{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:25:01Z","timestamp":1759962301292,"version":"3.41.2"},"reference-count":94,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[1982,4,1]],"date-time":"1982-04-01T00:00:00Z","timestamp":386467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1982,4,1]]},"abstract":"<jats:p>Not only does the problem of correcting spelling errors by computer have a long history, it is evidently of considerable current interest as papers and letters on the topic continue to appear rapidly. This is not surprising, since techniques useful in detecting and correcting mis\u2010spellings normally have other important applications. Moreover, both the power of small computers and the routine production of machine\u2010readable text have increased enormously over the last decade to the point where automatic spelling error detection\/correction has become not only feasible but highly desirable.<\/jats:p>","DOI":"10.1108\/eb026733","type":"journal-article","created":{"date-parts":[[2008,1,19]],"date-time":"2008-01-19T07:47:21Z","timestamp":1200728841000},"page":"282-291","source":"Crossref","is-referenced-by-count":17,"title":["SPELLING ERROR DETECTION AND CORRECTION BY COMPUTER: SOME NOTES AND A BIBLIOGRAPHY"],"prefix":"10.1108","volume":"38","author":[{"given":"J.J.","family":"POLLOCK","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"p_1","first-page":"3","volume":"2","author":"ACKROYD M. H","year":"1980","journal-title":"IEEE Transactions on Acoustics, Speech, and Signal Processing, ASSP-28(2)"},{"key":"p_2","doi-asserted-by":"publisher","DOI":"10.1145\/363282.363326"},{"volume-title":"N e w Jersey","year":"1976","author":"BENNETT W. R.","key":"p_4"},{"key":"p_6","doi-asserted-by":"publisher","DOI":"10.1145\/1460299.1460326"},{"issue":"7","key":"p_7","first-page":"2","volume":"13","author":"BLOOM B. H.","year":"1977","journal-title":"Communications of the ACM"},{"key":"p_8","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(77)90026-7"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(61)80036-3"},{"key":"p_10","doi-asserted-by":"publisher","DOI":"10.1145\/1464182.1464203"},{"key":"p_11","doi-asserted-by":"publisher","DOI":"10.1145\/800133.804332"},{"key":"p_12","first-page":"209","volume-title":"Proceedings of the National Computer Conference","author":"COMER D .","year":"1979"},{"key":"p_13","doi-asserted-by":"publisher","DOI":"10.1145\/366604.366651"},{"key":"p_14","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(68)90201-5"},{"key":"p_15","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363994"},{"key":"p_16","doi-asserted-by":"publisher","DOI":"10.1145\/366862.366913"},{"key":"p_17","unstructured":"DUNLAVEY, M. R. A logarithmic best-match algorithm for symbolic applications. Report 81-40, Boston College School of Management, Boston, Mass., USA,1981. Algorithm for trie search of very large dictionaries."},{"key":"p_18","doi-asserted-by":"publisher","DOI":"10.1145\/358746.383429"},{"key":"p_19","doi-asserted-by":"publisher","DOI":"10.1145\/363958.363993"},{"key":"p_20","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4809(76)90039-2"},{"volume-title":"International Journal of Man-Machine Studies, 9","year":"1977","author":"FEYOCK S.","key":"p_21"},{"key":"p_22","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"volume-title":"Correction in CORC-the Cornell computing language. P h . D . Thesis: Dept. of Computer Science","year":"1963","author":"FREEMAN D .","key":"p_23"},{"key":"p_24","doi-asserted-by":"publisher","DOI":"10.1147\/sj.63.0192"},{"key":"p_25","volume":"75","author":"GALLI E .","year":"1968","journal-title":"IEEE Transactions on Engineering Writing and Speech, EWS11(2)"},{"volume-title":"Spelling difficulties in 3867 words. N e w York: Bureau of Publications","year":"1937","author":"GATES A .","key":"p_26"},{"key":"p_27","volume":"57","author":"GIANGARDELLA J. J.","year":"1967","journal-title":"IEEE Transactions on Engineering Writing and Speech, EWS10(2)"},{"key":"p_28","doi-asserted-by":"publisher","DOI":"10.1145\/320868.320878"},{"key":"p_29","first-page":"2","volume-title":"In: Information Technology, Proceedings of the 3rd Jerusalem Conference On Information Technology (JCIT3)","author":"GREANIAS E. C.","year":"1978"},{"issue":"5","key":"p_30","first-page":"331","volume":"24","author":"GROSS J.","year":"1981","journal-title":"Communications of the ACM"},{"key":"p_31","doi-asserted-by":"publisher","DOI":"10.1145\/356827.356830"},{"volume-title":"SPEEDCOP: Task A4-word structure analysis. Chemical Abstracts Service report","year":"1981","author":"HAMILL K. A.","key":"p_32"},{"key":"p_33","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(76)90027-3"},{"volume-title":"Proceedings of the Symposium on Optical Character Recognition. Washington","author":"HARMON L. D.","key":"p_34"},{"key":"p_35","first-page":"1165","volume-title":"Proceedings of the IEEE, 60(10)","volume":"1972","author":"HARMON L. D."},{"key":"p_36","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360861"},{"key":"p_37","doi-asserted-by":"publisher","DOI":"10.1145\/322033.322044"},{"key":"p_38","doi-asserted-by":"publisher","DOI":"10.1145\/359581.359603"},{"key":"p_39","doi-asserted-by":"publisher","DOI":"10.1145\/361932.361940"},{"key":"p_40","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/19.3.207"},{"issue":"4","key":"p_41","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1055\/s-0038-1636470","volume":"18","author":"JOSEPH D. M.","year":"1979","journal-title":"Meth. Inform. Med."},{"key":"p_42","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(81)90052-9"},{"key":"p_43","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(81)90056-6"},{"key":"p_44","first-page":"119","volume-title":"Proceedings of Compsac81","author":"KASHYAP R. L.","year":"1981"},{"volume-title":"Proceedings of the Fourth In","key":"p_46"},{"volume-title":"Conference on Pattern Recognition","year":"1978","key":"p_47"},{"key":"p_48","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(80)90076-9"},{"issue":"8","key":"p_49","first-page":"707","volume":"10","author":"LEVENSHTEIN V. I","year":"1966","journal-title":"Soviet Physks-Doklady"},{"issue":"2","key":"p_50","first-page":"7","volume":"22","author":"LOWRANCE R.","year":"1975","journal-title":"Journal of the ACM"},{"key":"p_51","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(62)90657-5"},{"key":"p_52","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(57)90061-X"},{"key":"p_53","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(58)90229-8"},{"key":"p_54","doi-asserted-by":"publisher","DOI":"10.1145\/362007.362033"},{"key":"p_55","doi-asserted-by":"crossref","unstructured":"MORRIS, R. and CHERRY, L. L. Computer detection of typographical errors. Bell Labs Computing Science Technical Report No. 18,July, 1974. Describes theUNIX TYPOprogram, which uses trigrams and an index of peculiarity to rank text words in descending probability of being mis-spelled.","DOI":"10.1109\/TPC.1975.6593963"},{"issue":"1","key":"p_56","first-page":"4","volume":"18","author":"MORRIS R.","year":"1975","journal-title":"IEEE Transactions on Professional Communication, V."},{"key":"p_57","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(77)90053-X"},{"issue":"3","key":"p_58","first-page":"3","volume":"48","author":"NEEDLEMEN S. B.","year":"1970","journal-title":"Journal of Molecular Biology"},{"key":"p_59","doi-asserted-by":"publisher","DOI":"10.1145\/358645.358654"},{"volume-title":"Report TR 78.06.005","year":"1978","author":"NUSSBAUM R.","key":"p_60"},{"journal-title":"IEEE Transactions on Computers","first-page":"1976","author":"OKUDA T .","key":"p_61"},{"key":"p_62","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(74)80003-9"},{"key":"p_63","doi-asserted-by":"publisher","DOI":"10.1145\/359038.359041"},{"volume-title":"SPEEDCOP: Task Bl-quantification. Chemical Abstracts Service report","year":"1980","author":"POLLOCK J. J.","key":"p_64"},{"volume-title":"SPEEDCOP: Task Bl-automatic correction of common misspellings. Chemical Abstracts Service report","year":"1981","author":"POLLOCK J. J.","key":"p_65"},{"volume-title":"J . SPEEDCOP: Task B2-automatic correction of misspellings. Chemical Abstracts Service