{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:07Z","timestamp":1750306807264,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,1,9]],"date-time":"2014-01-09T00:00:00Z","timestamp":1389225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004083","name":"Ministry of Science ICT and Future Planning","doi-asserted-by":"publisher","award":["2011-0015359"],"award-info":[{"award-number":["2011-0015359"]}],"id":[{"id":"10.13039\/501100004083","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,1,9]]},"DOI":"10.1145\/2557977.2558053","type":"proceedings-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T13:07:05Z","timestamp":1396357625000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-level sequence alignment"],"prefix":"10.1145","author":[{"given":"Jong-kyu","family":"Seo","sequence":"first","affiliation":[{"name":"Pusan National University, Korea"}]},{"given":"Hae-sung","family":"Tak","sequence":"additional","affiliation":[{"name":"Pusan National University, Korea"}]},{"given":"Hwan-gue","family":"Cho","sequence":"additional","affiliation":[{"name":"Pusan National University, Korea"}]}],"member":"320","published-online":{"date-parts":[[2014,1,9]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","article-title":"Ridgeology","volume":"31","author":"Ashbaugh D. R.","year":"1991","unstructured":"D. R. Ashbaugh . Ridgeology . J. of Forensic Identification , 31 ( 1 ), 1991 . D. R. Ashbaugh. Ridgeology. J. of Forensic Identification, 31(1), 1991.","journal-title":"J. of Forensic Identification"},{"key":"e_1_3_2_1_2_1","volume-title":"Encyclopedia of forensic science: a compendium of detective fact and fiction","author":"Conklin R. G.","year":"2002","unstructured":"R. G. Conklin , Barbara Gardner and D. Shortelle . Encyclopedia of forensic science: a compendium of detective fact and fiction . 2002 . R. G. Conklin, Barbara Gardner and D. Shortelle. Encyclopedia of forensic science: a compendium of detective fact and fiction. 2002."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2307\/1932409"},{"key":"e_1_3_2_1_4_1","volume-title":"DM","author":"M.","year":"2004","unstructured":"M. DM . Bioinformatics : Sequence and Genome Analysis (2nd ed.). Cold Spring Harbor Laboratory Press , Cold Spring Harbor, NY., 2004 . M. DM. Bioinformatics: Sequence and Genome Analysis (2nd ed.). Cold Spring Harbor Laboratory Press, Cold Spring Harbor, NY., 2004."},{"key":"e_1_3_2_1_5_1","volume-title":"Classification and uses of finger prints","author":"Henry E. R.","year":"1900","unstructured":"E. R. Henry . Classification and uses of finger prints . 1900 . E. R. Henry. Classification and uses of finger prints. 1900."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10170"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1009910911387"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376815.1376819"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCM.2008.275"},{"key":"e_1_3_2_1_10_1","unstructured":"MmemeChecker. http:\/\/www.memechecker.com\/.  MmemeChecker. http:\/\/www.memechecker.com\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Incorporating sequential information into traditional classification models by using an element\/position- sensitive sam. Technical report","author":"Prinzie A.","year":"2005","unstructured":"A. Prinzie and D. Van den Poel . Incorporating sequential information into traditional classification models by using an element\/position- sensitive sam. Technical report , Ghent University , FEBA , 2005 . A. Prinzie and D. Van den Poel. Incorporating sequential information into traditional classification models by using an element\/position- sensitive sam. Technical report, Ghent University, FEBA, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"Fingerprinting by random polynomials","author":"Rabin M. O.","year":"1981","unstructured":"M. O. Rabin . Fingerprinting by random polynomials . Center for Research in Computing Technology, Harvard University , 1981 . M. O. Rabin. Fingerprinting by random polynomials. Center for Research in Computing Technology, Harvard University, 1981."},{"issue":"9","key":"e_1_3_2_1_13_1","first-page":"772","article-title":"A study on undergraduate students' understanding and acts about plagiarism","volume":"50","author":"Seo Y.-K.","year":"1999","unstructured":"Y.-K. Seo . A study on undergraduate students' understanding and acts about plagiarism . JASIST , 50 ( 9 ): 772 -- 778 , 1999 . Y.-K. Seo. A study on undergraduate students' understanding and acts about plagiarism. JASIST, 50(9):772--778, 1999.","journal-title":"JASIST"},{"issue":"2","key":"e_1_3_2_1_14_1","first-page":"282","article-title":"Sequence alignment as a method for human activity analysis in space and time","volume":"97","author":"Shoval N.","year":"2007","unstructured":"N. Shoval and M. Isaacson . Sequence alignment as a method for human activity analysis in space and time . Annals of the AAG , 97 ( 2 ): 282 -- 297 , 2007 . N. Shoval and M. Isaacson. Sequence alignment as a method for human activity analysis in space and time. Annals of the AAG, 97(2):282--297, 2007.","journal-title":"Annals of the AAG"},{"key":"e_1_3_2_1_15_1","unstructured":"T. T. Tanimoto. Ibm internal report. November 1957.  T. T. Tanimoto. Ibm internal report. November 1957."},{"key":"e_1_3_2_1_16_1","unstructured":"TurnItIn. http:\/\/www.turnitin.com\/.  TurnItIn. http:\/\/www.turnitin.com\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.4.327"}],"event":{"name":"ICUIMC '14: The 8th International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Siem Reap Cambodia","acronym":"ICUIMC '14"},"container-title":["Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558053","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557977.2558053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:35:00Z","timestamp":1750232100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557977.2558053"}},"subtitle":["a trade-off between speed and accuracy in similar text searching"],"short-title":[],"issued":{"date-parts":[[2014,1,9]]},"references-count":17,"alternative-id":["10.1145\/2557977.2558053","10.1145\/2557977"],"URL":"https:\/\/doi.org\/10.1145\/2557977.2558053","relation":{},"subject":[],"published":{"date-parts":[[2014,1,9]]},"assertion":[{"value":"2014-01-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}