{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T10:33:38Z","timestamp":1769510018749,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,12]],"date-time":"2017-06-12T00:00:00Z","timestamp":1497225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,12]]},"DOI":"10.1145\/3086512.3086530","type":"proceedings-article","created":{"date-parts":[[2017,12,21]],"date-time":"2017-12-21T17:00:12Z","timestamp":1513875612000},"page":"179-187","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Methods for retrieving alternative contract language using a prototype"],"prefix":"10.1145","author":[{"given":"Silviu","family":"Pitis","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2017,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860493"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367717"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.10286"},{"key":"e_1_3_2_1_4_1","volume-title":"Information Retrieval: Implementing and Evaluating Search Engines","author":"B\u00fcttcher Stefan","year":"2010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/188490.188589"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.291025"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541884"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00017-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390446"},{"key":"e_1_3_2_1_10_1","unstructured":"Paul Clough. 2003. Old and new challenges in automatic plagiarism detection. National Plagiarism Advisory Service (2003). http:\/\/scholar.google.com\/scholar?hl=en  Paul Clough. 2003. Old and new challenges in automatic plagiarism detection. National Plagiarism Advisory Service (2003). http:\/\/scholar.google.com\/scholar?hl=en"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165485.1165513"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276318.1276368"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2007.4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571986"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/243199.243216"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148222"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935857"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/582415.582418"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.2.4.12-23"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/278459.258561"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/1532-2890(2000)9999:9999%3C::AID-ASI1075%3E3.3.CO;2-R"},{"key":"e_1_3_2_1_22_1","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584854"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063636"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571994"},{"key":"e_1_3_2_1_26_1","unstructured":"Caroline Lyon Ruth Barrett and James Malcolm. 2004. A theoretical basis to the automated detection of copying between texts and its practical implementation in the Ferret plagiarism and collusion detector. Plagiarism: Prevention Practice and Policies (2004).  Caroline Lyon Ruth Barrett and James Malcolm. 2004. A theoretical basis to the automated detection of copying between texts and its practical implementation in the Ferret plagiarism and collusion detector. Plagiarism: Prevention Practice and Policies (2004)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Christopher D. Manning Prabhakar Raghavan and Hinrich Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press New York NY USA.   Christopher D. Manning Prabhakar Raghavan and Hinrich Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press New York NY USA.","DOI":"10.1017\/CBO9780511809071"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076115"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/375360.375365"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873781.1873877"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1757788.1757808"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2011.02.001"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/160688.160693"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390432"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2740769.2740800"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220589"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/319950.320022"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1793274.1793317"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277794"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/188490.188559"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajps.12175"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00054-7"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564393"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1571993"}],"event":{"name":"ICAIL '17: Sixteenth International Conference on Artificial Intelligence and Law","location":"London United Kingdom","acronym":"ICAIL '17","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the 16th edition of the International Conference on Articial Intelligence and Law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3086512.3086530","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3086512.3086530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:02Z","timestamp":1750217822000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3086512.3086530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,12]]},"references-count":44,"alternative-id":["10.1145\/3086512.3086530","10.1145\/3086512"],"URL":"https:\/\/doi.org\/10.1145\/3086512.3086530","relation":{},"subject":[],"published":{"date-parts":[[2017,6,12]]},"assertion":[{"value":"2017-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}