{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:39:45Z","timestamp":1742805585567,"version":"3.37.3"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:00:00Z","timestamp":1628121600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T00:00:00Z","timestamp":1628121600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s10270-021-00915-9","type":"journal-article","created":{"date-parts":[[2021,8,5]],"date-time":"2021-08-05T15:03:26Z","timestamp":1628175806000},"page":"337-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Efficient model similarity estimation with robust hashing"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3978-9876","authenticated-orcid":false,"given":"Salvador","family":"Mart\u00ednez","sequence":"first","affiliation":[]},{"given":"S\u00e9bastien","family":"G\u00e9rard","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Cabot","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,5]]},"reference":[{"key":"915_CR1","unstructured":"Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In Proceedings International Conference on Information Technology: Coding and Computing, 2000., pp. 178\u2013183. IEEE, (2000)"},{"issue":"5","key":"915_CR2","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.dsp.2012.04.015","volume":"22","author":"S-H Lee","year":"2012","unstructured":"Lee, S.-H., Kwon, K.-R.: Robust 3D mesh model hashing based on feature object. Digit. Sign. Process. 22(5), 744\u2013759 (2012)","journal-title":"Digit. Sign. Process."},{"key":"915_CR3","doi-asserted-by":"crossref","unstructured":"Steinebach, M., Kl\u00f6ckner, P., Reimers, N., Wienand, D., Wolf, P.: Robust Hash Algorithms for Text. In IFIP International Conference on Communications and Multimedia Security, pp. 135\u2013144. Springer Berlin Heidelberg, Berlin, Heidelberg, (2013). ISBN 978-3-642-40779-6","DOI":"10.1007\/978-3-642-40779-6_11"},{"key":"915_CR4","doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 message-digest algorithm. (1992)","DOI":"10.17487\/rfc1321"},{"key":"915_CR5","doi-asserted-by":"crossref","unstructured":"Eastlake, D., Jones, P.: Us secure hash algorithm 1 (SHA1). Technical report, 2001","DOI":"10.17487\/rfc3174"},{"issue":"5","key":"915_CR6","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1038\/scientificamerican0573-15","volume":"228","author":"H Feistel","year":"1973","unstructured":"Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15\u201323 (1973)","journal-title":"Sci. Am."},{"key":"915_CR7","unstructured":"Broder, A. Z.: On the resemblance and containment of documents. In Proceedings on Compression and Complexity of Sequences 1997., pp. 21\u201329. IEEE, (1997)"},{"key":"915_CR8","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, S., G\u00e9rard, S., Cabot, J.: Robust hashing for models. In Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems, pages 312\u2013322, (2018)","DOI":"10.1145\/3239372.3239405"},{"key":"915_CR9","unstructured":"Steinberg, D., Budinsky, F., Paternosto, M., Merks, E.:EMF: Eclipse Modeling Framework 2.0. Addison-Wesley Professional, 2nd edition, 2009. ISBN 0321331885"},{"issue":"3","key":"915_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5381\/jot.2019.18.3.a3","volume":"18","author":"E Syriani","year":"2019","unstructured":"Syriani, E., Bill, R., Wimmer, M.: Domain-specific model distance measures. J. Object Technol. 18(3), 1\u201319 (2019)","journal-title":"J. Object Technol."},{"issue":"2","key":"915_CR11","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10270-005-0079-0","volume":"4","author":"Jean B\u00e9zivin","year":"2005","unstructured":"B\u00e9zivin, Jean: On the unification power of models. Softw. Syst. Model. 4(2), 171\u2013188 (2005)","journal-title":"Softw. Syst. Model."},{"issue":"11","key":"915_CR12","first-page":"1","volume":"10","author":"K Lano","year":"2011","unstructured":"Lano, K., Rahimi, S.K.: Slicing techniques for UML models. J. Object Technol. 10(11), 1\u201349 (2011)","journal-title":"J. Object Technol."