{"title":"A Dual-Method Model for Copy Detection","authors":"Yunyi Liu, L. Liang","doi":"10.1109/WI-IATW.2006.11","DOIUrl":null,"url":null,"abstract":"Web technological advances have rendered readily accessible resources making the task of plagiarizing research work of others easier. A dual-method model for copy detection of copyrights violation is presented. One method is ranking while the other is fingerprinting. A prototype system was developed to test the applicability of the model for detecting duplicates on a collection of technical articles and research papers. Experiments were run to determine the effects of combining the two methods in various detecting strategies. Results reveal that combination of the two methods yields better results than employing each method individually","PeriodicalId":358971,"journal":{"name":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WI-IATW.2006.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Web technological advances have rendered readily accessible resources making the task of plagiarizing research work of others easier. A dual-method model for copy detection of copyrights violation is presented. One method is ranking while the other is fingerprinting. A prototype system was developed to test the applicability of the model for detecting duplicates on a collection of technical articles and research papers. Experiments were run to determine the effects of combining the two methods in various detecting strategies. Results reveal that combination of the two methods yields better results than employing each method individually