-
1
-
-
27344450109
-
Identification and comparison of extremist-group Web forum messages using authorship analysis
-
Abbasi, A., and Chen, H. Identification and comparison of extremist-group Web forum messages using authorship analysis. IEEE Intelligent Systems, 20, 5 (2005), 67-75.
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 67-75
-
-
Abbasi, A.1
Chen, H.2
-
2
-
-
33745912234
-
Visualizing authorship for identification
-
Los Alamitos, CA: IEEE Computer Society
-
Abbasi, A., and Chen, H. Visualizing authorship for identification. In Proceedings of the Fourth IEEE Conference on Intelligence and Security Informatics. Los Alamitos, CA: IEEE Computer Society, 2006, pp. 60-71.
-
(2006)
Proceedings of the Fourth IEEE Conference on Intelligence and Security Informatics
, pp. 60-71
-
-
Abbasi, A.1
Chen, H.2
-
3
-
-
18744405825
-
Style mining of electronic messages for multiple authorship discrimination: First results
-
L. Getoor, T.E. Senator, P. Domingos, and C. Faloutsos eds, New York: ACM Press
-
Argamon, S.; Saric, M.; and Stein, S. Style mining of electronic messages for multiple authorship discrimination: First results. In L. Getoor, T.E. Senator, P. Domingos, and C. Faloutsos (eds.), Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM Press, 2003, pp. 475-480.
-
(2003)
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 475-480
-
-
Argamon, S.1
Saric, M.2
Stein, S.3
-
4
-
-
85040385892
-
Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution
-
Baayen, R.H.; Halteren, H.V.; and Tweedie, F. J. Outside the cave of shadows: Using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing, 11, 3 (1996),121-132.
-
(1996)
Literary and Linguistic Computing
, vol.11
, Issue.3
, pp. 121-132
-
-
Baayen, R.H.1
Halteren, H.V.2
Tweedie, F.J.3
-
5
-
-
9944260468
-
How effective are electronic reputation mechanisms? An experimental investigation
-
Bolton, G.E.; Katok, E.; and Ockenfels, A. How effective are electronic reputation mechanisms? An experimental investigation. Management Science, 50, 11 (2004), 1587-1602.
-
(2004)
Management Science
, vol.50
, Issue.11
, pp. 1587-1602
-
-
Bolton, G.E.1
Katok, E.2
Ockenfels, A.3
-
6
-
-
0033737577
-
Frictionless commerce? A comparison of Internet and conventional retailers
-
Brynjolfsson, E., and Smith, M.D. Frictionless commerce? A comparison of Internet and conventional retailers. Management Science, 46, 4 (2000), 563-585.
-
(2000)
Management Science
, vol.46
, Issue.4
, pp. 563-585
-
-
Brynjolfsson, E.1
Smith, M.D.2
-
7
-
-
84960603650
-
Word patterns and story shapes: The statistical analysis of narrative style
-
Burrows, J.F. Word patterns and story shapes: The statistical analysis of narrative style. Literary and Linguistic Computing, 2, 2 (1987), 61-70.
-
(1987)
Literary and Linguistic Computing
, vol.2
, Issue.2
, pp. 61-70
-
-
Burrows, J.F.1
-
8
-
-
56249097939
-
Empirical evaluation of language-based author identification techniques
-
Chaski, C.E. Empirical evaluation of language-based author identification techniques. Forensic Linguistics, 8, 1 (2001), 1-65.
-
(2001)
Forensic Linguistics
, vol.8
, Issue.1
, pp. 1-65
-
-
Chaski, C.E.1
-
9
-
-
7244245467
-
Fighting Internet auction fraud: An assessment and proposal
-
Chua, C.E.H., and Wareham, J. Fighting Internet auction fraud: An assessment and proposal. IEEE Computer 37, 10 (2004), 31-37.
-
(2004)
IEEE Computer
, vol.37
, Issue.10
, pp. 31-37
-
-
Chua, C.E.H.1
Wareham, J.2
-
10
-
-
0242641140
-
The digitization of word of mouth: Promise and challenges of online feedback mechanisms
-
Dellarocas, C. The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49, 10 (2003), 1407-1424.
-
(2003)
Management Science
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
11
-
-
0042367634
-
Mining e-mail content for author identification forensics
-
De Vel, O.; Anderson, A.; Corney, M.; and Mohay, G. Mining e-mail content for author identification forensics. ACM SIGMOD Record, 30, 4 (2001), 55-64.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 55-64
-
-
De Vel, O.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
12
-
-
1842583320
-
Extraction of Java program fingerprints for software authorship identification
-
Ding, H., and Samadzadeh, H.M. Extraction of Java program fingerprints for software authorship identification. Journal of Systems and Software, 72, 1 (2004), 49-57.
