{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:58Z","timestamp":1767339958155,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,19]],"date-time":"2011-09-19T00:00:00Z","timestamp":1316390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,19]]},"DOI":"10.1145\/2034691.2034741","type":"proceedings-article","created":{"date-parts":[[2011,9,20]],"date-time":"2011-09-20T13:50:16Z","timestamp":1316526616000},"page":"249-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Citation pattern matching algorithms for citation-based plagiarism detection"],"prefix":"10.1145","author":[{"given":"Bela","family":"Gipp","sequence":"first","affiliation":[{"name":"OvGU, Germany &amp; UC Berkeley, Berkeley, CA, USA"}]},{"given":"Norman","family":"Meuschke","sequence":"additional","affiliation":[{"name":"OvGU, Germany &amp; UC Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315803.1315831"},{"volume-title":"B. S. A Program for Identifying Duplicated Code. In Computing Science and Statistics: Proceedings of the 24th Symposium on the Interface","year":"1992","author":"BAKER","key":"e_1_3_2_1_2_1"},{"volume-title":"University of Hertfordshire","year":"2007","author":"BAO J. P.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810617.1810671"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10805-009-9092-1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"volume-title":"Oxford Reference Online","year":"1998","author":"COCEL.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1142\/4838"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"DREHER H. Automatic Conceptual Analysis for Plagiarism Detection. Information and Beyond: The Journal of Issues in Informing Science and Information Technology 4 (2007).  DREHER H. Automatic Conceptual Analysis for Plagiarism Detection. Information and Beyond: The Journal of Issues in Informing Science and Information Technology 4 (2007).","DOI":"10.28945\/974"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm574"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkn546"},{"key":"e_1_3_2_1_12_1","volume-title":"Twenty-Fifth Australasian Computer Science Conference (ACSC2002)","volume":"4","author":"FINKEL R. A.","year":"2002"},{"key":"e_1_3_2_1_13_1","first-page":"2","volume":"57","author":"FR\u00d6HLICH G.","year":"2006","journal-title":"Wissenschaft & Praxis"},{"key":"e_1_3_2_1_14_1","first-page":"108","volume":"122","author":"GARFIELD E.","journal-title":"Association of Ideas. Science"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998076.1998124"},{"key":"e_1_3_2_1_16_1","first-page":"4","volume":"4","author":"GRIFFITH B. C.","year":"1974","journal-title":"Macro- and Microstructure for Science. Science Studies"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/262228"},{"volume-title":"Technischen Universit\u00e4t Braunschweig Institut f\u00fcr Betriebssysteme und Rechnerverbund","year":"2007","author":"GUTBROD M. A.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10170"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.2190\/EC.42.2.a"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11846406_83"},{"volume-title":"Notebook Papers of CLEF 2010 LABs and Workshops, 22--23 September, Padua, Italy","year":"2010","author":"KASPRZAK J.","key":"e_1_3_2_1_22_1"},{"volume-title":"Massachusetts Institute of Technology. Lincoln Laboratory, 1958","year":"1974","author":"KESSLER M. M.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756553.1756568"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199911)29:13%3C1149::AID-SPE274%3E3.0.CO;2-O"},{"volume-title":"Information Systems and Mathematics South Bank University","year":"2003","author":"LANCASTER T.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","first-page":"3","volume":"11","author":"LIM V. K.","year":"2001","journal-title":"Academic Cheating Among Students in Singapore. Ethics & Behavior"},{"key":"e_1_3_2_1_28_1","first-page":"8","volume":"12","author":"MAURER H.","year":"2006","journal-title":"Journal of Universal Computer Science"},{"key":"e_1_3_2_1_29_1","first-page":"1","volume":"1","author":"MCCABE D. L.","year":"2005","journal-title":"International Journal for Academic Integrity"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/11735106_66"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/336597.336667"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/563857.563820"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02458472"},{"volume-title":"P. Overview of the 2nd International Competition on Plagiarism Detection. In Notebook Papers of CLEF 2010 LABs and Workshops, 22-23 September, Padua, Italy (Sept.","year":"2010","author":"POTTHAST M.","key":"e_1_3_2_1_35_1"},{"volume-title":"1st International Competition on Plagiarism Detection. In PAN09 - 3rd Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse and 1st International Competition on Plagiarism Detection","year":"2009","author":"POTTHAST M.