{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:23Z","timestamp":1750307303484,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,12]],"date-time":"2011-06-12T00:00:00Z","timestamp":1307836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,12]]},"DOI":"10.1145\/1989323.1989454","type":"proceedings-article","created":{"date-parts":[[2011,6,14]],"date-time":"2011-06-14T14:45:32Z","timestamp":1308062732000},"page":"1205-1208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Large-scale copy detection"],"prefix":"10.1145","author":[{"given":"Xin Luna","family":"Dong","sequence":"first","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]},{"given":"Divesh","family":"Srivastava","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs-Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,12]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70725"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1498759.1498835"},{"key":"e_1_3_2_2_3_1","volume-title":"CIDR.","author":"Berti-Equille L.","year":"2009","unstructured":"L. Berti-Equille , A. D. Sarma , X. Dong , A. Marian , and D. Srivastava . Sailing the information ocean with awareness of currents: Discovery and application of source dependence . In CIDR. 2009 . L. Berti-Equille, A. D. Sarma, X. Dong, A. Marian, and D. Srivastava. Sailing the information ocean with awareness of currents: Discovery and application of source dependence. In CIDR. 2009."},{"key":"e_1_3_2_2_4_1","series-title":"Lecture Notes in Computer Science","first-page":"83","volume-title":"CAiSE","author":"Blanco L.","year":"2010","unstructured":"L. Blanco , V. Crescenzi , P. Merialdo , and P. Papotti . Probabilistic models to reconcile complex data from inaccurate data sources . In CAiSE , volume 6051 of Lecture Notes in Computer Science , pages 83 -- 97 . Springer , 2010 . L. Blanco, V. Crescenzi, P. Merialdo, and P. Papotti. Probabilistic models to reconcile complex data from inaccurate data sources. In CAiSE, volume 6051 of Lecture Notes in Computer Science, pages 83--97. Springer, 2010."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11687238_48"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.830793"},{"issue":"1","key":"e_1_3_2_2_8_1","first-page":"1358","article-title":"Global detection of complex copying relationships between sources","volume":"3","author":"Dong X.","year":"2010","unstructured":"X. Dong , L. Berti-Equille , Y. Hu , and D. Srivastava . Global detection of complex copying relationships between sources . PVLDB , 3 ( 1 ): 1358 -- 1369 , 2010 . X. Dong, L. Berti-Equille, Y. Hu, and D. Srivastava. Global detection of complex copying relationships between sources. PVLDB, 3(1):1358--1369, 2010.","journal-title":"PVLDB"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687690"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687691"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9073-9"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/382006.383197"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526719"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2001.1237827"},{"key":"e_1_3_2_2_15_1","series-title":"SPIE Proceedings","first-page":"194","volume-title":"Storage and Retrieval for Media Databases","author":"Hampapur A.","year":"2002","unstructured":"A. Hampapur , K. Hyun , and R. M. Bolle . Comparison of sequence matching techniques for video copy detection . In Storage and Retrieval for Media Databases , volume 4676 of SPIE Proceedings , pages 194 -- 201 . SPIE , 2002 . A. Hampapur, K. Hyun, and R. M. Bolle. Comparison of sequence matching techniques for video copy detection. In Storage and Retrieval for Media Databases, volume 4676 of SPIE Proceedings, pages 194--201. SPIE, 2002."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148222"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2010.5582615"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2004.836751(410) 1"},{"key":"e_1_3_2_2_20_1","series-title":"Dagstuhl Seminar Proceedings","volume-title":"Duplication, Redundancy, and Similarity in Software","author":"Koschke R.","year":"2006","unstructured":"R. Koschke . Survey of research on software clones . In Duplication, Redundancy, and Similarity in Software , volume 06301 of Dagstuhl Seminar Proceedings . Internationales Begegnungsund Forschungszentrum fuer Informatik (IBFI) , 2006 . R. Koschke. Survey of research on software clones. In Duplication, Redundancy, and Similarity in Software, volume 06301 of Dagstuhl Seminar Proceedings. Internationales Begegnungsund Forschungszentrum fuer Informatik (IBFI), 2006."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282336"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0199-y"},{"key":"e_1_3_2_2_23_1","first-page":"731","volume-title":"ICME","author":"Lu C.-S.","year":"2004","unstructured":"C.-S. Lu , C.-Y. Hsu , S.-W. Sun , and P.-C. Chang . Robust mesh-based hashing for copy detection and tracing of images . In ICME , pages 731 -- 734 . IEEE, 2004 . C.-S. Lu, C.-Y. Hsu, S.-W. Sun, and P.-C. Chang. Robust mesh-based hashing for copy detection and tracing of images. In ICME, pages 731--734. IEEE, 2004."},{"issue":"8","key":"e_1_3_2_2_24_1","first-page":"1050","article-title":"Plagiarism - a survey","volume":"12","author":"Maurer H. A.","year":"2006","unstructured":"H. A. Maurer , F. Kappe , and B. Zaka . Plagiarism - a survey . J. UCS , 12 ( 8 ): 1050 -- 1084 , 2006 . H. A. Maurer, F. Kappe, and B. Zaka. Plagiarism - a survey. J. UCS, 12(8):1050--1084, 2006.","journal-title":"J. UCS"},{"key":"e_1_3_2_2_25_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-642-16020-2_16","volume-title":"EC-TEL","author":"Mittelbach A.","year":"2010","unstructured":"A. Mittelbach , L. Lehmann , C. Rensing , and R. Steinmetz . Automatic detection of local reuse . In EC-TEL , volume 6383 of Lecture Notes in Computer Science , pages 229 -- 244 . Springer , 2010 . A. Mittelbach, L. Lehmann, C. Rensing, and R. Steinmetz. Automatic detection of local reuse. In EC-TEL, volume 6383 of Lecture Notes in Computer Science, pages 229--244. Springer, 2010."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948509.1948644"},{"key":"e_1_3_2_2_27_1","first-page":"387","volume-title":"ICDE","author":"Nie Z.","year":"2004","unstructured":"Z. Nie and S. Kambhampati . A frequency-based approach for mining coverage statistics in data integration . In ICDE , pages 387 -- 398 . 2004 . Z. Nie and S. Kambhampati. A frequency-based approach for mining coverage statistics in data integration. In ICDE, pages 387--398. 2004."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.76"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.v22:3"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.02.007"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390432"}],"event":{"name":"SIGMOD\/PODS '11: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Athens Greece","acronym":"SIGMOD\/PODS '11"},"container-title":["Proceedings of the 2011 ACM SIGMOD International Conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1989323.1989454","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1989323.1989454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:56Z","timestamp":1750244396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1989323.1989454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,12]]},"references-count":32,"alternative-id":["10.1145\/1989323.1989454","10.1145\/1989323"],"URL":"https:\/\/doi.org\/10.1145\/1989323.1989454","relation":{},"subject":[],"published":{"date-parts":[[2011,6,12]]},"assertion":[{"value":"2011-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}