{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:45:47Z","timestamp":1773449147297,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1109\/fuzz-ieee.2016.7737903","type":"proceedings-article","created":{"date-parts":[[2016,11,16]],"date-time":"2016-11-16T18:19:22Z","timestamp":1479320362000},"page":"1760-1767","source":"Crossref","is-referenced-by-count":8,"title":["Preference comparison for plagiarism detection systems"],"prefix":"10.1109","author":[{"given":"Sarka","family":"Krizkova","sequence":"first","affiliation":[]},{"given":"Hana","family":"Tomaskova","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Gavalec","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1287\/inte.16.4.96"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0270-0255(82)90013-6"},{"key":"ref33","article-title":"plagscan","year":"2016"},{"key":"ref32","article-title":"plagium","year":"2016"},{"key":"ref31","article-title":"plagiarisma","year":"2016"},{"key":"ref30","article-title":"Paperrater","year":"2016"},{"key":"ref37","article-title":"The analytic hierarchy process","author":"saaty","year":"1980"},{"key":"ref36","article-title":"quetext","year":"2016"},{"key":"ref35","article-title":"plagtracker","year":"2016"},{"key":"ref34","article-title":"plagramme.com","year":"2016"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.06.018"},{"key":"ref40","article-title":"Multi-criteria models in autonomous decision making systems","author":"mls","year":"0"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.414"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.12.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.12.082"},{"key":"ref15","article-title":"External plagiarism detection using information retrieval and sequence alignment-notebook for pan at clef 2011","author":"nawab","year":"2011","journal-title":"Proceedings of the 5th International Workshop on Uncovering Plagiarism Authorship and Social Software Misuse Sheffield"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1037\/h0047601"},{"key":"ref17","first-page":"42","article-title":"Plagiarism avoidance","volume":"33","author":"soto","year":"2004","journal-title":"Journal of College ScienceTeaching"},{"key":"ref18","article-title":"Software tool for detecting plagiarism in computer source code","author":"zeidman","year":"2012"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2013.12.202"},{"key":"ref28","article-title":"plagiarismdetection.org","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/13.762946"},{"key":"ref27","article-title":"Eve2","year":"2016"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/179606.179731"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.048"},{"key":"ref29","article-title":"copyleaks","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000005595"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.12.021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.05.006"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jslw.2003.08.004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.02.015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jslw.2006.05.001"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11120\/ital.2005.04020006"},{"key":"ref22","article-title":"Old and new challenges in automatic plagiarism detection","author":"clough","year":"2003","journal-title":"National Plagiarism Advisory Service"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume":"1","author":"manning","year":"2008","journal-title":"Introduction to Information Retrieval"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.02.077"},{"key":"ref24","article-title":"duplichecker.com","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10700-010-9078-x"},{"key":"ref23","article-title":"plagiarismchecker.com","year":"2016"},{"key":"ref26","article-title":"Viper","year":"2016"},{"key":"ref25","article-title":"dustball","year":"2016"}],"event":{"name":"2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","location":"Vancouver, BC, Canada","start":{"date-parts":[[2016,7,24]]},"end":{"date-parts":[[2016,7,29]]}},"container-title":["2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7694773\/7737658\/07737903.pdf?arnumber=7737903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T13:15:56Z","timestamp":1568553356000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7737903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/fuzz-ieee.2016.7737903","relation":{},"subject":[],"published":{"date-parts":[[2016,7]]}}}