{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:37:12Z","timestamp":1772120232657,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T00:00:00Z","timestamp":1263945600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Lang Resources &amp; Evaluation"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1007\/s10579-010-9115-y","type":"journal-article","created":{"date-parts":[[2010,1,19]],"date-time":"2010-01-19T17:44:24Z","timestamp":1263923064000},"page":"63-82","source":"Crossref","is-referenced-by-count":85,"title":["Intrinsic plagiarism analysis"],"prefix":"10.1007","volume":"45","author":[{"given":"Benno","family":"Stein","sequence":"first","affiliation":[]},{"given":"Nedim","family":"Lipka","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Prettenhofer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,20]]},"reference":[{"key":"9115_CR1","doi-asserted-by":"crossref","unstructured":"Argamon, S., \u0160ari\u0107, M., & Stein, S. S. (2003). Style mining of electronic messages for multiple authorship discrimination: First results. In KDD \u201903: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 475\u2013480). New York, NY, USA: ACM. ISBN 1-58113-737-0. doi: 10.1145\/956750.956805 .","DOI":"10.1145\/956750.956805"},{"key":"9115_CR2","unstructured":"Bernstein, Y., & Zobel, J. (2004). A scalable system for identifying co-derivative documents. In A. Apostolico & M. Melucci (Eds.), Proceedings of the string processing and information retrieval symposium (SPIRE) (pp. 55\u201367). Padova, Italy: Springer. Published as LNCS 3246."},{"key":"9115_CR3","unstructured":"Brin, S., Davis, J., & Garcia-Molina, H. (1995). Copy detection mechanisms for digital documents. In SIGMOD \u201995 (pp. 398\u2013409). New York, NY, USA: ACM Press. ISBN 0-89791-731-6."},{"key":"9115_CR4","doi-asserted-by":"crossref","unstructured":"Broder, A. Z., Eiron, N., Fontoura, M., Herscovici, M., Lempel, R., McPherson, J., et al. (2006). Indexing shared content in information retrieval systems. In EDBT \u201906 (pp. 313\u2013330).","DOI":"10.1007\/11687238_21"},{"key":"9115_CR5","volume-title":"Readability revisited: The new Dale-Chall readability formula","author":"J. S. Chall","year":"1995","unstructured":"Chall, J. S., & Dale, E. (1995). Readability revisited: The new Dale\u2013Chall readability formula. Cambridge, MA: Brookline Books."},{"issue":"1","key":"9115_CR6","first-page":"1","volume":"4","author":"C. E. Chaski","year":"2005","unstructured":"Chaski, C. E. (2005). Who\u2019s at the keyboard? authorship attribution in digital evidence investigations. IJDE, 4(1), 1\u201314.","journal-title":"IJDE"},{"key":"9115_CR7","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"Nitesh V. Chawla","year":"2002","unstructured":"Chawla, N. V., Bowyer, K. W., Kegelmeyer, P. W. (2002). Smote: Synthetic minority over-sampling technique. Journal of Artificial Intelligence Research 16, 321\u2013357.","journal-title":"Journal of Artificial Intelligence Research"},{"key":"9115_CR8","unstructured":"Choi, F. Y. Y. (2000). Advances in domain independent linear text segmentation. In Proceedings of the first conference on North American chapter of the association for computational linguistics (pp. 26\u201333). San Francisco, CA, USA: Morgan Kaufmann Publishers Inc."},{"key":"9115_CR9","first-page":"11","volume":"27","author":"E. Dale","year":"1948","unstructured":"Dale, E., & Chall, J. S. (1948). A formula for predicting readability. Educational Research Bulletin, 27, 11\u201320.","journal-title":"Educational Research Bulletin"},{"key":"9115_CR10","unstructured":"Finkel, R. A., Zaslavsky, A., Monostori, K., & Schmidt, H. (2002). Signature extraction for overlap detection in documents. In Proceedings of the 25th Australian conference on Computer science (pp. 59\u201364). Australian Computer Society, Inc. ISBN 0-909925-82-8."