{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T07:30:56Z","timestamp":1772695856938,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319306704","type":"print"},{"value":"9783319306711","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30671-1_29","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T11:39:50Z","timestamp":1457523590000},"page":"393-407","source":"Crossref","is-referenced-by-count":18,"title":["Who Wrote the Web? Revisiting Influential Author Identification Research Applicable to Information Retrieval"],"prefix":"10.1007","author":[{"given":"Martin","family":"Potthast","sequence":"first","affiliation":[]},{"given":"Sarah","family":"Braun","sequence":"additional","affiliation":[]},{"given":"Tolga","family":"Buz","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"Duffhauss","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Friedrich","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg Marvin","family":"G\u00fclzow","sequence":"additional","affiliation":[]},{"given":"Jakob","family":"K\u00f6hler","sequence":"additional","affiliation":[]},{"given":"Winfried","family":"L\u00f6tzsch","sequence":"additional","affiliation":[]},{"given":"Fabian","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Maike Elisa","family":"M\u00fcller","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Pa\u00dfmann","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Reinke","sequence":"additional","affiliation":[]},{"given":"Lucas","family":"Rettenmeier","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Rometsch","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Sommer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tr\u00e4ger","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Wilhelm","sequence":"additional","affiliation":[]},{"given":"Benno","family":"Stein","sequence":"additional","affiliation":[]},{"given":"Efstathios","family":"Stamatatos","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Hagen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","unstructured":"Argamon, S., Juola, P.: Overview of the international authorship identification competition at PAN-. In: CLEF 2011 Notebooks (2011)"},{"key":"29_CR2","unstructured":"Arguello, J., Diaz, F., Lin, J., Trotman, A.: RIGOR @ SIGIR (2015)"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Armstrong, T.G., Moffat, A., Webber, W., Zobel, J.: Improvements that don\u2019t add up: ad-hoc retrieval results since. In: CIKM 2009, pp. 601\u2013610 (1998)","DOI":"10.1145\/1645953.1646031"},{"key":"29_CR4","doi-asserted-by":"crossref","unstructured":"Arun, R., Suresh, V., Veni Madhavan, C.E.: Stopword graphs and authorship attribution in text corpora. In: ICSC, pp. 192\u2013196 (2009)","DOI":"10.1109\/ICSC.2009.101"},{"key":"29_CR5","doi-asserted-by":"publisher","first-page":"048702","DOI":"10.1103\/PhysRevLett.88.048702","volume":"88","author":"D Benedetto","year":"2002","unstructured":"Benedetto, D., Caglioti, E., Loreto, V.: Language trees and zipping. Phys. Rev. Lett. 88, 048702 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"29_CR6","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1093\/llc\/17.3.267","volume":"17","author":"J Burrows","year":"2002","unstructured":"Burrows, J.: Delta: a measure of stylistic difference and a guide to likely authorship. Lit. Ling. Comp. 17(3), 267\u2013287 (2002)","journal-title":"Lit. Ling. Comp."},{"key":"29_CR8","first-page":"27:1","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Chih-Jen Lin, L.: A library for support vector machines. ACM TIST 2, 27:1\u201327:27 (2011)","journal-title":"ACM TIST"},{"key":"29_CR9","unstructured":"Collberg, C., Proebstring, T., Warren, A.M.: Repeatability, benefaction in computer systems research: a study and a modest proposal. TR 14\u201304, University of Arizona (2015)"},{"issue":"4","key":"29_CR10","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O Vel de","year":"2001","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining e-mail content for author identification forensics. SIGMOD Rec. 30(4), 55\u201364 (2001)","journal-title":"SIGMOD Rec."