{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T20:10:07Z","timestamp":1746389407526,"version":"3.40.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319105086"},{"type":"electronic","value":"9783319105093"}],"license":[{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T00:00:00Z","timestamp":1411430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-10509-3_2","type":"book-chapter","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T23:45:02Z","timestamp":1411515902000},"page":"15-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Insult Detection in Social Network Comments Using Possibilistic Based Fusion Approach"],"prefix":"10.1007","author":[{"given":"Mohamed Maher","family":"Ben Ismail","sequence":"first","affiliation":[]},{"given":"Ouiem","family":"Bchir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,23]]},"reference":[{"key":"2_CR1","unstructured":"Spertus, E., Smokey: Automatic recognition of hostile messages. In: Proceedings of the Ninth Conference on Innovative Applications of Artificial Intelligence, pp. 1058\u20131065 (1997)"},{"key":"2_CR2","unstructured":"Mahmud, A., Ahmed, K.Z., Khan, M, Detecting flames and insults in text. In: Proceedings of the Sixth International Conference on Natural Language Processing (2008)"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Razavi, A.H., Inkpen, D., Uritsky, S., Matwin, S., Offensive language detection using multi-level classification. In: Proceedings of the 23rd Canadian Conference on Artificial Intelligence, pp. 16\u201327 (2010)","DOI":"10.1007\/978-3-642-13059-5_5"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Xiang, G., Hong, J., & Ros\u00e9, C. P. , Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus, Proceedings of The 21st ACM Conference on Information and Knowledge Management, Sheraton, Maui Hawaii, October 29\u2013November 2, (2012)","DOI":"10.1145\/2396761.2398556"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Xiang, G., Fan, B., Wang, L., Jason I., Carolyn, H., Rose, P., Detecting Offensive Tweets via Topical Feature Discovery over a Large Scale Twitter Corpus, Proceeding of the 21st ACM international conference on Information and knowledge management (CIKM \u201912), pp. 1980\u20131984 (2012)","DOI":"10.1145\/2396761.2398556"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Namburu, S.M., Tu,H., Luo, J., Pattipati, K.R., Experiments on Supervised Learning Algorithms for Text Categorization. International Conference, IEEE Computer Society, pp.1\u20138 (2005)","DOI":"10.1109\/AERO.2005.1559612"},{"key":"2_CR7","volume-title":"Mining Text Data","author":"B Liu","year":"2011","unstructured":"Liu, B., Zhang, L.: A survey of opinion mining and sentiment analysis. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data. Springer, Berlin (2011)"},{"issue":"2","key":"2_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0306-4573(96)00063-5","volume":"33","author":"D Lewis","year":"1997","unstructured":"Lewis, D., Knowles, K.: Threading electronic mail: a preliminary study. Inf. Process. Manag. 33(2), 209\u2013217 (1997)","journal-title":"Inf. Process. Manag."},{"key":"2_CR9","unstructured":"Cohen, W., Learning rules that classify e-mail. AAAI Conference (1996)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"de Carvalho, V.R., Cohen, W., On the collective classification of email \u201cspeech acts\u201d, ACM SIGIR Conference (2005)","DOI":"10.1145\/1076034.1076094"},{"key":"2_CR11","unstructured":"Sahami, M., Dumais, S., Heckerman, D., Horvitz, E., A Bayesian approach to filtering junk e-mail. AAAI Workshop on Learning for Text Categorization. Technical Representation WS-98-05, AAAI Press. http:\/\/robotics.stanford.edu\/users\/sahami\/papers.html"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1080\/08839510601170887","volume":"21","author":"Y Bi","year":"2007","unstructured":"Bi, Y., Bell, D., Wang, H., Guo, G., Guan, J.: Combining multiple classifiers using dempster\u2019s rule for text categorization. Appl. Artif. Intell. 21(3), 211\u2013239 (2007)","journal-title":"Appl. Artif. Intell."