},{"key":"9115_CR11","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1037\/h0057532","volume":"32","author":"R. Flesch","year":"1948","unstructured":"Flesch, R. (1948). A new readability yardstick. Journal of Applied Psychology, 32, 221\u2013233.","journal-title":"Journal of Applied Psychology"},{"key":"9115_CR12","unstructured":"Gionis, A., Indyk, P., & Motwani, R. (1999). Similarity search in high dimensions via hashing. In Proceedings of the 25th VLDB conference Edinburgh, Scotland (pp. 518\u2013529)."},{"key":"9115_CR13","doi-asserted-by":"crossref","unstructured":"Graham, N., Hirst, G., & Marthi, B. (2005). Segmenting a document by stylistic character. Natural Language Engineering, 11(4), 397\u2013415. Supersedes August 2003 workshop version.","DOI":"10.1017\/S1351324905003694"},{"key":"9115_CR14","volume-title":"The technique of clear writing","author":"R. Gunning","year":"1952","unstructured":"Gunning, R. (1952). The technique of clear writing. New York: McGraw-Hill."},{"key":"9115_CR15","doi-asserted-by":"crossref","unstructured":"Henzinger, M. (2006). Finding near-duplicate web pages: A large-scale evaluation of algorithms. In SIGIR \u201906: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval (pp. 284\u2013291). New York, NY, USA: ACM Press. ISBN 1-59593-369-7. doi: 10.1145\/1148170.1148222 .","DOI":"10.1145\/1148170.1148222"},{"issue":"2","key":"9115_CR16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1093\/llc\/8.2.73","volume":"6","author":"M. L. Hilton","year":"1993","unstructured":"Hilton, M. L., & Holmes, D. I. (1993). An assessment of cumulative sum charts for authorship attribution. Literary and Linguistic Computing, 8(2), 73\u201380.","journal-title":"Literary and Linguistic Computing"},{"key":"9115_CR17","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1126\/science.1127647","volume":"313","author":"G. E. Hinton","year":"2006","unstructured":"Hinton, G. E., & Salakhutdinov, R. R. (2006). Reducing the dimensionality of data with neural networks. Science, 313, 504\u2013507.","journal-title":"Science"},{"issue":"3","key":"9115_CR18","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1002\/asi.10170","volume":"54","author":"Timothy C. Hoad","year":"2003","unstructured":"Hoad, T. C., & Zobel, J. (2003). Methods for identifying versioned and plagiarised documents. American Society for Information Science and Technology, 54(3), 203\u2013215.","journal-title":"American Society for Information Science and Technology"},{"key":"9115_CR19","doi-asserted-by":"crossref","unstructured":"Holmes, D. I. (1998). The evolution of stylometry in humanities scholarship. Literary and Linguistic, 13(3), 111\u2013117. doi: 10.1093\/llc\/13.3.111 .","DOI":"10.1093\/llc\/13.3.111"},{"issue":"2","key":"9115_CR20","first-page":"172","volume":"7","author":"A. Honore","year":"1979","unstructured":"Honore, A. (1979). Some simple measures of richness of vocabulary. Association for Literary and Linguistic Computing Bulletin, 7(2), 172\u2013177.","journal-title":"Association for Literary and Linguistic Computing Bulletin"},{"key":"9115_CR21","unstructured":"Indyk, P., & Motwani, R. (1998). Approximate nearest neighbor\u2014Towards removing the curse of dimensionality. In Proceedings of the 30th symposium on theory of computing (pp. 604\u2013613)."