},{"key":"29_CR11","unstructured":"Di Buccio, E., Di Nunzio, G.M., Ferro, N., Harman, D., Maistro, M., Silvello, G.: Unfolding off-the-shelf IR systems for reproducibility. In: RIGOR @ SIGIR (2015)"},{"key":"29_CR12","unstructured":"Escalante, H.J., Solorio, T., Montes-y G\u00f3mez, M.: Local histograms of character n-grams for authorship attribution. In: HLT 2011, pp. 288\u2013298 (2011)"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1007\/978-3-319-16354-3_83","volume-title":"Advances in Information Retrieval","author":"N Ferro","year":"2015","unstructured":"Ferro, N., Silvello, G.: Rank-biased precision reloaded: reproducibility and generalization. In: Hanbury, A., Kazai, G., Rauber, A., Fuhr, N. (eds.) ECIR 2015. LNCS, vol. 9022, pp. 768\u2013780. Springer, Heidelberg (2015)"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Gamon, M.: Linguistic correlates of style: authorship classification with deep linguistic analysis features. In: COLING (2004)","DOI":"10.3115\/1220355.1220443"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1007\/978-3-319-16354-3_81","volume-title":"Advances in Information Retrieval","author":"M Hagen","year":"2015","unstructured":"Hagen, M., Potthast, M., B\u00fcchner, M., Stein, B.: Twitter sentiment detection via ensemble classification using averaged confidence scores. In: Hanbury, A., Kazai, G., Rauber, A., Fuhr, N. (eds.) ECIR 2015. LNCS, vol. 9022, pp. 741\u2013754. Springer, Heidelberg (2015)"},{"issue":"1","key":"29_CR16","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. 11(1), 10\u201318 (2009)","journal-title":"SIGKDD Explor."},{"key":"29_CR17","unstructured":"Hanbury, A., Kazai, G., Rauber, A., Fuhr, N.: Proceedings of ECIR (2015)"},{"issue":"3","key":"29_CR18","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"DI Holmes","year":"1998","unstructured":"Holmes, D.I.: The evolution of stylometry in humanities scholarship. Lit. Ling. Comp. 13(3), 111\u2013117 (1998)","journal-title":"Lit. Ling. Comp."},{"issue":"1","key":"29_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/2795403.2795416","volume":"49","author":"F Hopfgartner","year":"2015","unstructured":"Hopfgartner, F., Hanbury, A., M\u00fcller, H., Kando, N., Mercer, S., Kalpathy-Cramer, J., Potthast, M., Gollub, T., Krithara, A., Lin, J., Balog, K., Eggel, I.: Report on the Evaluation-as-a-Service (EaaS) expert workshop. SIGIR Forum 49(1), 57\u201365 (2015)","journal-title":"SIGIR Forum"},{"key":"29_CR20","first-page":"234","volume":"1","author":"P Juola","year":"2008","unstructured":"Juola, P.: Authorship attribution. FnTIR 1, 234\u2013334 (2008)","journal-title":"FnTIR"},{"key":"29_CR21","unstructured":"Juola, P.: An overview of the traditional authorship attribution subtask. In: CLEF Notebooks (2012)"},{"key":"29_CR22","unstructured":"Keselj, V., Peng, F., Cercone, N., Thomas, C.: N-gram-based author profiles for authorship attribution. In: PACLING 2003, pp. 255\u2013264 (2003)"},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Khmelev, D.V., Teahan, W.J.: A repetition based measure for verification of text collections and for text categorization. In: SIGIR 2003, pp. 104\u2013110 (2003)","DOI":"10.1145\/860435.860456"},{"key":"29_CR24","first-page":"1261","volume":"8","author":"M Koppel","year":"2007","unstructured":"Koppel, M., Schler, J., Bonchek-Dokow, E.: Measuring differentiability: unmasking pseudonymous authors. J. Mach. Learn. Res. 8, 1261\u20131276 (2007)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"29_CR25","first-page":"83","volume":"45","author":"M Koppel","year":"2011","unstructured":"Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. LRE 45(1), 83\u201394 (2011)","journal-title":"LRE"},{"key":"29_CR26","unstructured":"Lin, J.: The open-source information retrieval reproducibility challenge. In: RIGOR @ SIGIR (2015)"},{"issue":"214S","key":"29_CR27","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","volume":"ns\u20139","author":"TC Mendenhall","year":"1887","unstructured":"Mendenhall, T.C.: The characteristic curves of composition. Science ns\u20139(214S), 237\u2013246 (1887)","journal-title":"Science"},{"key":"29_CR28","doi-asserted-by":"crossref","unstructured":"Ounis, I., Amati, G., Plachouras, V., He, B., Macdonald, C., Lioma, C.: Terrier: a high performance and scalable information retrieval platform. In: OCIR @ SIGIR (2006)","DOI":"10.1007\/978-3-540-31865-1_37"},{"issue":"3\u20134","key":"29_CR29","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1023\/B:INRT.0000011209.19643.e2","volume":"7","author":"F Peng","year":"2004","unstructured":"Peng, F., Schuurmans, D., Wang, S.: Augmenting naive Bayes classifiers with statistical language models. Inf. Retr. 7(3\u20134), 317\u2013345 (2004)","journal-title":"Inf. Retr."