},{"key":"915_CR13","doi-asserted-by":"crossref","unstructured":"Blouin, A., Combemale, B., Baudry, B., Beaudoux, O.: Modeling model slicers. In International Conference on Model Driven Engineering Languages and Systems, pages 62\u201376. Springer, (2011)","DOI":"10.1007\/978-3-642-24485-8_6"},{"key":"915_CR14","doi-asserted-by":"crossref","unstructured":"Struber, D., Rubin, J., Taentzer, G., Chechik, M.: Splitting models using information retrieval and model crawling techniques. In International Conference on Fundamental Approaches to Software Engineering, pages 47\u201362. Springer, (2014)","DOI":"10.1007\/978-3-642-54804-8_4"},{"key":"915_CR15","doi-asserted-by":"crossref","unstructured":"Brottier, E., Fleurey, F., Steel, J., Baudry, B., Le\u00a0Traon, Y.: Metamodel-based test generation for model transformations: an algorithm and a tool. In Software R eliability Engineering, 2006. ISSRE\u201906. 17th International Symposium on, pp. 85\u201394. IEEE, (2006)","DOI":"10.1109\/ISSRE.2006.27"},{"key":"915_CR16","doi-asserted-by":"crossref","unstructured":"Scheidgen, M.: Reference representation techniques for large models. In Proceedings of the Workshop on Scalability in Model Driven Engineering, p\u00a05. ACM, (2013)","DOI":"10.1145\/2487766.2487769"},{"key":"915_CR17","unstructured":"Reddy, R., France, R., Ghosh, S., Fleurey, F., Baudry, B.: Model composition-a signature-based approach. In Aspect Oriented Modeling (AOM) Workshop, (2005)"},{"key":"915_CR18","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Rajaraman, A., Ullman, J.\u00a0D.: Mining of massive datasets. Cambridge university press, (2014)","DOI":"10.1017\/CBO9781139924801"},{"key":"915_CR19","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In Proceedings of the 6th ACM conference on Computer and communications security, pp. 28\u201336. ACM, (1999)","DOI":"10.1145\/319709.319714"},{"key":"915_CR20","doi-asserted-by":"crossref","unstructured":"Jouault, F., Allilaire, F., B\u00e9zivin, J., Kurtev, I.: Atl: A model transformation tool. Sci. Comput. Program. 72(1\u20132), 31\u201339 (2008)","DOI":"10.1016\/j.scico.2007.08.002"},{"key":"915_CR21","unstructured":"Troya, J., Fleck, M., Kessentini, M., Wimmer, M., Alkhaze, B.: Rules and helpers dependencies in atl\u2013technical report. Universidad de Sevilla, (2016)"},{"key":"915_CR22","doi-asserted-by":"crossref","unstructured":"Kehrer, T., Kelter, U., Pietsch, P., Schmidt, M.: Adaptability of model comparison tools. In 2012 Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 306\u2013309. IEEE, (2012)","DOI":"10.1145\/2351676.2351731"},{"key":"915_CR23","doi-asserted-by":"crossref","unstructured":"Kinneer, C., Herzig, S. J. I.: Dissimilarity measures for clustering space mission architectures. In Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems, pp. 392\u2013402, (2018)","DOI":"10.1145\/3239372.3239390"},{"issue":"1","key":"915_CR24","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10009-019-00530-6","volume":"22","author":"Oszk\u00e1r Semer\u00e1th","year":"2020","unstructured":"Semer\u00e1th, Oszk\u00e1r, Farkas, Rebeka, Bergmann, G\u00e1bor, Varr\u00f3, D\u00e1niel: Diversity of graph models and graph generators in mutation testing. Int. J. Softw. Tools Technol. Transf. 22(1), 57\u201378 (2020)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"915_CR25","doi-asserted-by":"crossref","unstructured":"Kolovos, D.\u00a0S., Di\u00a0Ruscio, D., Pierantonio, A., Paige, R.\u00a0F.: Different models for model matching: An analysis of approaches to support model differencing. In 2009 ICSE Workshop on Comparison and Versioning of Software Models, pp. 1\u20136. IEEE, (2009)","DOI":"10.1109\/CVSM.2009.5071714"},{"issue":"2","key":"915_CR26","first-page":"29","volume":"9","author":"C\u00e9dric Brun","year":"2008","unstructured":"Brun, C\u00e9dric, Pierantonio, Alfonso: Model differences in the eclipse modeling framework. UPGRADE, Eur J Inf Prof 9(2), 29\u201334 (2008)","journal-title":"UPGRADE, Eur J Inf Prof"},{"key":"915_CR27","unstructured":"Ferdjoukh,Adel., Galinier,Florian., Bourreau,Eric., Chateau,Annie., Nebut,Cl\u00e9mentine. :Measuring differences to compare sets of models and improve diversity in mde. In ICSEA: International Conference on Software Engineering Advances, (2017)"},{"key":"915_CR28","unstructured":"Ferdjoukh, A., Galinier, F., Bourreau, E., Chateau, A., Nebut, C.: Measurement and generation of diversity and meaningfulness in model driven engineering. (2018)"},{"key":"915_CR29","unstructured":"Toulm\u00e9, A., Inc, I.:Presentation of EMF compare utility. In Eclipse Modeling Symposium, pages 1\u20138, (2006)"},{"key":"915_CR30","doi-asserted-by":"crossref","unstructured":"Wachsmuth, G.: Metamodel adaptation and model co-adaptation. In European Conference on Object-Oriented Programming, pages 