},{"key":"9115_CR22","doi-asserted-by":"crossref","unstructured":"Juola, P. (2006). Authorship attribution. Foundation Trends Information Retrieval 1(3), 233\u2013334, ISSN 1554-0669. doi: 10.1561\/1500000005 .","DOI":"10.1561\/1500000005"},{"key":"9115_CR23","unstructured":"Kacmarcik, G., & Gamon, M. (2006). Obfuscating document stylometry to preserve author anonymity. In Proceedings of the COLING\/ACL on main conference poster sessions (pp. 444\u2013451). Morristown, NJ, USA: Association for Computational Linguistics."},{"key":"9115_CR24","doi-asserted-by":"crossref","unstructured":"Kincaid, J., Fishburne, R. P., Rogers, R. L., & Chissom, B. S. (1975). Derivation of new readability formulas (automated readability index, fog count and flesch reading ease formula) for navy enlisted personnel. Research branch report 8\u201375. Millington TN: Naval Technical Training US Naval Air Station.","DOI":"10.21236\/ADA006655"},{"key":"9115_CR25","doi-asserted-by":"crossref","unstructured":"Kjell, B., Woods Addison, W., & Frieder, O. (1994). Discrimination of authorship using visualization. Information Processing and Management, 30(1), 141\u2013150. ISSN 0306-4573. doi: 10.1016\/0306-4573(94)90029-9 .","DOI":"10.1016\/0306-4573(94)90029-9"},{"key":"9115_CR26","unstructured":"Kleinberg, J. (1997). Two algorithms for nearest-neighbor search in high dimensions. In STOC \u201997: Proceedings of the twenty-ninth annual ACM symposium on theory of computing."},{"key":"9115_CR27","unstructured":"Koppel, M., & Schler, J. (2003). Exploiting stylistic idiosyncrasies for authorship attribution. In Proceedings of IJCAI\u201903 workshop on computational approaches to style analysis and synthesis. Mexico: Acapulco."},{"key":"9115_CR28","doi-asserted-by":"crossref","unstructured":"Koppel, M., & Schler, J. (2004a). Authorship verification as a one-class classification problem. In ICML \u201904: Proceedings of the twenty-first international conference on Machine learning (pp. 62). New York, NY, USA: ACM. ISBN 1-58113-828-5. doi: 10.1145\/1015330.1015448 .","DOI":"10.1145\/1015330.1015448"},{"key":"9115_CR29","doi-asserted-by":"crossref","unstructured":"Koppel, M., & Schler, J. (2004b). Authorship verification as a one-class classification problem. In Proceedings of the 21st international conference on machine learning. Banff, Canada: ACM Press.","DOI":"10.1145\/1015330.1015448"},{"key":"9115_CR30","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J., Argamon, S., & Messeri, E. (2006). Authorship attribution with thousands of candidate authors. In Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval (pp. 659\u2013660). New York, NY, USA: ACM. ISBN 1-59593-369-7. doi: 10.1145\/1148170.1148304 .","DOI":"10.1145\/1148170.1148304"},{"key":"9115_CR31","unstructured":"Koppel, M., Schler, J., & Bonchek-Dokow, E. (2007). Measuring differentiability: Unmasking pseudonymous authors. Journal of Machine Learning Research, 8, 1261\u20131276. ISSN 1533-7928."},{"issue":"1","key":"9115_CR32","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"Moshe Koppel","year":"2009","unstructured":"Koppel, M., Schler, J., & Argamon, S. (2009). Computational methods in authorship attribution. Journal of the American Society for Information Science and Technology, 60(1), 9\u201326.","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"9115_CR33","doi-asserted-by":"crossref","unstructured":"Malyutov, M. B. (2006). Authorship attribution of texts: A review. Lecture Notes in Computer Science, 2063, 362\u2013380.","DOI":"10.1007\/11889342_20"},{"key":"9115_CR34","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1162\/15324430260185574","volume":"2","author":"LarryM. Manevitz","year":"2001","unstructured":"Manevitz, L. M., & Yousef, M. (2001). One-class SVMs for document classification. Journal of Machine Learning Research, 2, 139\u2013154.","journal-title":"Journal of Machine Learning Research"},{"key":"9115_CR35","unstructured":"Mansfield, J. S. (2004). Textbook plagiarism in psy101 general psychology: incidence and prevention. In Proceedings of the 18th annual conference on undergraduate teaching of psychology: Ideas and innovations. New York, USA: SUNY Farmingdale."