},{"key":"29_CR30","unstructured":"Rangel, F., Rosso, P., Celli, F., Potthast, M., Stein, B., Daelemans, W.: Overview of the 3rd author profiling task at PAN. In: CLEF 2015 Notebooks (2015)"},{"issue":"4","key":"29_CR31","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1001018624850","volume":"31","author":"J Rudman","year":"1997","unstructured":"Rudman, J.: The state of authorship attribution studies: some problems and solutions. Comput. Humanit. 31(4), 351\u2013365 (1997)","journal-title":"Comput. Humanit."},{"key":"29_CR32","unstructured":"Seroussi, Y., Bohnert, F., Zukerman, I.: Authorship attribution with author-aware topic models. In: ACL 2012, pp. 264\u2013269 (2012)"},{"issue":"3","key":"29_CR33","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1016\/j.eswa.2013.08.015","volume":"41","author":"G Sidorov","year":"2014","unstructured":"Sidorov, G., Velasquez, F., Stamatatos, E., Gelbukh, A., Chanona-Hern\u00e1ndez, L.: Syntactic n-grams as machine learning features for natural language processing. Expert Syst. Appl. 41(3), 853\u2013860 (2014)","journal-title":"Expert Syst. Appl."},{"issue":"5","key":"29_CR34","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1142\/S0218213006002965","volume":"15","author":"E Stamatatos","year":"2006","unstructured":"Stamatatos, E.: Authorship attribution based on feature set subspacing ensembles. Int. J. Artif. Intell. Tools 15(5), 823\u2013838 (2006)","journal-title":"Int. J. Artif. Intell. Tools"},{"key":"29_CR35","doi-asserted-by":"crossref","unstructured":"Stamatatos, E.: Author identification using imbalanced and limited training texts. In: DEXA 2007, pp. 237\u2013241 (2007)","DOI":"10.1109\/DEXA.2007.5"},{"key":"29_CR36","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. JASIST 60, 538\u2013556 (2009)","journal-title":"JASIST"},{"issue":"4","key":"29_CR37","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1162\/089120100750105920","volume":"26","author":"E Stamatatos","year":"2000","unstructured":"Stamatatos, E., Fakotakis, N., Kokkinakis, G.: Automatic text categorization in terms of genre and author. Comput. Linguist. 26(4), 471\u2013495 (2000)","journal-title":"Comput. Linguist."},{"key":"29_CR38","unstructured":"Stamatatos, E., Daelemans, W., Verhoeven, B., Stein, B., Potthast, M., Juola, P., S\u00e1nchez-P\u00e9rez, M.A., Barr\u00f3n-Cede\u00f1o, A.: Overview of the author identification task at PAN. In: CLEF 2014 Notebooks (2014)"},{"key":"29_CR39","doi-asserted-by":"crossref","unstructured":"Stodden, V.: The scientific method in practice: reproducibility in the computational sciences. MIT Sloan Research Paper No. 4773\u201310 (2010)","DOI":"10.2139\/ssrn.1550193"},{"issue":"6","key":"29_CR40","first-page":"757","volume":"51","author":"N Tax","year":"2015","unstructured":"Tax, N., Bockting, S., Hiemstra, D.: A cross-benchmark comparison of 87 learning to rank methods. IPM 51(6), 757\u2013772 (2015)","journal-title":"IPM"},{"key":"29_CR41","doi-asserted-by":"crossref","unstructured":"Teahan, W.J., Harper, D.J.: Using compression-based language models for text categorization, pp. 141\u2013165. In: Language Modeling for Information Retrieval (2003)","DOI":"10.1007\/978-94-017-0171-6_7"},{"key":"29_CR42","doi-asserted-by":"crossref","unstructured":"van Halteren, H.: Linguistic profiling for author recognition and verification. In: ACL 2004, pp. 199\u2013206 (2004)","DOI":"10.3115\/1218955.1218981"},{"issue":"3","key":"29_CR43","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing-style features and classification techniques. JASIST 57(3), 378\u2013393 (2006)","journal-title":"JASIST"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30671-1_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T14:02:58Z","timestamp":1559397778000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30671-1_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319306704","9783319306711"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30671-1_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}