{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:52:49Z","timestamp":1726213969233},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319113814"},{"type":"electronic","value":"9783319113821"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11382-1_13","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T01:11:27Z","timestamp":1408410687000},"page":"128-140","source":"Crossref","is-referenced-by-count":5,"title":["Authorship Identification Using Dynamic Selection of Features from Probabilistic Feature Set"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Zamani","sequence":"first","affiliation":[]},{"given":"Hossein Nasr","family":"Esfahani","sequence":"additional","affiliation":[]},{"given":"Pariya","family":"Babaie","sequence":"additional","affiliation":[]},{"given":"Samira","family":"Abnar","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Dehghani","sequence":"additional","affiliation":[]},{"given":"Azadeh","family":"Shakery","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"13_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/1461928.1461959","volume":"52","author":"S. Argamon","year":"2009","unstructured":"Argamon, S., Koppel, M., Pennebaker, J.W., Schler, J.: Automatically profiling the author of an anonymous text. Commun. ACM\u00a052(2), 119\u2013123 (2009)","journal-title":"Commun. ACM"},{"key":"13_CR2","unstructured":"Forner, P., Navigli, R., Tufis, D. (eds.): CLEF 2013 Evaluation Labs and Workshop\u2013Working Notes Papers (2013)"},{"key":"13_CR3","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1198\/004017007000000245","volume":"49","author":"A. Genkin","year":"2007","unstructured":"Genkin, A., Lewis, D.D., Madigan, D.: Large-scale bayesian logistic regression for text categorization. Technometrics\u00a049, 291\u2013304 (2007)","journal-title":"Technometrics"},{"issue":"4","key":"13_CR4","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1017\/S1351324905003694","volume":"11","author":"N. Graham","year":"2005","unstructured":"Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Nat. Lang. Eng.\u00a011(4), 397\u2013415 (2005)","journal-title":"Nat. Lang. Eng."},{"key":"13_CR5","unstructured":"Halvani, O., Steinebach, M., Zimmermann, R.: Authorship verification via k-nearest neighbor estimation - notebook for pan at clef 2013. In: Forner et al [2]"},{"key":"13_CR6","unstructured":"Joula, P., Stamatatos, E.: Overview of the author identification task at pan 2013. In: Information Access Evaluation. Multilinguality, Multimodality, and Visualization. vol. 8138 (2013)"},{"key":"13_CR7","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics\u00a022, 49\u201386 (1951)","journal-title":"Annals of Mathematical Statistics"},{"issue":"4","key":"13_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1121949.1121951","volume":"49","author":"J. Li","year":"2006","unstructured":"Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Commun. ACM\u00a049(4), 76\u201382 (2006)","journal-title":"Commun. ACM"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Luyckx, K., Daelemans, W.: Authorship attribution and verification with many authors and limited data. In: Proceedings of the 22nd International Conference on Computational Linguistics, COLING 2008, pp. 513\u2013520 (2008)","DOI":"10.3115\/1599081.1599146"},{"key":"13_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C.D. Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press, New York (2008)"},{"issue":"1","key":"13_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-011-0398-0","volume":"31","author":"H. Mohtasseb","year":"2012","unstructured":"Mohtasseb, H., Ahmed, A.: Two-layered blogger identification model integrating profile and instance-based methods. Knowl. Inf. Syst.\u00a031(1), 1\u201321 (2012)","journal-title":"Knowl. Inf. Syst."},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-319-07064-3_25","volume-title":"Artificial Intelligence: Methods and Applications","author":"N. Potha","year":"2014","unstructured":"Potha, N., Stamatatos, E.: A profile-based method for authorship verification. In: Likas, A., Blekas, K., Kalles, D. (eds.) SETN 2014. LNCS, vol.\u00a08445, pp. 313\u2013326. Springer, Heidelberg (2014)"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, markov chains, and author unmasking: An investigation. In: Proceedings of the 2006 Conference on Empirical Methods in Natural Language Processing, EMNLP 2006, pp. 482\u2013491 (2006)","DOI":"10.3115\/1610075.1610142"},{"key":"13_CR14","unstructured":"Seidman, S.: Authorship verification using the impostors method - notebook for pan at clef 2013. In: Forner et al. [2]"},{"issue":"3","key":"13_CR15","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol.\u00a060(3), 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"1","key":"13_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10579-011-9136-1","volume":"45","author":"E. Stamatatos","year":"2011","unstructured":"Stamatatos, E., Koppel, M.: Plagiarism and authorship analysis: introduction to the special issue. Language Resources and Evaluation\u00a045(1), 1\u20134 (2011)","journal-title":"Language Resources and Evaluation"},{"key":"13_CR17","unstructured":"Zhao, Y., Zobel, J.: Searching with style: Authorship attribution in classic literature. In: Proceedings of the Thirtieth Australasian Conference on Computer Science, ACSC 2007, pp. 59\u201368 (2007)"}],"container-title":["Lecture Notes in Computer Science","Information Access Evaluation. Multilinguality, Multimodality, and Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11382-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:03:54Z","timestamp":1558973034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11382-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319113814","9783319113821"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11382-1_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}