期刊文献+

中文文本复制检测系统

A Chinese Document Copy Detection System
下载PDF
导出
摘要 如何快速准确地发现剽窃文本是知识产权保护中的一个核心问题.该文利用KMP算法构建了一个中文文本复制检测系统,它大大减小了复杂度,提高了运行速度. How to detect plagiarized documents is an open issue for the intellectual property protection. We build a Chinese document copy detection system, which decreases the complexity and improves the speed of running.
出处 《山西大同大学学报(自然科学版)》 2008年第2期17-19,共3页 Journal of Shanxi Datong University(Natural Science Edition)
基金 山西省自然科学基金资助项目[20041047] 太原理工大学博士基金[12903376]
关键词 剽窃 复制检测 匹配 plagiarism copy detection matching
  • 相关文献

参考文献6

  • 1鲍军鹏,沈钧毅,刘晓东,宋擒豹.自然语言文档复制检测研究综述[J].软件学报,2003,14(10):1753-1760. 被引量:69
  • 2[2]Manber U.Finding Similar Files in a Large File System[A].USENIX Conference[C].San Francisco CA,1994:1-10.
  • 3[3]Brin S,Davis J G,Molina H.Copy Detection Mechanisms for Digital Documents[A].SIGMOD Conference[C].San Francisco CA.[s.n],1995:126-141.
  • 4[4]Shivakumar N,G.Molina H.SCAM:A Copy Detection Mechanism for Digital Documents[A].The 2nd International Conference in Theory and Practice of Digital Libraries[C].USA Austin Texas:[s.n],1995:9-17.
  • 5[5]Shivakumar N,G.Molina H.Building a Sealable and Accurate Copy Detection Mechanism[A].The 1st ACM Conference on Digital Libraries[C].USA Bethesada Maryland:[s.n],1996:34-41.
  • 6宋擒豹,沈钧毅.数字商品非法复制和扩散的监测机制[J].计算机研究与发展,2001,38(1):121-125. 被引量:38

二级参考文献7

  • 1[2]Griswold G N. A method for protecting copyright on networks. In: Proc of Joint Harvard MIT Workshop on Technology Strategies for Protecting Intellectual Property in the Networked Multimedia Environment. Cambridge, MA: MIT Press, 1993. 214~221
  • 2[3]Brassil J, Low S, Maxemchuk N et al. Document marking and identification using both line and word shifting. AT & T Bell Laboratories, Tech Rep: TR94.6.8, 1994
  • 3[4]JPEG. JPEG digital compression and coding of continuous still images. ISO, Draft, Tech Rep: ISO 10918, 1991
  • 4[5]Brin S, Davis J, Garciaolina H. Copy detection mechanisms for digital documents. In: Proc of the ACM SIGMOD Int'l Conf on Management of Data. San Francisco, CA: ACM Press, 1995. 398~409
  • 5[1]Popek G J, Kline C S. Encryption and secure computer networks. ACM Computing Surveys, 1979, 11(4): 331~356
  • 6卢汉清,孔维新,廖明,马颂德.基于内容的视频信号与图像库检索中的图像技术[J].自动化学报,2001,27(1):56-59. 被引量:30
  • 7宋擒豹,沈钧毅.数字商品非法复制和扩散的监测机制[J].计算机研究与发展,2001,38(1):121-125. 被引量:38

共引文献94

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部