{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:16Z","timestamp":1750306456575,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":5,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2824864.2824887","type":"proceedings-article","created":{"date-parts":[[2015,11,20]],"date-time":"2015-11-20T13:58:40Z","timestamp":1448027920000},"page":"39-42","source":"Crossref","is-referenced-by-count":3,"title":["DCU@FIRE-2014"],"prefix":"10.1145","author":[{"given":"Debasis","family":"Ganguly","sequence":"first","affiliation":[]},{"given":"Gareth J. F.","family":"Jones","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"doi-asserted-by":"crossref","unstructured":"A. Z. Broder. Identifying and filtering near-duplicate documents. In Combinatorial Pattern Matching, 11th Annual Symposium, CPM 2000, Montreal, Canada, June 21-23, 2000, pages 1--10, 2000.","key":"key-10.1145\/2824864.2824887-1","DOI":"10.1007\/3-540-45123-4_1"},{"doi-asserted-by":"crossref","unstructured":"D. Chae, J. Ha, S. Kim, B. Kang, and E. G. Im. Software plagiarism detection: a graph-based approach. In 22nd ACM International Conference on Information and Knowledge Management, CIKM'13, San Francisco, CA, USA, October 27 - November 1, 2013, pages 1577--1580.","key":"key-10.1145\/2824864.2824887-2","DOI":"10.1145\/2505515.2507848"},{"doi-asserted-by":"crossref","unstructured":"D.-K. Chae, S.-W. Kim, J. Ha, S.-C. Lee, and G. Woo. Software plagiarism detection via the static api call frequency birthmark. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, SAC '13, pages 1639--1643, New York, NY, USA, 2013. ACM.","key":"key-10.1145\/2824864.2824887-3","DOI":"10.1145\/2480362.2480668"},{"doi-asserted-by":"crossref","unstructured":"E. Flores, P. Rosso, L. Moreno, and E. Villatoro-Tello. PAN@FIRE: Overview of SOCO Track on the Detection of SOurce COde Re-use. In Sixth Forum for Information Retrieval Evaluation (FIRE 2014), Bangalore, India, 2014.","key":"key-10.1145\/2824864.2824887-4","DOI":"10.1145\/2824864.2824878"},{"unstructured":"D. Hiemstra. Using Language Models for Information Retrieval. PhD thesis, CTIT, AE Enschede, 2000.","key":"key-10.1145\/2824864.2824887-5"}],"event":{"number":"6","acronym":"FIRE '14","name":"the Forum for Information Retrieval Evaluation","start":{"date-parts":[[2014,12,5]]},"location":"Bangalore, India","end":{"date-parts":[[2014,12,7]]}},"container-title":["Proceedings of the Forum for Information Retrieval Evaluation on - FIRE '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2824864.2824887","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2824887&amp;ftid=1646782&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:22Z","timestamp":1750225402000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2824864.2824887"}},"subtitle":["An Information Retrieval Approach for Source Code Plagiarism Detection"],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1145\/2824864.2824887","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}