{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:05:23Z","timestamp":1771470323654,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2021YFC3001304"],"award-info":[{"award-number":["2021YFC3001304"]}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4192036"],"award-info":[{"award-number":["4192036"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10270-024-01173-1","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T01:01:46Z","timestamp":1714352506000},"page":"1011-1034","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Accelerating similarity-based model matching using dual hashing"],"prefix":"10.1007","volume":"24","author":[{"given":"Xiao","family":"He","sequence":"first","affiliation":[]},{"given":"Yi","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Huihong","family":"He","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,29]]},"reference":[{"key":"1173_CR1","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-319-70010-6_25","volume-title":"Advances in Visual Informatics","author":"A Adamu","year":"2017","unstructured":"Adamu, A., Zainon, W.M.N.W.: Similarity assessment of UML sequence diagrams using dynamic programming. In: Badioze Zaman, H., Robinson, P., Smeaton, A.F., et al. (eds.) Advances in Visual Informatics, pp. 270\u2013278. Springer, Cham (2017)"},{"key":"1173_CR2","unstructured":"Addazi, L., Cicchetti. A., Rocco, J., et\u00a0al.: Semantic-based model matching with emfcompare. In: 10th International Workshop on Models and Evolution (2016) arXiv: 1712.07996"},{"key":"1173_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/2579991","author":"B Bislimovska","year":"2014","unstructured":"Bislimovska, B., Bozzon, A., Brambilla, M., et al.: Textual and content-based search in repositories of web application models. ACM Trans. Web (2014). https:\/\/doi.org\/10.1145\/2579991","journal-title":"ACM Trans. Web"},{"key":"1173_CR4","doi-asserted-by":"publisher","unstructured":"Bogdanov, K., Walkinshaw, N.: Computing the structural difference between state-based models. In: 2009 16th Working Conference on Reverse Engineering, pp. 177\u2013186 (2009) https:\/\/doi.org\/10.1109\/WCRE.2009.17","DOI":"10.1109\/WCRE.2009.17"},{"key":"1173_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-642-39891-9_11","volume-title":"Digital Forensics and Cyber Crime","author":"F Breitinger","year":"2013","unstructured":"Breitinger, F., Baier, H.: Similarity preserving hashing: eligible properties and a new algorithm MRSH-V2. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) Digital Forensics and Cyber Crime, pp. 167\u2013182. Springer, Berlin (2013)"},{"key":"1173_CR6","unstructured":"Broder, A.Z.: On the resemblance and containment of documents. In: Proceedings of the International Conference on Compression and Complexity of Sequences, Positano, Italy, pp. 21 \u2013 29 (1997)"},{"issue":"8","key":"1173_CR7","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/S0169-7552(97)00031-7","volume":"29","author":"AZ Broder","year":"1997","unstructured":"Broder, A.Z., Glassman, S.C., Manasse, M.S., et al.: Syntactic clustering of the web. Comput. Netw. ISDN Syst. 29(8), 1157\u20131166 (1997). https:\/\/doi.org\/10.1016\/S0169-7552(97)00031-7","journal-title":"Comput. Netw. ISDN Syst."},{"key":"1173_CR8","first-page":"29","volume":"9","author":"C Brun","year":"2008","unstructured":"Brun, C., Pierantonio, A.: Model differences in the eclipse modelling framework. UPGRADE Eur. J. Inform. Prof. 9, 29\u201334 (2008)","journal-title":"UPGRADE Eur. J. Inform. Prof."},{"key":"1173_CR9","doi-asserted-by":"publisher","DOI":"10.1145\/3047307","author":"L Chi","year":"2017","unstructured":"Chi, L., Zhu, X.: Hashing techniques: a survey and taxonomy. ACM Comput. Surv. (2017). https:\/\/doi.org\/10.1145\/3047307","journal-title":"ACM Comput. Surv."},{"key":"1173_CR10","doi-asserted-by":"publisher","unstructured":"Dasgupta, A., Kumar, R., Sarlos, T.: Fast locality-sensitive hashing. