期刊文献+

抄袭论文识别研究与进展 被引量:36

Study and progress of plagiarism-identification of scientific papers
在线阅读 下载PDF
导出
摘要 抄袭论文识别研究对于净化学术风气、保护知识产权具有重要意义.国外对于抄袭论文(英文)识别技术与系统的研究已有多年历史,并取得一定进展,而国内发表的相关文献尚少.综述了抄袭论文识别技术,如数字指纹和词频统计等技术;介绍了相关识别系统,如siff、COPS、dSCAM、KOALA和Check等;分析了各抄袭识别技术特点及应用范围.最后结合中文学术论文的特点,从应用角度出发,讨论了若干待解决的关键问题及发展趋势. Study of the methods for identifying plagiarism papers is important to encourage academic honesty and protect intellectual property rights. Many plagiarism-identification methods and systems about English papers have been studied for several years and some progress has been made. But little work has been done in China. This paper summarizes the current identification techniques (including fingerprinting, word-frequency, etc.), introduces correlative systems (e.g. siff, COPS, dSCAM, KOALA and Check), and analyzes their characteristics and application coverage. Lastly, in combination with characteristics of Chinese papers, plagiarism identification methods of Chinese papers are also discussed from the viewpoint of application.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2005年第1期50-57,共8页 Journal of Dalian University of Technology
基金 国家自然科学基金资助项目(50275019 60073036)派生研究.
关键词 学术论文 知识产权 识别 数字指纹 词频 论文抄袭行为 Applications Copyrights Identification (control systems) Image processing Internet Statistical methods Word processing World Wide Web
  • 相关文献

参考文献30

  • 1[1]DONALD L M C. CAI research [EB/OL]. http:∥www.academicintegrity.org/cairesearch.asp., 2004-07-01.
  • 2[2]OTTENSTEIN K J. An algorithmic approach to the detection and prevention of plagiarism [J]. ACM SIGCSE Bull, 1976,8(4): 30-41.
  • 3[3]CLOUGH P. Plagiarism in natural and programming languages: An overview of current tools and technologies [A]. Research Memoranda: CS-00-05 [R]. Sheffield: Department of Computer Science, University of Sheffield, 2000. 1-31.
  • 4宋擒豹,杨向荣,沈钧毅,齐勇.数字商品非法复制的检测算法[J].计算机学报,2002,25(11):1206-1211. 被引量:16
  • 5[5]BRODER A Z. On the resemblance and containment of documents [A]. Proceedings of Compression and Complexity of SEQUENCES [C]. Salerno: IEEE Computer Society, 1998. 21-29.
  • 6[6]MANDER U. Finding similar files in a large file system [A]. Proceedings of the USENIX Winter 1994 Technical Conference [C]. San Francisco: The Advanced Computing Systems Association, 1994. 1-10.
  • 7[7]MANDER U, BAKER B S. Deducing similarities in Java sources from bytecode [A]. USENIX 1998 Annual Technical Conference [C]. New Orleans: The Advanced Computing Systems Association, 1998. 179-190.
  • 8[8]BRIN S, DAVIS J, GARCIA-MOLINA H. Copy detection mechanisms for digital documents [A]. Proceedings of the ACM SIGMOD Annual Conference [C]. San Francisco: ACM Press, 1995. 398-409.
  • 9[9]SHIVAKUMAR N, GARCIA-MOLINA H. SCAM: a copy detection mechanism for digital documents [A]. Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries [C]. Austin: Texas A & M University, 1995. 201-210.
  • 10[10]SHIVAKUMAR N, GARCIA-MOLINA H. Building a scalable and accurate copy detection mechanism [A]. Proceedings of the 1st ACM Conference on Digital Libraries [C]. Bethesda: ACM Press, 1996. 160-168.

二级参考文献9

共引文献49

同被引文献294

引证文献36

二级引证文献164

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部