},{"key":"2_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers","author":"LI Kuncheva","year":"2004","unstructured":"Kuncheva, L.I.: Combining Pattern Classifiers. Wiley, New York (2004)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Sirlantzis, K., Hoque,S., Fairhurst, M. C., Trainable multiple classifier schemes for handwritten character recognition. In: Proceedings of the 3rd International Workshop on Multiple Classifier Systems, pp. 319\u2013322, Cagliari, Italy (2002)","DOI":"10.1007\/3-540-45428-4_17"},{"issue":"7","key":"2_CR15","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.patrec.2008.01.015","volume":"29","author":"F Huenupan","year":"2008","unstructured":"Huenupan, F., Yoma, N.B., Molina, C., Garreton, C.: Confidence based multiple classifier fusion in speaker verification. Pattern Recognit. Lett. 29(7), 957\u2013966 (2008)","journal-title":"Pattern Recognit. Lett."},{"issue":"2","key":"2_CR16","first-page":"34","volume":"12","author":"M Minsky","year":"1991","unstructured":"Minsky, M.: Logical versus analogical or symbolic versus connectionist or neat versus scruffy. AI Mag. 12(2), 34\u201351 (1991)","journal-title":"AI Mag."},{"issue":"10","key":"2_CR17","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1109\/34.58871","volume":"12","author":"LK Hansen","year":"1990","unstructured":"Hansen, L.K., Salamon, P.: Neural network ensembles. IEEE Trans. Pattern Anal. Mach. Intell. 12(10), 993\u20131001 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4","key":"2_CR18","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/34.588027","volume":"19","author":"K Woods","year":"1997","unstructured":"Woods, K., Kegelmeyer Jr, W.P., Bowyer, K.: Combination of multiple classifiers using local accuracy estimates. IEEE Trans. Pattern Anal. Mach. Intell. 19(4), 405\u2013410 (1997)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Kuncheva, L., Clustering-and-selection model for classifier combination. In: Proceedings of Fourth International Conference on Knowledge-Based Intelligent Engineering Systems and Allied Technologies, vol. 1, pp. 185\u2013188 (2000)","DOI":"10.1109\/KES.2000.885788"},{"key":"2_CR20","first-page":"163","volume-title":"Information Fusion","author":"R Liu","year":"2001","unstructured":"Liu, R., Yuan, B.: Multiple classifiers combination by clustering and selection. Information Fusion, pp. 163\u2013168. Elseiver, New York (2001)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Frigui, H., Zhang, L., Gader, P.D., Ho, D., Context-dependent fusion for landmine detection with ground penetrating radar. In: Proceedings of the SPIE Conference on Detection and Remediation Technologies for Mines and Minelike Targets, Orlando, FL, USA, 2007","DOI":"10.1117\/12.722240"},{"issue":"5","key":"2_CR22","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1109\/TFUZZ.2012.2187062","volume":"20","author":"ACB Abdallah","year":"2012","unstructured":"Abdallah, A.C.B., Frigui, H., Gader, P.D.: Adaptive Local Fusion With Fuzzy Integrals. IEEE T. Fuzzy Syst. 20(5), 849\u2013864 (2012)","journal-title":"IEEE T. Fuzzy Syst."},{"key":"2_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0450-1","volume-title":"Pattern Recognition with Fuzzy Objective Function Algorithms","author":"JC Bezdek","year":"1981","unstructured":"Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. Plenum Press, New York (1981)"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/91.227387","volume":"1","author":"R Krishnapuram","year":"1993","unstructured":"Krishnapuram, R., Keller, J.: A possihilistic approach to clustering. IEEE Trans. Fuzzy Syst. 1, 98\u2013110 (1993)","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"2_CR25","unstructured":"http:\/\/www.kaggle.com\/c\/detecting-insults-in-social-commentary\/prospector#169 (2013)"},{"issue":"5","key":"2_CR26","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1016\/0306-4573(88)90021-0","volume":"24","author":"G Salton","year":"1988","unstructured":"Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inform. Process. Man. 24(5), 513\u2013523 (1988). Also reprinted in Sparck Jones and Willett [1997], pp. 323\u2013328","journal-title":"Inform. Process. Man."}],"container-title":["Studies in Computational Intelligence","Computer and Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10509-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T19:44:53Z","timestamp":1746387893000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-10509-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,23]]},"ISBN":["9783319105086","9783319105093"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10509-3_2","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"type":"print","value":"1860-949X"},{"type":"electronic","value":"1860-9503"}],"subject":[],"published":{"date-parts":[[2014,9,23]]},"assertion":[{"value":"23 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}