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, New York, NY, USA, KDD\u201911, pp. 1073\u20131081 (2011) https:\/\/doi.org\/10.1145\/2020408.2020578","DOI":"10.1145\/2020408.2020578"},{"key":"1173_CR11","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-540-85758-7_20","volume-title":"Business Process Management","author":"R Dijkman","year":"2008","unstructured":"Dijkman, R.: Diagnosing differences between business process models. In: Dumas, M., Reichert, M., Shan, M.C. (eds.) Business Process Management, pp. 261\u2013277. Springer, Berlin (2008)"},{"issue":"7","key":"1173_CR12","doi-asserted-by":"publisher","first-page":"1729","DOI":"10.1109\/TPAMI.2019.2902391_rfseq1","volume":"42","author":"S Eghbali","year":"2020","unstructured":"Eghbali, S., Ashtiani, H., Tahvildari, L.: Online nearest neighbor search using hamming weight trees. IEEE Trans. Pattern Anal. Mach. Intell. 42(7), 1729\u20131740 (2020). https:\/\/doi.org\/10.1109\/TPAMI.2019.2902391_rfseq1","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"1173_CR13","doi-asserted-by":"publisher","unstructured":"Ertl, O.: BagMinHash\u2014minwise hashing algorithm for weighted sets. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, New York, NY, USA, KDD\u201918, pp. 1368\u20131377 (2018) https:\/\/doi.org\/10.1145\/3219819.3220089","DOI":"10.1145\/3219819.3220089"},{"issue":"3","key":"1173_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1145\/355744.355745","volume":"3","author":"JH Friedman","year":"1977","unstructured":"Friedman, J.H., Bentley, J.L., Finkel, R.A.: An algorithm for finding best matches in logarithmic expected time. ACM Trans. Math. Softw. 3(3), 209\u2013226 (1977). https:\/\/doi.org\/10.1145\/355744.355745","journal-title":"ACM Trans. Math. Softw."},{"key":"1173_CR15","unstructured":"Google Code Archive. Word2vec: tool for computing continuous distributed representations of words (2013). https:\/\/code.google.com\/archive\/p\/word2vec\/"},{"key":"1173_CR16","doi-asserted-by":"publisher","unstructured":"He, X.: Dual MoHash: an EMF model matching tool based on dual hashing. https:\/\/doi.org\/10.5281\/zenodo.10373685, (2023), the replication package of the tool and the experiment. Please refer to https:\/\/bitbucket.org\/ustbmde\/mohash\/wiki\/Home for the project website","DOI":"10.5281\/zenodo.10373685"},{"key":"1173_CR17","doi-asserted-by":"publisher","unstructured":"He, X., Tang, L., Li, Y.: Accelerating similarity-based model matching using on-the-fly similarity preserving hashing. In: Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems. Association for Computing Machinery, New York, NY, USA, MODELS\u201922, pp. 244\u2013254 (2022) https:\/\/doi.org\/10.1145\/3550355.3552406,","DOI":"10.1145\/3550355.3552406"},{"key":"1173_CR18","doi-asserted-by":"publisher","unstructured":"Indyk, P., Motwani, R., Raghavan, P., et\u00a0al.: Locality-preserving hashing in multidimensional spaces. In: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing. Association for Computing Machinery, New York, NY, USA, STOC\u201997, pp. 618\u2013625 (1997) https:\/\/doi.org\/10.1145\/258533.258656,","DOI":"10.1145\/258533.258656"},{"key":"1173_CR19","unstructured":"Kelter, U., Wehren, J., Niere, J.: A generic difference algorithm for UML models. In: Software Engineering, pp 105\u2013116 (2005)"},{"key":"1173_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2014.06.040","volume":"97","author":"M Kessentini","year":"2014","unstructured":"Kessentini, M., Ouni, A., Langer, P., et al.: Search-based metamodel matching with structural and syntactic measures. J. Syst. Softw. 97, 1\u201314 (2014)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"1173_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2430545.2430547","volume":"22","author":"M La Rosa","year":"2013","unstructured":"La Rosa, M., Dumas, M., Uba, R., et al.: Business process model merging: an approach to business process consolidation. ACM Trans. Softw. Eng. Methodol. 