메뉴 건너뛰기




Volumn , Issue , 2008, Pages 571-578

Local text reuse detection

Author keywords

Fingerprinting; Information flow; Text reuse

Indexed keywords

FINGERPRINTING; INFORMATION FLOW; NEW APPROACHES; NEW TOOLS; ONE FORMS; TEXT ANALYSES; TEXT REUSE; WEB SEARCHES;

EID: 57349177560     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1390334.1390432     Document Type: Conference Paper
Times cited : (76)

References (20)
  • 1
    • 33747171448 scopus 로고    scopus 로고
    • Accurate discovery of co-derivative documents via duplicate text detection
    • Y. Bernstein and J. Zobel. Accurate discovery of co-derivative documents via duplicate text detection. Information Systems, 31:595-609, 2006.
    • (2006) Information Systems , vol.31 , pp. 595-609
    • Bernstein, Y.1    Zobel, J.2
  • 6
    • 0013206133 scopus 로고    scopus 로고
    • Collection statistics for fast duplicate document detection
    • A. Chowdhury, O. Frieder, D. Grossman, and M. C. McCabe. Collection statistics for fast duplicate document detection. ACM Trans. Inf. Syst., 20(2):171-191, 2002.
    • (2002) ACM Trans. Inf. Syst , vol.20 , Issue.2 , pp. 171-191
    • Chowdhury, A.1    Frieder, O.2    Grossman, D.3    McCabe, M.C.4
  • 11
    • 0037319544 scopus 로고    scopus 로고
    • Methods for identifying versioned and plagiarized documents
    • T. C. Hoad and J. Zobel. Methods for identifying versioned and plagiarized documents. J. Am. Soc. Inf. Sci. Technol., 54(3):203-215, 2003.
    • (2003) J. Am. Soc. Inf. Sci. Technol , vol.54 , Issue.3 , pp. 203-215
    • Hoad, T.C.1    Zobel, J.2
  • 12
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • C.-Y. Lin and S.-F. Chang. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Transactions on Circuits and Systems for Video Technology, 11(2):153-168, 2001.
    • (2001) IEEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.-Y.1    Chang, S.-F.2
  • 13
    • 57349178651 scopus 로고    scopus 로고
    • The TREC blogs06 collection: Creating and analysing a blog test collection
    • Technical Report TR-2006-224, University of Glasgow, Department of Computing Science
    • C. Maconald and I. Ounis. The TREC blogs06 collection: Creating and analysing a blog test collection. Technical Report TR-2006-224, University of Glasgow, Department of Computing Science, 2006.
    • (2006)
    • Maconald, C.1    Ounis, I.2
  • 16
    • 0003676885 scopus 로고
    • Fingerprinting by random polynomials
    • Technical report, Harvard University, TR-15-81
    • M. O. Rabin. Fingerprinting by random polynomials. Technical report, Harvard University, 1981. TR-15-81.
    • (1981)
    • Rabin, M.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.