I. Charon, L. Denoeud, and O. Hudry, Maximum of the transfer distance to a given partition, Math??matiques et sciences humaines, issue.179, pp.45-86, 2007.
DOI : 10.4000/msh.7403

H. W. Kuhn, The Hungarian method for the assignment problem, Naval Research Logistics Quarterly, vol.3, issue.1-2, pp.83-97, 1955.
DOI : 10.1002/nav.3800020109

. Levenshtein, Binary codes capable of correcting deletions, insertions, and reversals, Soviet Physics Doklady, vol.10, pp.707-710, 1966.

G. Malpohl and . Jplag, Detecting Software Plagiarism

S. Schleimer, D. S. Wilkerson, and E. A. Aiken, Winnowing, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.76-85, 2003.
DOI : 10.1145/872757.872770

T. Urvoy, T. Lavergne, and E. P. Filoche, Tracking web spam with hidden style similarity, AIRWeb Program, p.25, 2006.
DOI : 10.1145/1326561.1326564

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

G. Whale, Identification of Program Similarity in Large Populations, The Computer Journal, vol.33, issue.2, pp.140-146, 1990.
DOI : 10.1093/comjnl/33.2.140

M. J. Wise, YAP3 : Improved detection of similarities in computer program and other texts. Twenty-Seventh SIGCSE Technical Symposium, pp.130-134, 1996.

B. Zeidman, Detecting source-code plagiarism, Doctor Dobbs journal, vol.29, pp.57-60, 2004.