期刊文献+

自然语言文档复制检测研究综述 被引量:69

A Survey on Natural Language Text Copy Detection
下载PDF
导出
摘要 复制检测技术在知识产权保护和信息检索中有着重要应用.到目前为止,复制检测技术主要集中在文档复制检测上.文档复制检测在初期主要检测程序复制,现在则主要为文本复制检测.分别介绍了程序复制检测和文本复制检测技术的发展,详细分析了目前已知各种文本复制检测系统的检测方法和技术特点,并比较了各系统关键技术的异同,最后指出了文本复制检测技术的发展思路. Copy detection has very important application in both intellectual property protection and information retrieval. Currently, copy detection concentrates on document copy detection mainly. In early days, document copy detection concentrated on program plagiarism detection mainly and now the most studies are on text copy detection. In this paper, a comprehensive survey on natural language text copy detection is given, the developments of copy detection is introduced. The approaches and features of a variety of existing text copy detection systems or prototypes are reviewed in detail. Then some key detection techniques are listed and compared with each other. In the end, the future trend of text copy detection is discussed.
出处 《软件学报》 EI CSCD 北大核心 2003年第10期1753-1760,共8页 Journal of Software
基金 国家自然科学基金 西安交通大学科学研究基金~~
关键词 复制检测 剽窃 知识产权保护 信息检索 copy detection plagiarism intellectual property protection information retrieval
  • 相关文献

参考文献2

二级参考文献32

  • 1白雪生,徐光佑,JeseS.Jin.基于内容的图象检索及其相关技术的研究[J].机器人,1997,19(3):231-240. 被引量:26
  • 2丁险峰 孔维新 等.基于许瓦兹表示的形状检索[J].计算机工程与科学,1998,20(1):121-123.
  • 3[2]Griswold G N. A method for protecting copyright on networks. In: Proc of Joint Harvard MIT Workshop on Technology Strategies for Protecting Intellectual Property in the Networked Multimedia Environment. Cambridge, MA: MIT Press, 1993. 214~221
  • 4[3]Brassil J, Low S, Maxemchuk N et al. Document marking and identification using both line and word shifting. AT & T Bell Laboratories, Tech Rep: TR94.6.8, 1994
  • 5[4]JPEG. JPEG digital compression and coding of continuous still images. ISO, Draft, Tech Rep: ISO 10918, 1991
  • 6[5]Brin S, Davis J, Garciaolina H. Copy detection mechanisms for digital documents. In: Proc of the ACM SIGMOD Int'l Conf on Management of Data. San Francisco, CA: ACM Press, 1995. 398~409
  • 7[1]Popek G J, Kline C S. Encryption and secure computer networks. ACM Computing Surveys, 1979, 11(4): 331~356
  • 8Shen D G,Image Vision Computing J,1999年,17卷,7期,489页
  • 9Kong W X,Proceeding of Third Int Conference of Visual Information and Information System Amsterdam,1999年,277页
  • 10Liao Ming,Proceedings of Third Int Conference of Visual Information and Information System,1999年

共引文献66

同被引文献511

引证文献69

二级引证文献213

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部