{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:46Z","timestamp":1750306246721,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,2,24]],"date-time":"2017-02-24T00:00:00Z","timestamp":1487894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,2,24]]},"DOI":"10.1145\/3055635.3056655","type":"proceedings-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T18:46:30Z","timestamp":1497465990000},"page":"456-460","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Plagiarism Detection in Malayalam Language Text using a Composition of Similarity measures"],"prefix":"10.1145","author":[{"given":"L.","family":"Sindhu","sequence":"first","affiliation":[{"name":"Department of computer science, College of Engineering, Poonjar, Kerala, India"}]},{"given":"Sumam Mary","family":"Idicula","sequence":"additional","affiliation":[{"name":"Department of computer science, Cochin University of Science and Technology, Kochi, India"}]}],"member":"320","published-online":{"date-parts":[[2017,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2134847"},{"key":"e_1_3_2_1_2_1","volume-title":"S. M.","author":"Stein B.","year":"2006","unstructured":"Stein , B. , andZuEissen , S. M. 2006 . Near similarity search and plagiarism analysis. In From Data and Information Analysis to Knowledge Engineering, 430--437, Springer Berlin Heidelberg . Stein, B., andZuEissen, S. M. 2006. Near similarity search and plagiarism analysis. In From Data and Information Analysis to Knowledge Engineering, 430--437, Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"January). Finding Similar Files in a Large File System","volume":"94","author":"Manber U.","year":"1994","unstructured":"Manber , U. ( 1994 , January). Finding Similar Files in a Large File System . InUsenix Winter , 94 (1994), 1 -- 10 . Manber, U. (1994, January). Finding Similar Files in a Large File System. InUsenix Winter, 94(1994), 1--10.","journal-title":"InUsenix Winter"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10170"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings Of 2001 Conference on Empirical Methods on Natural Language Processing, 118--125","author":"Lyon C.","year":"2001","unstructured":"Lyon , C. , Malcolm , J. and Dickerson , B . ( 2001 ), Detecting Short Passages of Similar Text in Large Document Collections , In Proceedings Of 2001 Conference on Empirical Methods on Natural Language Processing, 118--125 . Lyon, C., Malcolm, J. and Dickerson, B. (2001), Detecting Short Passages of Similar Text in Large Document Collections, In Proceedings Of 2001 Conference on Empirical Methods on Natural Language Processing, 118--125."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of International Conference on Computing and Network Communications (CoCoNet' 15)","author":"Sindhu L.","year":"2015","unstructured":"Sindhu L. , Sumam M I .,2015, Fingerprinting Based Detection System for Identifying Plagiarism in Malayalam Text Documents , Proc. of International Conference on Computing and Network Communications (CoCoNet' 15) ,553--558, India , 2015 Sindhu L., Sumam M I.,2015, Fingerprinting Based Detection System for Identifying Plagiarism in Malayalam Text Documents, Proc. of International Conference on Computing and Network Communications (CoCoNet' 15),553--558, India, 2015"},{"volume-title":"Proc. of 5th Asia Modeling Symposium, IEEE","author":"Asim M.El.","key":"e_1_3_2_1_8_1","unstructured":"Asim , M.El. , Ali , T. , Abdulla , H.M. D. , Snasel , V.. \" Survey of Plagiarism Detection Methods\". Proc. of 5th Asia Modeling Symposium, IEEE Asim, M.El., Ali, T., Abdulla, H.M. D., Snasel, V.. \"Survey of Plagiarism Detection Methods\". Proc. of 5th Asia Modeling Symposium, IEEE"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086339.1086341"},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. of 2 3rd International Conference on Computational Linguistics","author":"Cohen-Kerner Y.H.","year":"2010","unstructured":"Cohen-Kerner , Y.H. , Tayeb , A. , Ben-Dror N. 2010 . Detection of Simple Plagiarism in Computer Science Papers . Proc. of 2 3rd International Conference on Computational Linguistics , Coling 2010. Cohen-Kerner, Y.H., Tayeb, A., Ben-Dror N. 2010.Detection of Simple Plagiarism in Computer Science Papers. Proc. of 2 3rd International Conference on Computational Linguistics, Coling 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"T 2013. Using a variety of N-grams for the detection of different kinds of plagiarism -lab report forPAN at CLEF 2013. Proc. of 4th International Workshop PAN-13","author":"Shrestha P.","year":"2013","unstructured":"Shrestha , P. , Soloria , T 2013. Using a variety of N-grams for the detection of different kinds of plagiarism -lab report forPAN at CLEF 2013. Proc. of 4th International Workshop PAN-13 , Valencia, Spain , 2013 . Shrestha, P., Soloria, T 2013. Using a variety of N-grams for the detection of different kinds of plagiarism -lab report forPAN at CLEF 2013. Proc. of 4th International Workshop