{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T16:13:51Z","timestamp":1770135231289,"version":"3.49.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030504168","type":"print"},{"value":"9783030504175","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50417-5_39","type":"book-chapter","created":{"date-parts":[[2020,6,18]],"date-time":"2020-06-18T20:09:52Z","timestamp":1592510992000},"page":"524-537","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Are n-gram Categories Helpful in Text Classification?"],"prefix":"10.1007","author":[{"given":"Jakub","family":"Kruczek","sequence":"first","affiliation":[]},{"given":"Paulina","family":"Kruczek","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5496-6287","authenticated-orcid":false,"given":"Marcin","family":"Kuta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,15]]},"reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1162\/tacl_a_00051","volume":"5","author":"P Bojanowski","year":"2017","unstructured":"Bojanowski, P., Grave, E., Joulin, A., Mikolov, T.: Enriching word vectors with subword information. Trans. Assoc. Comput. Linguist. 5, 135\u2013146 (2017)","journal-title":"Trans. Assoc. Comput. Linguist."},{"key":"39_CR2","unstructured":"Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings of 3rd Annual Symposium on Document Analysis and Information Retrieval, SDAIR-94, pp. 161\u2013175 (1994)"},{"key":"39_CR3","unstructured":"Escalante, H.J., Solorio, T., Montes-y-G\u00f3mez, M.: Local histograms of character n-grams for authorship attribution. In: Lin, D., Matsumoto, Y., Mihalcea, R. (eds.) The 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, pp. 288\u2013298 (2011)"},{"key":"39_CR4","unstructured":"Giannakopoulos, G., Karkaletsis, V.: N-gram graphs: representing documents and document sets in summary system evaluation. In: Proceedings of the Second Text Analysis Conference, TAC 2009. NIST (2009)"},{"key":"39_CR5","unstructured":"Jankowska, M., Milios, E.E., Keselj, V.: Author verification using common n-gram profiles of text documents. In: Hajic, J., Tsujii, J. (eds.) 25th International Conference on Computational Linguistics, COLING 2014, pp. 387\u2013397 (2014)"},{"issue":"6","key":"39_CR6","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1142\/S0218213007003692","volume":"16","author":"I Kanaris","year":"2007","unstructured":"Kanaris, I., Kanaris, K., Houvardas, I., Stamatatos, E.: Words versus character n-grams for anti-spam filtering. Int. J. Artif. Intell. Tools 16(6), 1047\u20131067 (2007)","journal-title":"Int. J. Artif. Intell. Tools"},{"issue":"1","key":"39_CR7","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"M Koppel","year":"2009","unstructured":"Koppel, M., Schler, J., Argamon, S.: Computational methods in authorship attribution. J. Am. Soc. Inf. Sci. Technol. 60(1), 9\u201326 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J., Zigdon, K.: Automatically determining an anonymous author\u2019s native language. In: Kantor, P.B., et al. (eds.) Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, pp. 209\u2013217 (2005)","DOI":"10.1007\/11427995_17"},{"key":"39_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/978-3-319-07176-3_44","volume-title":"Artificial Intelligence and Soft Computing","author":"M Kuta","year":"2014","unstructured":"Kuta, M., Kitowski, J.: Optimisation of character n-gram profiles method for intrinsic plagiarism detection. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2014. LNCS (LNAI), vol. 8468, pp. 500\u2013511. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07176-3_44"},{"key":"39_CR10","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/978-3-319-12027-0_8","volume-title":"Advances in Artificial Intelligence \u2013 IBERAMIA 2014","author":"S Maharjan","year":"2014","unstructured":"Maharjan, S., Shrestha, P., Solorio, T., Hasan, R.: A straightforward author profiling approach in MapReduce. In: Bazzan, A.L.C., Pichara, K. (eds.) IBERAMIA 2014. LNCS (LNAI), vol. 8864, pp. 95\u2013107. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-12027-0_8"},{"key":"39_CR11","unstructured":"Malmasi, S., Dras, M.: Language identification using classifier ensembles. In: Nakov, P., Zampieri, M., Osenova, P., Tan, L., Vertan, C., Ljube\u0161i\u0107, N., Tiedemann, J. (eds.) Proceedings of the Joint Workshop on Language Technology for Closely Related Languages, Varieties and Dialects, pp. 35\u201343. Association for Computational Linguistics (2015)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Peng, F., Schuurmans, D., Keselj, V., Wang, S.: Language independent authorship attribution with character level n-grams. In: 10th Conference of the European Chapter of the Association for Computational Linguistics, EACL 2003, pp. 267\u2013274 (2003)","DOI":"10.3115\/1067807.1067843"},{"key":"39_CR13","unstructured":"Rangel, F., Rosso, P., Koppel, M., Stamatatos, E., Inches, G.: Overview of the author profiling task at PAN 2013. In: Forner, P., Navigli, R., Tufis, D., Ferro, N. (eds.) Working Notes for CLEF 2013 Conference, vol. 1179 (2013)"},{"key":"39_CR14","unstructured":"Raschka, S.: Model evaluation, model selection, and algorithm selection in machine learning. CoRR abs\/1811.12808 (2018)"},{"key":"39_CR15","volume-title":"Python Machine Learning","author":"S Raschka","year":"2017","unstructured":"Raschka, S., Mirjalili, V.: Python Machine Learning, 2nd edn. Packt Publishing, Birmingham (2017)","edition":"2"},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Sapkota, U., Bethard, S., Montes-y-G\u00f3mez, M., Solorio, T.: Not all character n-grams are created equal: a study in authorship attribution. In: Mihalcea, R., Chai, J.Y., Sarkar, A. (eds.) NAACL HLT 2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp. 93\u2013102 (2015)","DOI":"10.3115\/v1\/N15-1010"},{"issue":"9","key":"39_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0073791","volume":"8","author":"HA Schwartz","year":"2013","unstructured":"Schwartz, H.A., et al.: Personality, gender, and age in the language of social media: the open-vocabulary approach. PLoS ONE 8(9), 1\u201316 (2013). https:\/\/doi.org\/10.1371\/journal.pone.0073791","journal-title":"PLoS ONE"},{"key":"39_CR18","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1007\/978-3-319-39378-0_53","volume-title":"Artificial Intelligence and Soft Computing","author":"P Semberecki","year":"2016","unstructured":"Semberecki, P., Maciejewski, H.: Distributed classification of text documents on Apache Spark platform. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2016. LNCS (LNAI), vol. 9692, pp. 621\u2013630. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39378-0_53"},{"key":"39_CR19","unstructured":"Stamatatos, E.: Intrinsic plagiarism detection using character n-gram profiles. In: Stein, B., Rosso, P., Stamatatos, E., Koppel, M., Agirre, E. (eds.) SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse, PAN 2009, pp. 38\u201346 (2009)"},{"key":"39_CR20","unstructured":"Wang, S.I., Manning, C.D.: Baselines and bigrams: simple, good sentiment and topic classification. In: Li, H., Lin, C.Y., Osborne, M., Lee, G.G., Park, J.C. (eds.) 50th Annual Meeting of the Association for Computational Linguistics, pp. 90\u201394 (2012)"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Wieting, J., Bansal, M., Gimpel, K., Livescu, K.: Charagram: embedding words and sentences via character n-grams. In: Su, J., Carreras, X., Duh, K. (eds.) Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing, EMNLP 2016, pp. 1504\u20131515 (2016)","DOI":"10.18653\/v1\/D16-1157"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2020"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50417-5_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T23:14:55Z","timestamp":1718666095000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50417-5_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030504168","9783030504175"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50417-5_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"230","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"98","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"248 workshop papers were selected from 489 submissions to the thematic tracks. The conference was canceled due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}