},{"key":"9115_CR36","unstructured":"Meyer zu Eissen, S., & Stein, B. (2004). Genre classification of web pages: User study and feasibility analysis. In S. Biundo, T. Fr\u00fchwirth, & G. Palm (Eds.), KI 2004: Advances in artificial intelligence, vol. 3228 LNAI of Lecture Notes in artificial intelligence (pp. 256\u2013269). Berlin Heidelberg New York: Springer. ISBN 0302-9743."},{"key":"9115_CR37","unstructured":"Meyer zu Eissen, S., & Stein, B. (2006). Intrinsic plagiarism detection. In M. Lalmas, A. MacFarlane, S. M. R\u00fcger, A. Tombros, T. Tsikrika, & A. Yavlinsky (Eds.), Proceedings of the European conference on information retrieval (ECIR 2006), vol. 3936 of Lecture Notes in Computer Science (pp. 565\u2013569). New York: Springer. ISBN 3-540-33347-9."},{"key":"9115_CR38","unstructured":"Meyer zu Eissen, S., Stein, B., & Kulig, M. (2007). Plagiarism detection without reference collections. In R. Decker & H. J. Lenz (Eds.), Advances in data analysis (pp. 359\u2013366). New York: Springer. ISBN 978-3-540-70980-0."},{"key":"9115_CR39","unstructured":"Morton, A. Q., & Michaelson, S. (1990). The qsum plot. Technical report, University of Edinburgh."},{"key":"9115_CR40","unstructured":"Mosteller, F., & Wallace, D. L. (1964). Inference and disputed authorship: Federalist papers. Reading, MA: Addison-Wesley Educational Publishers Inc, 1964. ISBN 0201048655."},{"issue":"18","key":"9115_CR41","first-page":"2967","volume":"14","author":"Daniel Pavelec","year":"2008","unstructured":"Pavelec, D., Oliveira, L. S., Justino, E. J. R., & Batista, L. V. (2008). Using conjunctions and adverbs for author verification. Journal of UCS, 14(18), 2967\u20132981.","journal-title":"J. UCS"},{"key":"9115_CR42","unstructured":"Potthast, M., Eiselt, A., Stein, B., Barr\u00f2n Cede\u00f1o, A., & Rosso, P. (Eds.). (2009). Webis at Bauhaus-Universit\u00e4t Weimar and NLEL at Universidad Polyt\u00e9cnica de Valencia. PAN Plagiarism Corpus 2009 (PAN-PC-09). http:\/\/www.webis.de\/research\/corpora ."},{"key":"9115_CR43","doi-asserted-by":"crossref","unstructured":"R\u00e4tsch, G., Mika, S., Sch\u00f6lkopf, B., & M\u00fcller, K.-R. (2002). Constructing boosting algorithms from SVMs: An application to one-class classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(9), 1184\u20131199. ISSN 0162-8828. doi: 10.1109\/TPAMI.2002.1033211 .","DOI":"10.1109\/TPAMI.2002.1033211"},{"key":"9115_CR44","unstructured":"Reynar, J. C. (1998). Topic segmentation: Algorithms and applications. Ph.D. thesis, University of Pennsylvania."},{"key":"9115_CR45","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1023\/A:1001018624850","volume":"31","author":"J. Rudman","year":"1997","unstructured":"Rudman, J. (1997). The state of authorship attribution studies: Some problems and solutions. Computers and the Humanities, 31, 351\u2013365.","journal-title":"Computers and the Humanities"},{"key":"9115_CR46","volume-title":"Artificial intelligence: A modern approach","author":"Stuart J. Russel","year":"1995","unstructured":"Russel, S. J., & Norvig, P. (1995). Artificial intelligence: A modern approach. Englewood Cliffs, NJ: Prentice-Hall."