-referenced-by-count":9,"title":["A fast document copy detection model"],"prefix":"10.1007","volume":"10","author":[{"given":"Jun-Peng","family":"Bao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jun-Yi","family":"Shen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hai-Yan","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Dong","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,4,6]]},"reference":[{"key":"463_CR1","doi-asserted-by":"crossref","unstructured":"Brin S et al (1995) Copy detection mechanisms for digital documents. In: Proceedings of the ACM SIGMOD annual conference, San Francisco","DOI":"10.1145\/223784.223855"},{"key":"463_CR2","doi-asserted-by":"crossref","unstructured":"Broder AZ et al (1997) Syntactic clustering of the Web. In: Proceedings of the 6th international Web Conference, Santa Clara","DOI":"10.1016\/S0169-7552(97)00031-7"},{"key":"463_CR3","doi-asserted-by":"crossref","unstructured":"Denning PJ (1995) Editorial: plagiarism in the web. Commun ACM, 38(12)","DOI":"10.1145\/219663.219675"},{"key":"463_CR4","doi-asserted-by":"crossref","unstructured":"Garcia-Molina H et al (1996) dSCAM: finding document copies across multiple databases. In: Proceedings of 4th International conference on parallel and distributed systems, Miami Beach","DOI":"10.1109\/PDIS.1996.568668"},{"key":"463_CR5","unstructured":"Heintze N (1996) Scalable document fingerprinting. In: Proceedings of the 2nd USENIX workshop on electronic commerce, Oakland"},{"key":"463_CR6","unstructured":"Monostori K et al (2000) MatchDetectReveal: finding overlapping and similar digital documents. In: Proceedings of information resources management association international conference, 21\u201324 May 2000\u00a0at Anchorage Hilton Hotel, Anchorage"},{"key":"463_CR7","unstructured":"Shivakumar N, Garcia-Molina H (1995) SCAM: a copy detection mechanism for digital documents. In: Proceedings of 2nd international conference in theory and practice of digital libraries, Austin"},{"key":"463_CR8","doi-asserted-by":"crossref","unstructured":"Shivakumar N, Garcia-Molina H (1998) Finding near-replicas of documents on the web. In: Proceedings of workshop on Web databases","DOI":"10.1007\/10704656_13"},{"key":"463_CR9","doi-asserted-by":"crossref","unstructured":"Si A (1997) CHECK: a document plagiarism detection system. In: Proceedings of ACM symposium for applied computing, pp 70\u201377","DOI":"10.1145\/331697.335176"},{"issue":"1","key":"463_CR10","first-page":"121","volume":"38","author":"QB Song","year":"2001","unstructured":"Song QB, Shen JY (2001) On illegal coping and distributing detection mechanism for digital goods. J Comput Res Dev 38(1):121\u2013125","journal-title":"J Comput Res Dev"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-005-0463-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-005-0463-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-005-0463-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,6]],"date-time":"2020-04-06T17:46:40Z","timestamp":1586195200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-005-0463-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,4,6]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,1]]}},"alternative-id":["463"],"URL":"https:\/\/doi.org\/10.1007\/s00500-005-0463-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,4,6]]}}}