22(2), 1 (2013). https:\/\/doi.org\/10.1145\/2430545.2430547","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"4","key":"1173_CR22","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1057\/palgrave.ejis.3000685","volume":"16","author":"Y Lin","year":"2007","unstructured":"Lin, Y., Gray, J., Louault, F.: DSMDiff: a differentiation tool for domain-specific models. Eur. J. Inf. Syst. 16(4), 349\u2013361 (2007)","journal-title":"Eur. J. Inf. Syst."},{"key":"1173_CR23","doi-asserted-by":"publisher","unstructured":"Lopez, JAH., Cuadrado, J.S.: Mar: a structure-based search engine for models. In: Proceedings\u201423rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems, MODELS 2020, Virtual, Online, Canada, pp. 57\u201367 (2020) https:\/\/doi.org\/10.1145\/3365438.3410947","DOI":"10.1145\/3365438.3410947"},{"key":"1173_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00929-3","author":"JAH Lopez","year":"2021","unstructured":"Lopez, J.A.H., CanovasIzquierdo, J.L., Cuadrado, J.S.: ModelSet: a dataset for machine learning in model-driven engineering. Softw. Syst. Model. (2021). https:\/\/doi.org\/10.1007\/s10270-021-00929-3","journal-title":"Softw. Syst. Model."},{"issue":"3","key":"1173_CR25","doi-asserted-by":"publisher","first-page":"753","DOI":"10.1007\/s10270-016-0552-y","volume":"17","author":"S Maoz","year":"2018","unstructured":"Maoz, S., Ringert, J.O.: A framework for relating syntactic and semantic model differences. Softw. Syst. Model. 17(3), 753\u2013777 (2018)","journal-title":"Softw. Syst. Model."},{"key":"1173_CR26","doi-asserted-by":"publisher","first-page":"29715","DOI":"10.1109\/ACCESS.2018.2841020","volume":"6","author":"S Mart\u00ednez","year":"2018","unstructured":"Mart\u00ednez, S., G\u00e9rard, S., Cabot, J.: On watermarking for collaborative model-driven engineering. IEEE Access 6, 29715\u201329728 (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2841020","journal-title":"IEEE Access"},{"issue":"1","key":"1173_CR27","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10270-021-00915-9","volume":"21","author":"S Mart\u00ednez","year":"2022","unstructured":"Mart\u00ednez, S., G\u00e9rard, S., Cabot, J.: Efficient model similarity estimation with robust hashing. Softw. Syst. Model. 21(1), 337\u2013361 (2022). https:\/\/doi.org\/10.1007\/s10270-021-00915-9","journal-title":"Softw. Syst. Model."},{"key":"1173_CR28","doi-asserted-by":"publisher","unstructured":"Melnik, S., Rahm, E., Bernstein, P.A.: Rondo: A programming platform for generic model management. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data. Association for Computing Machinery, New York, NY, USA, SIGMOD\u201903, pp. 193\u2013204 (2003) https:\/\/doi.org\/10.1145\/872757.872782","DOI":"10.1145\/872757.872782"},{"issue":"6","key":"1173_CR29","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1109\/TSE.2011.112","volume":"38","author":"S Nejati","year":"2012","unstructured":"Nejati, S., Sabetzadeh, M., Chechik, M., et al.: Matching and merging of variant feature specifications. IEEE Trans. Softw. Eng. 38(6), 1355\u20131375 (2012). https:\/\/doi.org\/10.1109\/TSE.2011.112","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1173_CR30","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: EMNLP 2014\u20132014 Conference on Empirical Methods in Natural Language Processing, Proceedings of the Conference, Doha, Qatar, pp. 1532 \u2013 1543 (2014) https:\/\/doi.org\/10.3115\/v1\/d14-1162","DOI":"10.3115\/v1\/d14-1162"},{"issue":"4","key":"1173_CR31","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/40.7773","volume":"8","author":"TV Ramabadran","year":"1988","unstructured":"Ramabadran, T.V., Gaitonde, S.S.: A tutorial on CRC computations. IEEE Micro 8(4), 62\u201375 (1988). https:\/\/doi.org\/10.1109\/40.7773","journal-title":"IEEE Micro"},{"key":"1173_CR32","doi-asserted-by":"publisher","unstructured":"Rensink, A.: Isomorphism checking in groove. In: Z\u00fcndorf, A., Varr\u00f3, D. (eds.) Graph-Based Tools (GraBaTs). European Association of Software Science and Technology, no. LNCS4549 in Electronic Communications of the EASST (2007) https:\/\/doi.org\/10.14279\/tuj.eceasst.1.77","DOI":"10.14279\/tuj.eceasst.1.77"},{"key":"1173_CR33","doi-asserted-by":"crossref","unstructured":"Rivest, R.: Rfc1321: The md5 message-digest algorithm (1992)","DOI":"10.17487\/rfc1321"},{"key":"1173_CR34","doi-asserted-by":"publisher","unstructured":"Rubin, J., Chechik, M.: N-way model merging. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, ESEC\/FSE 2013, pp. 301\u2013311 (2013) https:\/\/doi.org\/10.1145\/2491411.2491446","DOI":"10.1145\/2491411.2491446"},{"key":"1173_CR35","unstructured":"Sadowski, C., Levin, G.: Simhash: hash-based similarity detection. Technical report, Google Inc. (2007) www.googlecode.com\/sun\/trunk\/paper\/SimHashwithBib.pdf"},{"key":"1173_CR36","doi-asserted-by":"publisher","DOI":"10.1145\/3092694","author":"A Schoknecht","year":"2017","unstructured":"Schoknecht, A., Thaler, T., Fettke, P., et al.: Similarity of business process models-a state-of-the-art analysis. ACM Comput. Surv. (2017). https:\/\/doi.org\/10.1145\/3092694","journal-title":"ACM Comput. Surv."},{"key":"1173_CR37","doi-asserted-by":"publisher","unstructured":"Schulthei\u00df, A., Bittner, P.M., Grunske, L., et\u00a0al.: Scalable n-way model matching using multi-dimensional search trees. In: 2021 ACM\/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS), pp. 1\u201312 (2021) https:\/\/doi.org\/10.1109\/MODELS50736.2021.00010","DOI":"10.1109\/MODELS50736.2021.00010"},{"issue":"3","key":"1173_CR38","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1007\/s10270-019-00760-x","volume":"19","author":"FA Somogyi","year":"2020","unstructured":"Somogyi, F.A., Asztalos, M.: Systematic review of matching techniques used in model-driven methodologies. Softw. Syst. Model. 19(3), 693\u2013720 (2020). https:\/\/doi.org\/10.1007\/s10270-019-00760-x","journal-title":"Softw. Syst. Model."},{"key":"1173_CR39","unstructured":"Standards NI, Technology, Secure hash standard (shs) fips 180-2 (2004)"},{"issue":"1","key":"1173_CR40","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10270-012-0248-x","volume":"13","author":"G Taentzer","year":"2014","unstructured":"Taentzer, G., Ermel, C., Langer, P., et al.: A fundamental approach to model versioning based on graph modifications: from theory to implementation. Softw. Syst. Model. 13(1), 239\u2013272 (2014)","journal-title":"Softw. Syst. Model."},{"key":"1173_CR41","doi-asserted-by":"publisher","unstructured":"Treude, C., Berlik, S., Wenzel, S., et\u00a0al.: Difference computation of large models. In: Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, ESEC-FSE\u201907, pp. 295\u2013304 (2007) https:\/\/doi.org\/10.1145\/1287624.1287665","DOI":"10.1145\/1287624.1287665"},{"issue":"10","key":"1173_CR42","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1109\/TSE.2005.106","volume":"31","author":"Z Xing","year":"2005","unstructured":"Xing, Z., Stroulia, E.: Analyzing the evolutionary history of the logical design of object-oriented software. IEEE Trans. Softw. Eng. 31(10), 850\u2013868 (2005). https:\/\/doi.org\/10.1109\/TSE.2005.106","journal-title":"IEEE Trans. Softw. Eng."},{"key":"1173_CR43","doi-asserted-by":"publisher","unstructured":"Zhang, L., Zhang, Y., Tang, J., et\u00a0al.: Topology preserving hashing for similarity search. In: Proceedings of the 21st ACM International Conference on Multimedia. Association for Computing Machinery, New York, NY, USA, MM\u201913, pp. 123\u2013132, (2013). https:\/\/doi.org\/10.1145\/2502081.2502091","DOI":"10.1145\/2502081.2502091"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01173-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-024-01173-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-024-01173-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T19:08:06Z","timestamp":1757099286000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-024-01173-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":43,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1173"],"URL":"https:\/\/doi.org\/10.1007\/s10270-024-01173-1","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,29]]},"assertion":[{"value":"18 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}