next up previous
Next: About this document Up: Scalable Document Fingerprinting (Extended Previous: Conclusion

References

1
C. Anderson, ``Robocops: Stewart and Feder's mechanized misconduct search'', Nature, 350(6318):454-455, April 1991.

2
S. Brin, J. Davis and H. Garcia-Molina, ``Copy Detection Mechanisms for Digital Documents'', Proceedings of the ACM SIGMOD Annual Conference, May 1995.

3
J. Brassil, S. Low, N. Maxemchuk and L. O'Gorman, ``Electronic Marking and Identification Techniques to Discourage Document Copying'', Journal on Selected Areas in Communications, Volume 13, Number 8, October 1995.

4
P. J. Denning, ``Plagiarism in the web'', Editorial, Communications of the ACM, 38(12), December 1995.

5
U. Manber, ``Finding similar files in a large file system'', Proceedings of the 1994 USENIX Conference, pp. 1-10, January 1994.

6
A. Parker and J. O. Hamblen, ``Computer algorithms for plagiarism detection'', IEEE Transactions on Education, 32(2):94-99, May 1989.

7
N. Shivakumar and H. Garcia-Molina, ``SCAM: A Copy Detection Mechanism for Digital Documents'', Proceedings of the 2nd International Conference on Theory and Practice of Digital Libraries, 1995.

8
N. Shivakumar and H. Garcia-Molina, ``The SCAM Approach to Copy Detection in Digital Libraries'', Diglib Magazine, November 1995.

9
N. Shivakumar and H. Garcia-Molina, ``Building a Scalable and Accurate Copy Detection Mechanism'', Proceedings of the 3nd International Conference on Theory and Practice of Digital Libraries, 1996.

10
N. R. Wagner, ``Fingerprinting,'' Proceedings of the 1983 Symposium on Security and Privacy, pp. 18-22, April 1983.

11
D. Wheeler ``Computer networks are said to offer new opportunities for plagiarists'', The Chronicle of Higher Education, pp. 17, 19, June 1993.


Nevin Heintze
Thu Oct 3 20:48:58 EDT 1996