},{"key":"9115_CR47","doi-asserted-by":"crossref","unstructured":"Sanderson, C., & Guenter, S. (2006a). On authorship attribution via markov chains and sequence kernels. In Pattern recognition, 2006. ICPR 2006. 18th international conference on (vol. 3, pp. 437\u2013440). doi: 10.1109\/ICPR.2006.899 .","DOI":"10.1109\/ICPR.2006.899"},{"key":"9115_CR48","doi-asserted-by":"crossref","unstructured":"Sanderson, C., & Guenter, S. (2006b). Short text authorship attribution via sequence kernels, markov chains and author unmasking: An investigation. In Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing (pp. 482\u2013491). URL http:\/\/acl.ldc.upenn.edu\/W\/W06\/W06-1657.pdf .","DOI":"10.3115\/1610075.1610142"},{"key":"9115_CR51","doi-asserted-by":"crossref","unstructured":"Stamatatos, E. (2007). Author identification using imbalanced and limited training texts. In A. M. Tjoa & R. R. Wagner (Eds.), 18th international conference on database and expert systems applications (DEXA 07) (pp. 237\u2013241). IEEE, September 2007. ISBN 0-7695-2932-1. doi: 10.1109\/DEXA.2007.37 .","DOI":"10.1109\/DEXA.2007.37"},{"key":"9115_CR50","doi-asserted-by":"crossref","unstructured":"Stamatatos, E. (2009). A survey of modern authorship attribution methods. Journal of American Society for Information Science & Technology, 60(3), 538\u2013556. ISSN 1532-2882. doi: 10.1002\/asi.v60:3 .","DOI":"10.1002\/asi.v60:3"},{"key":"9115_CR49","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1023\/A:1002681919510","volume":"35","author":"E. Stamatatos","year":"2001","unstructured":"Stamatatos, E., Fakotakis, N., & Kokkinakis, G. (2001). Computer-based authorship attribution without lexical measures. Computers and the Humanities, 35, 193\u2013214.","journal-title":"Computers and the Humanities"},{"key":"9115_CR52","volume-title":"Introduction to knowledge systems","author":"Mark Stefik","year":"1995","unstructured":"Stefik, M. (1995). Introduction to knowledge systems. San Mateo, CA, USA: Morgan Kaufmann."},{"key":"9115_CR53","unstructured":"Stein, B. (2005). Fuzzy-fingerprints for text-based information retrieval. In K. Tochtermann & H. Maurer (Eds.), Proceedings of the 5th international conference on knowledge management (I-KNOW 05), Graz, Journal of Universal Computer Science (pp. 572\u2013579). Know-Center."},{"key":"9115_CR54","doi-asserted-by":"crossref","unstructured":"Stein, B. (2007). Principles of hash-based text retrieval. In C. Clarke, N. Fuhr, N. Kando, W. Kraaij, & A. de Vries (Eds.), 30th annual international ACM SIGIR conference (pp. 527\u2013534). ACM, July 2007. ISBN 987-1-59593-597-7.","DOI":"10.1145\/1277741.1277832"},{"key":"9115_CR55","unstructured":"Stein, B., & Meyer zu Eissen, S. (2007). Intrinsic plagiarism analysis with meta learning. In B. Stein, M. Koppel, & E. Stamatatos (Eds.), SIGIR workshop workshop on plagiarism analysis, authorship identification, and near-duplicate detection (PAN 07) (pp. 45\u201350). CEUR-WS.org, July 2007. URL http:\/\/ceur-ws.org\/Vol-276 ."},{"key":"9115_CR56","unstructured":"Stein, B., & Meyer zu Eissen, S. (2007). Topic-identifikation: Formalisierung, analyse und neue Verfahren. KI\u2014K\u00fcnstliche Intelligenz, 3, 16\u201322. ISSN 0933-1875. URL http:\/\/www.kuenstliche-intelligenz.de\/index.php?id=7758 ."},{"key":"9115_CR57","doi-asserted-by":"crossref","unstructured":"Stein, B., Lipka, N., & Meyer zu Eissen, S. (2008). Meta analysis within authorship verification. In A. M. Tjoa & R. R. Wagner (Eds.), 19th international conference on database and expert systems applications (DEXA 08) (pp. 34\u201339). IEEE, September 2008. ISBN 978-0-7695-3299-8. doi: 10.1109\/DEXA.2008.20 .","DOI":"10.1109\/DEXA.2008.20"},{"key":"9115_CR58","unstructured":"Surdulescu R. (2004). Verifying authorship. Final project report CS391L, University of Texas at Austin"},{"key":"9115_CR59","unstructured":"Tax, D. M. J. (2001). One-class classification. Ph.D. thesis, Technische Universiteit Delft."