600\u2013624. Springer, (2007)","DOI":"10.1007\/978-3-540-73589-2_28"},{"key":"915_CR31","unstructured":"Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Garrett, J., Thomason, C., Nordstrom, G., Sprinkle, J., Volgyesi, P.: The generic modeling environment. In Workshop on Intelligent Signal Processing, Budapest, Hungary, volume\u00a017, page\u00a01, (2001)"},{"key":"915_CR32","doi-asserted-by":"crossref","unstructured":"L\u00f3pez, J. A. H., Cuadrado, J. S.: Mar: a structure-based search engine for models. In Proceedings of the 23rd ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems, pp. 57\u201367, (2020)","DOI":"10.1145\/3365438.3410947"},{"key":"915_CR33","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/08993408.2020.1711495","volume":"30","author":"S Mart\u00ednez","year":"2020","unstructured":"Mart\u00ednez, S., Wimmer, M., Cabot, J.: Efficient plagiarism detection for software modeling assignments. Comput. Sci. Edu. 30, 187\u2013215 (2020)","journal-title":"Comput. Sci. Edu."},{"key":"915_CR34","unstructured":"Basciani, F., Di\u00a0Rocco,J., Di\u00a0Ruscio, D., Di\u00a0Salle, A., Iovino, L., Pierantonio, A.: Mdeforge: an extensible web-based modeling platform. In CloudMDE@ MoDELS, 1242, 66\u201375 (2014)"},{"key":"915_CR35","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.scico.2018.04.002","volume":"163","author":"D Wille","year":"2018","unstructured":"Wille, D., Babur, \u00d6., Cleophas, L., van den Seidl, C., Brand, M., Schaefer, I.: Improving custom-tailored variability mining using outlier and cluster detection. Sci. Comput. Program. 163, 62\u201384 (2018)","journal-title":"Sci. Comput. Program."},{"key":"915_CR36","unstructured":"O\u00a0Constant. Emf diff\/merge, (2012)"},{"key":"915_CR37","doi-asserted-by":"crossref","unstructured":"Kolovos, D. S.: Establishing correspondences between models with the epsilon comparison language. In European Conference on Model Driven Architecture-Foundations and Applications, pp. 146\u2013157. Springer, (2009)","DOI":"10.1007\/978-3-642-02674-4_11"},{"key":"915_CR38","doi-asserted-by":"crossref","unstructured":"Falleri, J., Huchard, M., Lafourcade, M., Nebut, C.: Metamodel matching for automatic model transformation generation. In International Conference on Model Driven Engineering Languages and Systems, pp. 326\u2013340. Springer, (2008)","DOI":"10.1007\/978-3-540-87875-9_24"},{"key":"915_CR39","doi-asserted-by":"publisher","first-page":"29715","DOI":"10.1109\/ACCESS.2018.2841020","volume":"6","author":"S Mart\u00ednez","year":"2018","unstructured":"Mart\u00ednez, S., G\u00e9rard, S., Cabot, J.: On watermarking for collaborative model-driven engineering. IEEE Access 6, 29715\u201329728 (2018)","journal-title":"IEEE Access"},{"key":"915_CR40","unstructured":"Papi, F. G., H\u00fcbner, J. F., de\u00a0Brito, M.: Instrumenting accountability in MAS with blockchain. Accountability and Responsibility in Multiagent Systems, p 20"},{"key":"915_CR41","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. arXiv preprint arXiv:1706.04507, (2017)","DOI":"10.1145\/3098954.3098958"},{"issue":"1","key":"915_CR42","doi-asserted-by":"publisher","first-page":"1995","DOI":"10.1186\/s40064-016-3639-6","volume":"5","author":"RK Karsh","year":"2016","unstructured":"Karsh, R.K., Laskar, R.H., Richhariya, B.B.: Robust image hashing using ring partition-PGNMF and local features. SpringerPlus 5(1), 1995 (2016)","journal-title":"SpringerPlus"},{"issue":"4","key":"915_CR43","first-page":"1072","volume":"22","author":"YuLing Liu","year":"2013","unstructured":"Liu, YuLing, Xiao, Yong: A robust image hashing algorithm resistant against geometrical attacks. Radio Eng. 22(4), 1072\u20131081 (2013)","journal-title":"Radio Eng."},{"issue":"2","key":"915_CR44","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TIFS.2006.873601","volume":"1","author":"Ashwin Swaminathan","year":"2006","unstructured":"Swaminathan, Ashwin, Mao, Yinian, Min, Wu: Robust and secure image hashing. IEEE Trans. Inf. Forens. Secur. 1(2), 215\u2013230 (2006)","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"915_CR45","unstructured":"Venkatesan, R., Koon, S-M., Jakubowski, M. H., Moulin, P.: Robust image hashing. In Proceedings 2000 International Conference on Image Processing 2000, vol. 3, pp. 664\u2013666. IEEE, (2000)"},{"issue":"5","key":"915_CR46","doi-asserted-by":"publisher","first-page":"9409","DOI":"10.1016\/j.eswa.2008.12.062","volume":"36","author":"K Tarmissi","year":"2009","unstructured":"Tarmissi, K., Hamza, A.B.: Information-theoretic hashing of 3D objects using spectral graph theory. Exp. Syst. Appl. 36(5), 9409\u20139414 (2009)","journal-title":"Exp. Syst. Appl."