{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:51:50Z","timestamp":1725889910599},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642327896"},{"type":"electronic","value":"9783642327902"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32790-2_34","type":"book-chapter","created":{"date-parts":[[2012,8,6]],"date-time":"2012-08-06T07:45:48Z","timestamp":1344239148000},"page":"282-289","source":"Crossref","is-referenced-by-count":2,"title":["Authorship Attribution: Comparison of Single-Layer and Double-Layer Machine Learning"],"prefix":"10.1007","author":[{"given":"Jan","family":"Rygl","sequence":"first","affiliation":[]},{"given":"Ale\u0161","family":"Hor\u00e1k","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MIS.2005.81","volume":"20","author":"A. Abbasi","year":"2005","unstructured":"Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intelligent Systems\u00a020, 67\u201375 (2005)","journal-title":"IEEE Intelligent Systems"},{"unstructured":"Chen, H., Atabakhsh, H., Zeng, D., et al.: COPLINK: visualization and collaboration for law enforcement. In: Proceedings of the 2002 Annual National Conference on Digital Government Research. dg.o 2002, pp. 1\u20137. Digital Government Society of North America (2002)","key":"34_CR2"},{"unstructured":"Mosteller, F., Wallace, D.L.: Inference and Disputed Authorship: The Federalist. Addison-Wesley (1964)","key":"34_CR3"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1093\/llc\/17.3.267","volume":"17","author":"J. Burrows","year":"2002","unstructured":"Burrows, J.: Delta\u2019: a measure of stylistic authorship 1. Literary and Linguistic Computing\u00a017, 267\u2013287 (2002)","journal-title":"Literary and Linguistic Computing"},{"doi-asserted-by":"crossref","unstructured":"Kim, E., Song, Y., Lee, C., Kim, K., Lee, G.G., Yi, B.K., Cha, J.: Two-phase learning for biological event extraction and verification\u00a05, 61\u201373 (2006)","key":"34_CR5","DOI":"10.1145\/1131348.1131353"},{"key":"34_CR6","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1002\/asi.20961","volume":"60","author":"M. Koppel","year":"2009","unstructured":"Koppel, M., Schler, J., Argamon, S.: Computational methods in authorship attribution. J. Am. Soc. Inf. Sci. Technol.\u00a060, 9\u201326 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"34_CR7","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1093\/bioinformatics\/bth474","volume":"21","author":"T. Curk","year":"2005","unstructured":"Curk, T., Dem\u0161ar, J., Xu, Q., Leban, G., Petrovi\u010d, U., Bratko, I., Shaulsky, G., Zupan, B.: Microarray data mining with visual programming. Bioinformatics\u00a021, 396\u2013398 (2005)","journal-title":"Bioinformatics"},{"unstructured":"Chang, C., Lin, C.: LIBSVM: a library for support vector machines (2001), \n                    \n                      http:\/\/www.csie.ntu.edu.tw\/~cjlin\/libsvm","key":"34_CR8"},{"key":"34_CR9","first-page":"1871","volume":"9","author":"R.E. Fan","year":"2008","unstructured":"Fan, R.E., Chang, K.W., Hsieh, C.J., Wang, X.R., Lin, C.J.: LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research\u00a09, 1871\u20131874 (2008)","journal-title":"Journal of Machine Learning Research"},{"key":"34_CR10","first-page":"85","volume":"7","author":"T.K. Huang","year":"2006","unstructured":"Huang, T.K., Weng, R.C., Lin, C.J.: Generalized Bradley-Terry Models and Multi-class Probability Estimates. Journal of Machine Learning Research\u00a07, 85\u2013115 (2006)","journal-title":"Journal of Machine Learning Research"},{"unstructured":"NLP Centre: (Czech lemma stoplist), \n                    \n                      http:\/\/nlp.fi.muni.cz\/cs\/Stoplist_zakladnich_tvaru","key":"34_CR11"},{"unstructured":"\u0160merk, P.: K po\u010d\u00edta\u010dov\u00e9 morfologick\u00e9 anal\u00fdze \u010de\u0161tiny (in Czech, Towards Computational Morphological Analysis of Czech). Ph.D. thesis, Faculty of Informatics, Masaryk University (2010)","key":"34_CR12"}],"container-title":["Lecture Notes in Computer Science","Text, Speech and Dialogue"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32790-2_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:16:03Z","timestamp":1620130563000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32790-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642327896","9783642327902"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32790-2_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}