PAN-13, Valencia, Spain, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21630"},{"key":"e_1_3_2_1_13_1","volume-title":"Overview of the 2nd International Competition on Plagiarism Detection. In Proceedings of the CLEF 10 Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse","author":"Potthast M.","year":"2010","unstructured":"Potthast , M. , Stein , B. , Eiselt , A. , Barr _on-Cede~no A. , and Rosso . P. , Overview of the 2nd International Competition on Plagiarism Detection. In Proceedings of the CLEF 10 Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse , 2010 . Potthast, M., Stein, B., Eiselt, A., Barr_on-Cede~no A., and Rosso. P., Overview of the 2nd International Competition on Plagiarism Detection. In Proceedings of the CLEF 10 Workshop on Uncovering Plagiarism, Authorship and Social Software Misuse, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HIS.2012.6421362"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of 4th International Workshop PAN-13","author":"Kong L.","year":"2013","unstructured":"Kong , L. , Qi , H. , Shuai , W. , Cuixia , D. , Suhong , W. Yong . H. 2013 , Approaches for Source Retrieval and Text Alignment of Plagiarism Detection-lab report for PAN at CLEF 2013 . Proc. of 4th International Workshop PAN-13 , Valencia, Spain , 2013. Kong, L., Qi, H., Shuai, W., Cuixia, D., Suhong, W. Yong. H. 2013, Approaches for Source Retrieval and Text Alignment of Plagiarism Detection-lab report for PAN at CLEF 2013. Proc. of 4th International Workshop PAN-13, Valencia, Spain, 2013."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of 4th International Workshop PAN-10","author":"Alzahrani S. M","year":"2010","unstructured":"Alzahrani , S. M Salim . N. 2010 , Fuzzy semantic-based string similarity for extrinsic plagiarism detection- lab report for PAN at CLEF 2010 . Proc. of 4th International Workshop PAN-10 , Padua, Italy , 2010. Alzahrani, S. M Salim. N. 2010, Fuzzy semantic-based string similarity for extrinsic plagiarism detection- lab report for PAN at CLEF 2010. Proc. of 4th International Workshop PAN-10, Padua, Italy, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968314"},{"key":"e_1_3_2_1_19_1","volume-title":"International Journal of Computer Applications, 106,15(November","author":"Sindhu L","year":"2014","unstructured":"Sindhu . L , Bindu Baby Thomas and Sumum Mary Idicula. Article: Automated Plagiarism Detection System for Malayalam Text Documents . International Journal of Computer Applications, 106,15(November 2014 ), 13--16. Sindhu. L, Bindu Baby Thomas and Sumum Mary Idicula. Article: Automated Plagiarism Detection System for Malayalam Text Documents. International Journal of Computer Applications, 106,15(November 2014), 13--16."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.12.021"},{"key":"e_1_3_2_1_21_1","volume-title":"Using Natural Language Processing for Automatic Plagiarism Detection. Proc. of 4th International Plagiarism Conference","author":"Chong M.","year":"2010","unstructured":"Chong , M. , Specia , L. , Mitkov R. , 2010 , Using Natural Language Processing for Automatic Plagiarism Detection. Proc. of 4th International Plagiarism Conference , Northrumbia University , 2010. Computer society, Kuala Lumpur, 39--42,2011 Chong, M., Specia, L., Mitkov R., 2010, Using Natural Language Processing for Automatic Plagiarism Detection. Proc. of 4th International Plagiarism Conference, Northrumbia University, 2010. Computer society, Kuala Lumpur, 39--42,2011"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.80210"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of 5th International Workshop PAN-14","author":"Sanchez-Perez M. A.","year":"2014","unstructured":"Sanchez-Perez , M. A. , Sidorov . G , Gelbukh A. 2014 , A Winning Approach to Text Alignment for Text Reuse Detection - Lab report for PAN at CLEF 2014 . Proc. of 5th International Workshop PAN-14 , Toulouse, France , 2014. Sanchez-Perez, M. A., Sidorov. G, Gelbukh A. 2014, A Winning Approach to Text Alignment for Text Reuse Detection - Lab report for PAN at CLEF 2014. Proc. of 5th International Workshop PAN-14, Toulouse, France, 2014."}],"event":{"name":"ICMLC 2017: 2017 the 9th International Conference on Machine Learning and Computing","sponsor":["Southwest Jiaotong University"],"location":"Singapore Singapore","acronym":"ICMLC 2017"},"container-title":["Proceedings of the 9th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056655","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3055635.3056655","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:46Z","timestamp":1750220626000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3055635.3056655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,24]]},"references-count":22,"alternative-id":["10.1145\/3055635.3056655","10.1145\/3055635"],"URL":"https:\/\/doi.org\/10.1145\/3055635.3056655","relation":{},"subject":[],"published":{"date-parts":[[2017,2,24]]},"assertion":[{"value":"2017-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}