{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:15:23Z","timestamp":1759961723389,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030007935"},{"type":"electronic","value":"9783030007942"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00794-2_7","type":"book-chapter","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T19:50:24Z","timestamp":1536349824000},"page":"67-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Lexical Stress-Based Authorship Attribution with Accurate Pronunciation Patterns Selection"],"prefix":"10.1007","author":[{"given":"Lubomir","family":"Ivanov","sequence":"first","affiliation":[]},{"given":"Amanda","family":"Aebig","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Meerman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,8]]},"reference":[{"key":"7_CR1","first-page":"169","volume":"128","author":"AQ Morton","year":"1965","unstructured":"Morton, A.Q.: The authorship of greek prose. J. R. Stat. Soc. (A) 128, 169\u2013233 (1965)","journal-title":"J. R. Stat. Soc. (A)"},{"issue":"2","key":"7_CR2","first-page":"9","volume":"16","author":"JNG Binongo","year":"2003","unstructured":"Binongo, J.N.G.: Who wrote the 15th book of Oz? An application of multivariate statistics to authorship attribution. Comput. Linguist. 16(2), 9\u201317 (2003)","journal-title":"Comput. Linguist."},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1093\/llc\/6.4.274","volume":"6","author":"C Barquist","year":"1991","unstructured":"Barquist, C., Shie, D.: Computer analysis of alliteration in beowulf using distinctive feature theory. Lit. Linguist. Computing. 6(4), 274\u2013280 (1991). https:\/\/doi.org\/10.1093\/llc\/6.4.274","journal-title":"Lit. Linguist. Computing."},{"issue":"4","key":"7_CR4","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1093\/llc\/8.4.203","volume":"8","author":"R Matthews","year":"1993","unstructured":"Matthews, R., Merriam, T.: Neural computation in stylometry: an application to the works of Shakespeare and Fletcher. Lit. Linguist. Comput. 8(4), 203\u2013209 (1993)","journal-title":"Lit. Linguist. Comput."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/BF01829876","volume":"29","author":"D Lowe","year":"1995","unstructured":"Lowe, D., Matthews, R.: Shakespeare vs. Fletcher: a stylometric analysis by radial basis functions. Comput. Humanit. 29, 449\u2013461 (1995)","journal-title":"Comput. Humanit."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF02259614","volume":"19","author":"MWA Smith","year":"1985","unstructured":"Smith, M.W.A.: An investigation of Morton\u2019s method to distinguish Elizabethan Playwrights. Comput. Humanit. 19, 3\u201321 (1985)","journal-title":"Comput. Humanit."},{"key":"7_CR7","volume-title":"Computation into Criticism: A Study of Jane Austen\u2019s Novels and an Experiment in Method","author":"J Burrows","year":"1987","unstructured":"Burrows, J.: Computation into Criticism: A Study of Jane Austen\u2019s Novels and an Experiment in Method. Clarendon Press, Oxford (1987)"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"91","DOI":"10.2307\/2982671","volume":"155","author":"DI Holmes","year":"1992","unstructured":"Holmes, D.I.: A stylometric analysis of mormon scripture and related texts. J. Roy. Stat. Soc.: Ser. A: Appl. Stat. 155(1), 91\u2013120 (1992)","journal-title":"J. Roy. Stat. Soc.: Ser. A: Appl. Stat."},{"key":"7_CR9","unstructured":"Mosteller, F, Wallace, D.: Inference and disputed authorship: the Federalist: AWL (1964)"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1057\/9781137589996_3","volume-title":"New Directions in Thomas Paine Studies","author":"G Berton","year":"2016","unstructured":"Berton, G., Petrovic, S., Ivanov, L., Schiaffino, R.: Examining the Thomas Paine corpus: automated computer authorship attribution methodology applied to Thomas Paine\u2019s writings. In: Cleary, S., Stabell, I.L. (eds.) New Directions in Thomas Paine Studies, pp. 31\u201347. Palgrave Macmillan US, New York (2016). https:\/\/doi.org\/10.1057\/9781137589996_3"},{"issue":"3","key":"7_CR11","first-page":"1","volume":"11","author":"S Petrovic","year":"2015","unstructured":"Petrovic, S., Berton, G., Campbell, S., Ivanov, L.: Attribution of 18th century political writings using machine learning. J. of Technol. Soci. 11(3), 1\u201313 (2015)","journal-title":"J. of Technol. Soci."