},{"key":"915_CR47","unstructured":"Coskun, B., Sankur, B.: Robust video hash extraction. In 2004 12th European Signal Processing Conference, pp. 2295\u20132298. IEEE, (2004)"},{"issue":"10","key":"915_CR48","doi-asserted-by":"publisher","first-page":"4020","DOI":"10.1109\/TSP.2005.855414","volume":"53","author":"Cedric De Roover","year":"2005","unstructured":"De Roover, Cedric, De Vleeschouwer, Christophe, Lefebvre, Fr\u00e9d\u00e9ric, Macq, Benoit: Robust video hashing based on radial projections of key frames. IEEE Trans. Sign. Process. 53(10), 4020\u20134037 (2005)","journal-title":"IEEE Trans. Sign. Process."},{"key":"915_CR49","unstructured":"Michael C.: Locality-sensitive hashing for massive string-based ontology matching. In Proceedings of the IEEE\/WIC\/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp. 134\u2013140. IEEE, 2014"},{"key":"915_CR50","doi-asserted-by":"crossref","unstructured":"Noyrit, F., G\u00e9rard, S., Terrier, F.: Computer assisted integration of domain-specific modeling languages using text analysis techniques. In International Conference on Model Driven Engineering Languages and Systems, pp. 505\u2013521. Springer, (2013)","DOI":"10.1007\/978-3-642-41533-3_31"},{"key":"915_CR51","doi-asserted-by":"crossref","unstructured":"Babur, \u00d6., Cleophas, L.: Using n-grams for the automated clustering of structural models. In International Conference on Current Trends in Theory and Practice of Informatics, pp. 510\u2013524. Springer, (2017)","DOI":"10.1007\/978-3-319-51963-0_40"},{"key":"915_CR52","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.cola.2018.12.002","volume":"51","author":"\u00d6nder Babur","year":"2019","unstructured":"Babur, \u00d6nder, Cleophas, Loek, van den Brand, Mark: Metamodel clone detection with SAMOS. J. Comput. Lang. 51, 57\u201374 (2019)","journal-title":"J. Comput. Lang."},{"key":"915_CR53","unstructured":"Cavnar, WB., Trenkle, JM.: N-gram-based text categorization. In Proceedings of the 3rd Symposium on Document Analysis and Information Retrieval (SDAIR), (1994)"},{"key":"915_CR54","unstructured":"B\u00e9zivin, J., Jouault, F., Valduriez, P.: On the need for megamodels. In Proceedings of the OOPSLA\/GPCE: Best Practices for Model-Driven Software Development workshop, 19th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, (2004)"},{"issue":"7","key":"915_CR55","doi-asserted-by":"publisher","first-page":"1225","DOI":"10.1109\/TCYB.2013.2289351","volume":"44","author":"Jingkuan Song","year":"2014","unstructured":"Song, Jingkuan, Yang, Yi, Li, Xuelong, Huang, Zi, Yang, Yang: Robust hashing with local models for approximate similarity search. IEEE Trans. Cybern. 44(7), 1225\u20131236 (2014)","journal-title":"IEEE Trans. Cybern."},{"key":"915_CR56","doi-asserted-by":"crossref","unstructured":"Pietsch, C., Ohrndorf, M., Kelter, U., Kehrer, T.: Incrementally slicing editable submodels. In 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 913\u2013918. IEEE, (2017)","DOI":"10.1109\/ASE.2017.8115704"},{"key":"915_CR57","doi-asserted-by":"crossref","unstructured":"Taentzer, G., Kehrer, T., Pietsch, C., Kelter, U.: A formal framework for incremental model slicing. In International Conference on Fundamental Approaches to Software Engineering. Springer, Cham pp. 3\u201320 (2018)","DOI":"10.1007\/978-3-319-89363-1_1"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-021-00915-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-021-00915-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-021-00915-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T06:09:50Z","timestamp":1644991790000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-021-00915-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,5]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["915"],"URL":"https:\/\/doi.org\/10.1007\/s10270-021-00915-9","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"type":"print","value":"1619-1366"},{"type":"electronic","value":"1619-1374"}],"subject":[],"published":{"date-parts":[[2021,8,5]]},"assertion":[{"value":"27 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 July 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}