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_38_1","first-page":"351","volume":"31","author":"RUDMAN","year":"1997","journal-title":"J. The State of Authorship Attribution Studies: Some Problems and Solutions. Computers and the Humanities"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"SEGLEN P. O. Why the impact factor of journals should not be used for evaluating research. BMJ 314 7079 (1997) 497.  SEGLEN P. O. Why the impact factor of journals should not be used for evaluating research. BMJ 314 7079 (1997) 497.","DOI":"10.1136\/bmj.314.7079.497"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/331697.335176"},{"key":"e_1_3_2_1_41_1","first-page":"1","volume":"4","author":"SMALL H.","year":"1974","journal-title":"The Structure of Scientific Literatures I: Identifying and Graphing Specialties. Science Studies"},{"key":"e_1_3_2_1_42_1","unstructured":"SMYTH B. Computing Patterns in Strings. Pearson Addison-Wesley Harlow England; New York 2003.  SMYTH B. Computing Patterns in Strings. Pearson Addison-Wesley Harlow England; New York 2003."},{"volume-title":"Cornell University TR2006-2046","year":"2006","author":"SOROKINA D.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","volume-title":"B. Fuzzy-Fingerprints for Text-Based Information Retrieval. In Proceedings of the I-KNOW '05, 5th International Conference on Knowledge Management, Graz, Austria (July","volume":"579","author":"STEIN","year":"2005"},{"key":"e_1_3_2_1_45_1","unstructured":"STEIN B. KOPPEL M. AND \n      STAMATATOS E. Eds. \n  Proceedings of the SIGIR 2007 International Workshop on Plagiarism Analysis Authorship Identification and NearDuplicate Detection PAN\n   \n  2007 Amsterdam Netherlands July 27 2007 (2007) vol. \n  276\n   of \n  CEUR Workshop Proceedings CEUR-WS.\n  org.  STEIN B. KOPPEL M. AND STAMATATOS E. Eds. Proceedings of the SIGIR 2007 International Workshop on Plagiarism Analysis Authorship Identification and NearDuplicate Detection PAN 2007 Amsterdam Netherlands July 27 2007 (2007) vol. 276 of CEUR Workshop Proceedings CEUR-WS.org."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10579-010-9115-y"},{"key":"e_1_3_2_1_47_1","first-page":"430","volume-title":"University of Magdeburg","author":"STEIN B.","year":"2005"},{"volume-title":"Proceedings of the 4th International Plagiarism Conference","year":"2010","author":"TSATSARONIS G.","key":"e_1_3_2_1_48_1"},{"volume-title":"Online Source","year":"2010","author":"WEBER WULFF D.","key":"e_1_3_2_1_49_1"},{"volume-title":"Proceedings of the 4th International Plagiarism Conference (Newcastle Upon Tyne","year":"2010","author":"WEBER WULFF D.","key":"e_1_3_2_1_50_1"},{"volume-title":"Online Preprint","year":"1993","author":"WISE M. J.","key":"e_1_3_2_1_51_1"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICICIC.2008.422"}],"event":{"name":"DocEng '11: ACM Symposium on Document Engineering","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Mountain View California USA","acronym":"DocEng '11"},"container-title":["Proceedings of the 11th ACM symposium on Document engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2034691.2034741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2034691.2034741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:38Z","timestamp":1750240118000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2034691.2034741"}},"subtitle":["greedy citation tiling, citation chunking and longest common citation sequence"],"short-title":[],"issued":{"date-parts":[[2011,9,19]]},"references-count":51,"alternative-id":["10.1145\/2034691.2034741","10.1145\/2034691"],"URL":"https:\/\/doi.org\/10.1145\/2034691.2034741","relation":{},"subject":[],"published":{"date-parts":[[2011,9,19]]},"assertion":[{"value":"2011-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}