Maximum of the transfer distance to a given partition, Math??matiques et sciences humaines, issue.179, pp.45-86, 2007. ,
DOI : 10.4000/msh.7403
The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955. ,
DOI : 10.1002/nav.3800020109
Binary codes capable of correcting deletions, insertions, and reversals, Soviet Physics Doklady, vol.10, pp.707-710, 1966. ,
Detecting Software Plagiarism ,
Winnowing, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.76-85, 2003. ,
DOI : 10.1145/872757.872770
Tracking web spam with hidden style similarity, AIRWeb Program, p.25, 2006. ,
DOI : 10.1145/1326561.1326564
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.527.163
Identification of Program Similarity in Large Populations, The Computer Journal, vol.33, issue.2, pp.140-146, 1990. ,
DOI : 10.1093/comjnl/33.2.140
YAP3 : Improved detection of similarities in computer program and other texts. Twenty-Seventh SIGCSE Technical Symposium, pp.130-134, 1996. ,
Detecting source-code plagiarism, Doctor Dobbs journal, vol.29, pp.57-60, 2004. ,