},{"key":"7_CR12","unstructured":"Petrovic, S., Berton, G., Schiaffino, R., Ivanov, L.: Authorship attribution of Thomas Paine works. In: International Conference on Data Mining, DMIN 2014, pp. 183\u2013189. CSREA Press (2014). ISBN: 1-60132-267-4"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing style features and classification techniques. J. Am. Soc. Inf. Sci. Technol. 57(3), 378\u2013393 (2006)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Argamon, S., Saric, M., Stein, S.: Style mining of electronic messages for multiple authorship discrimination. In: Proceedings of the 9th ACM SIGKDD, pp. 475\u2013480 (2003)","DOI":"10.1145\/956750.956805"},{"issue":"4","key":"7_CR15","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O de Vel","year":"2001","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.M.: Mining e-mail content for author identification forensics. SIGMOD Rec. 30(4), 55\u201364 (2001)","journal-title":"SIGMOD Rec."},{"issue":"2","key":"7_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.2989\/16073614.2010.519111","volume":"28","author":"E Kotz\u00e9","year":"2010","unstructured":"Kotz\u00e9, E.: Author identification from opposing perspectives in forensic linguistics. South. Afr. Linguist. Appl. Lang. Stud. 28(2), 185\u2013197 (2010)","journal-title":"South. Afr. Linguist. Appl. Lang. Stud."},{"issue":"5","key":"7_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67\u201375 (2005)","journal-title":"IEEE Intell. Syst."},{"key":"7_CR18","unstructured":"Dumalus, A., Fernandez, P.: Authorship attribution using writer\u2019s rhythm based on lexical stress. In: 11th Philippine Computing Science Congress, Naga City, Philippines (2011)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-45510-5_28","volume-title":"Text, Speech, and Dialogue","author":"L Ivanov","year":"2016","unstructured":"Ivanov, L.: Using alliteration in authorship attribution of historical texts. In: Sojka, P., Hor\u00e1k, A., Kope\u010dek, I., Pala, K. (eds.) TSD 2016. LNCS (LNAI), vol. 9924, pp. 239\u2013248. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45510-5_28"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-319-24033-6_12","volume":"9302","author":"L Ivanov","year":"2015","unstructured":"Ivanov, L., Petrovic, S.: Using lexical stress in authorship attribution of historical texts. Chapter, Lecture Notes in Computer Science: TSD 9302, 105\u2013113 (2015). https:\/\/doi.org\/10.1007\/978-3-319-24033-6_12","journal-title":"Chapter, Lecture Notes in Computer Science: TSD"},{"key":"7_CR21","unstructured":"Internet resource. http:\/\/www.speech.cs.cmu.edu\/cgi-bin\/cmudict"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1017\/CHOL9780521264792.003","volume-title":"The Cambridge History of English Language","author":"JH Fischer","year":"2001","unstructured":"Fischer, J.H.: British and American, continuity and divergence. In: Algeo, J. (ed.) The Cambridge History of English Language, pp. 59\u201385. Cambridge University Press, Cambridge (2001)"},{"key":"7_CR23","unstructured":"Scotto Di Carlo, G.: Lexical differences between American and British english: a survey study. Lang. Des.: J. Theor. Exp. Linguist. 15, 61-75 (2013)"},{"issue":"1","key":"7_CR24","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Klein D., Manning C.: Feature-rich part-of-speech tagging with a cyclic dependency network. In: HLT-NAACL, pp. 252\u2013259 (2003)","DOI":"10.3115\/1073445.1073478"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Toutanova, K., Manning, D.: Enriching the knowledge sources used in a maximum entropy part-of-speech tagger. In: EMNLP\/VLC-2000, pp. 63\u201370 (2000)","DOI":"10.3115\/1117794.1117802"}],"container-title":["Lecture Notes in Computer Science","Text, Speech, and Dialogue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00794-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:32:38Z","timestamp":1709829158000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-00794-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030007935","9783030007942"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00794-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}