Typical implementation of similarity measures, duplicate detection strategies, cluster algorithms, and fusion.
| Version ▼ | Vulnerabilities | Repository | Usages | Date | |
|---|---|---|---|---|---|
2.2.x | 2.2.0 | Central | Mar 31, 2026 | ||
2.1.x | 2.1.2 | Central | Mar 03, 2026 | ||
| 2.1.1 | Central | Jan 29, 2024 | |||
| 2.1.0 | Central | Sep 28, 2021 | |||
2.0.x | 2.0.3 | Central | Nov 06, 2019 | ||
| 2.0.2 | Central | Oct 07, 2019 | |||
| 2.0.0 | Central | Mar 21, 2019 | |||
1.1.x | 1.1.0 | Central | Feb 12, 2019 | ||
1.0.x | 1.0.1 | Central | Jan 11, 2019 | ||
| 1.0.0 | Central | Dec 17, 2018 |