report","year":"1981","author":"POLLOCK J .","key":"p_66"},{"volume-title":"SPEEDCOP: Task C-evaluation of spelling error detection\/ correction system. Chemical Abstracts Service report","year":"1981","author":"POLLOCK J. J.","key":"p_67"},{"volume-title":"Communications of the ACM, 24(5)","year":"1981","author":"PRESCOTT R. L.","key":"p_68"},{"journal-title":"IEEE Transactions on Computers","first-page":"1971","author":"RISEMAN E. M.","key":"p_69"},{"journal-title":"IEEE Transactions on Computers","first-page":"1974","author":"RISEMAN E. M.","key":"p_70"},{"key":"p_71","doi-asserted-by":"publisher","DOI":"10.1145\/358645.358652"},{"key":"p_72","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.69.1.4"},{"key":"p_73","doi-asserted-by":"publisher","DOI":"10.1108\/eb005450"},{"key":"p_74","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(74)90050-8"},{"key":"p_75","first-page":"179","volume-title":"Proceedings of the 5th InternationalJoint Conference On Artificial Intelligence-1977 (IJCAI-77)","volume":"1977","author":"SHINGHAL R ."},{"issue":"4","key":"p_76","first-page":"4","volume":"5","author":"SIDOROV A. A","year":"1979","journal-title":"Program and Computer Software"},{"key":"p_77","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0271(70)90045-8"},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/16.2.132"},{"issue":"2","key":"p_79","first-page":"3","volume":"3","author":"TAGLIACOZZO R.","year":"1970","journal-title":"Journal of Library Automation"},{"issue":"6","key":"p_80","first-page":"127","volume":"55","author":"TANAKA E.","year":"1972","journal-title":"Electronics and Communications in Japan"},{"key":"p_81","unstructured":"TENCZAR, P. and GOLDEN, W . Spelling, word, and concept recognition. CERL Report X-35, University of Illinois, Urbana, Illinois, 1972. Describes the similarity key used in the PLATO CAI system and consisting of: length\/first letter\/letter content\/letter order\/syllable."},{"key":"p_82","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)90042-3"},{"key":"p_83","doi-asserted-by":"publisher","DOI":"10.1007\/BF02024781"},{"key":"p_84","doi-asserted-by":"publisher","DOI":"10.1145\/872730.806447"},{"key":"p_85","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/20.2.141"},{"key":"p_86","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(71)90019-7"},{"issue":"9","key":"p_87","first-page":"524","volume":"60","author":"UMEMOTO J.","year":"1977","journal-title":"Transactions of the Institute of Electronics and Communication Engineering of Japan Section E"},{"key":"p_88","doi-asserted-by":"publisher","DOI":"10.1080\/00140137608931529"},{"key":"p_89","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(70)80008-6"},{"key":"p_90","doi-asserted-by":"publisher","DOI":"10.1145\/800257.808902"},{"key":"p_91","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"},{"key":"p_92","first-page":"124","volume-title":"Digest of Papers in the IEEE Computing Society International Conference 14th","volume":"1977","author":"WANG C. H .","year":"1977"},{"key":"p_93","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321923"},{"key":"p_94","doi-asserted-by":"publisher","DOI":"10.1016\/0010-4809(80)90029-4"},{"key":"p_95","doi-asserted-by":"publisher","DOI":"10.1037\/h0071335"},{"key":"p_96","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630310106"},{"key":"p_97","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(81)90044-3"}],"container-title":["Journal of Documentation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/eb026733\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/eb026733\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:11:05Z","timestamp":1753398665000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jd\/article\/38\/4\/282-291\/196460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1982,4,1]]},"references-count":94,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1982,4,1]]}},"alternative-id":["10.1108\/eb026733"],"URL":"https:\/\/doi.org\/10.1108\/eb026733","relation":{},"ISSN":["0022-0418"],"issn-type":[{"type":"print","value":"0022-0418"}],"subject":[],"published":{"date-parts":[[1982,4,1]]}}}