@@ -125,8+136,7 @@ input document must be highlighted. This poster presents methodology used during
The whole process is depicted at picture~\ref{fig:process}. The source retrieval task is divided into\r
2 subtasks: Quering and Selecting, during which the software utilizes given search engine. The retrieved\r
sources must be examined in detail in order to highlight as many plagiarism cases as possible. This process is depicted\r
The whole process is depicted at picture~\ref{fig:process}. The source retrieval task is divided into\r
2 subtasks: Quering and Selecting, during which the software utilizes given search engine. The retrieved\r
sources must be examined in detail in order to highlight as many plagiarism cases as possible. This process is depicted\r
-as Text Alignment.\r
-\r
+as Text Alignment. Results of this process are called {\em detections}, i.e.~passages of {\em source document} and {\em suspicious document}, which are similar enough to each other, and can serve as a basis for further manual examination for possible plagiarism.\r
%\r
\vfill\r
\columnbreak\r
%\r
\vfill\r
\columnbreak\r
@@ -225,32+235,32 @@ A profitable threshold is such that matches with the largest distance between th
\r
The system uses the same basic principles as in \cite{suchomel_kas_12}:\r
\r
\r
The system uses the same basic principles as in \cite{suchomel_kas_12}:\r
\r
-\begin{itemize}\r
+\begin{ytemize}\r
\item{\cemph{common features} between source and suspicious documents}\r
\item{\cemph{common features} between source and suspicious documents}\r