},{"key":"9115_CR60","unstructured":"Tax D. M. J., & Duin, R. P. W. (2001). Combining one-class classifiers. In Proceedings of the second international workshop on multiple classifier systems (pp. 299\u2013308). New York: Springer. ISBN 3-540-42284-6."},{"issue":"5","key":"9115_CR61","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1023\/A:1001749303137","volume":"32","author":"Fiona J. Tweedie","year":"1998","unstructured":"Tweedie, F. J., & Baayen, H. R. (1998). How variable may a constant be? measures of lexical richness in perspective. Computers and the Humanities 32(5):323\u2013352. doi: 10.1023\/A:1001749303137 .","journal-title":"Computers and the Humanities"},{"key":"9115_CR62","doi-asserted-by":"crossref","unstructured":"van Halteren, H. (2004). Linguistic profiling for author recognition and verification. In ACL \u201904: Proceedings of the 42nd annual meeting on association for computational linguistics (pp. 199). Morristown, NJ, USA: Association for Computational Linguistics. doi: 10.3115\/1218955.1218981 .","DOI":"10.3115\/1218955.1218981"},{"key":"9115_CR63","doi-asserted-by":"crossref","unstructured":"van Halteren, H. (2007). Author verification by linguistic profiling: An exploration of the parameter space. ACM Transactions on Speech and Language Processing, 4(1), 1. ISSN 1550-4875. doi: 10.1145\/1187415.1187416 .","DOI":"10.1145\/1187415.1187416"},{"key":"9115_CR64","unstructured":"Yang, H., & Callan, J. P. (2006). Near-duplicate detection by instance-level constrained clustering. In E. N. Efthimiadis, S. Dumais, D. Hawking, & K. J\u00e4rvelin (Eds.), SIGIR \u201906: Proceedings of the 29th annual international ACM SIGIR conference on research and development in information retrieval (pp. 421\u2013428). ISBN 1-59593-369-7."},{"key":"9115_CR65","volume-title":"The statistical study of literary vocabulary","author":"G. Yule","year":"1944","unstructured":"Yule, G. (1944). The statistical study of literary vocabulary. Cambridge: Cambridge University Press"},{"key":"9115_CR66","doi-asserted-by":"crossref","unstructured":"Zheng, R., Li, J., Chen, H., & Huang, Z. (2006). A framework for authorship identification of online messages: Writing-style features and classification techniques. Journal of the American Society for Information Science and Technology, 57(3), 378\u2013393. doi: 10.1002\/asi.20316 .","DOI":"10.1002\/asi.20316"},{"key":"9115_CR67","unstructured":"Zipf, G. K. (1932). Selective studies and the principle of relative frequency in language."}],"container-title":["Language Resources and Evaluation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10579-010-9115-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10579-010-9115-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10579-010-9115-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T18:21:15Z","timestamp":1559240475000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10579-010-9115-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,20]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,3]]}},"alternative-id":["9115"],"URL":"https:\/\/doi.org\/10.1007\/s10579-010-9115-y","relation":{},"ISSN":["1574-020X","1574-0218"],"issn-type":[{"value":"1574-020X","type":"print"},{"value":"1574-0218","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,20]]}}}