-
(2004)
Journal of Systems and Software
, vol.72
, Issue.1
, pp. 49-57
-
-
Ding, H.1
Samadzadeh, H.M.2
-
13
-
-
84991061352
-
Social translucence: An approach to designing systems that support social processes
-
Erickson, T., and Kellogg, W.A. Social translucence: An approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction, 7, 1 (2000), 59-83.
-
(2000)
ACM Transactions on Computer-Human Interaction
, vol.7
, Issue.1
, pp. 59-83
-
-
Erickson, T.1
Kellogg, W.A.2
-
16
-
-
0039246956
-
The social cost of cheap pseudonyms
-
Friedman, E., and Resnick, P. The social cost of cheap pseudonyms. Journal of Economic Management Strategy, 10, 1 (2001), 173-199.
-
(2001)
Journal of Economic Management Strategy
, vol.10
, Issue.1
, pp. 173-199
-
-
Friedman, E.1
Resnick, P.2
-
17
-
-
0001827842
-
Production of speech: Observations from normal and pathological language use
-
A. Ellis ed, London: Academic Press
-
Garrett, M.F. Production of speech: Observations from normal and pathological language use. In A. Ellis (ed.), Normality and Pathology in Cognitive Functions. London: Academic Press, 1982.
-
(1982)
Normality and Pathology in Cognitive Functions
-
-
Garrett, M.F.1
-
18
-
-
0009481412
-
A survey of trust in Internet applications
-
Grandison, T., and Sloman, M. A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 4, 4 (2000), 2-16.
-
(2000)
IEEE Communications Surveys and Tutorials
, vol.4
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
19
-
-
1842493961
-
Software forensics: Extending authorship analysis techniques to computer programs
-
Paper presented at the, Duke University, Durham, NC, September 4-7
-
Gray, A.; Sallis, P.; and MacDonell, S. Software forensics: Extending authorship analysis techniques to computer programs. Paper presented at the Third Biannual Conference of the International Association of Forensic Linguists, Duke University, Durham, NC, September 4-7, 1997.
-
(1997)
Third Biannual Conference of the International Association of Forensic Linguists
-
-
Gray, A.1
Sallis, P.2
MacDonell, S.3
-
21
-
-
0031236568
-
Attribution accuracy when using anonymity in group support systems
-
Hayne, C.S., and Rice, E.R. Attribution accuracy when using anonymity in group support systems. International Journal of Human-Computer Studies, 47, 3 (1997), 429-452.
-
(1997)
International Journal of Human-Computer Studies
, vol.47
, Issue.3
, pp. 429-452
-
-
Hayne, C.S.1
Rice, E.R.2
-
22
-
-
0041928091
-
Identification of comment authorship in anonymous group support systems
-
Summer
-
Hayne, C.S.; Pollard, E.C.; and Rice, E.R. Identification of comment authorship in anonymous group support systems. Journal of Management Information Systems, 20, 1 (Summer 2003), 301-329.
-
(2003)
Journal of Management Information Systems
, vol.20
, Issue.1
, pp. 301-329
-
-
Hayne, C.S.1
Pollard, E.C.2
Rice, E.R.3
-
23
-
-
84958184841
-
Email alias detection using social network analysis
-
J. Adibi, M. Grobelnik, D. Mladenic, and P. Pantel eds, New York: ACM Press
-
Holzer, R.; Malin, B.; and Sweeney, L. Email alias detection using social network analysis. In J. Adibi, M. Grobelnik, D. Mladenic, and P. Pantel (eds.), Proceedings of the Third International Workshop on Link Discovery. New York: ACM Press, 2005, pp. 52-57.
-
(2005)
Proceedings of the Third International Workshop on Link Discovery
, pp. 52-57
-
-
Holzer, R.1
Malin, B.2
Sweeney, L.3
-
24
-
-
0027332773
-
Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches
-
Jackson, D. Stopping rules in principal component analysis: A comparison of heuristical and statistical approaches. Ecology, 74, 8 (1993), 2204-2214.
-
(1993)
Ecology
, vol.74
, Issue.8
, pp. 2204-2214
-
-
Jackson, D.1
-
25
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang, A.; Ismail, R.; and Boyd, C. A survey of trust and reputation systems for online service provision. Decision Support Systems, 43, 2 (2007), 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
26
-
-
28344446431
-
What can we do with small corpora? Document categorization via cross-entropy
-
E. Cambouropoulos, U. Hahn, H. Pain, and M. Ramscar eds, Edinburgh, UK: Department of Artificial Intelligence, Edinburgh University
-
Juola, P. What can we do with small corpora? Document categorization via cross-entropy. In E. Cambouropoulos, U. Hahn, H. Pain, and M. Ramscar (eds.), Proceedings of the Interdisciplinary Workshop on Similarity and Categorization. Edinburgh, UK: Department of Artificial Intelligence, Edinburgh University, 1997.
-
(1997)
Proceedings of the Interdisciplinary Workshop on Similarity and Categorization
-
-
Juola, P.1
-
27
-
-
31044439470
-
The time course of language change
-
Juola, P. The time course of language change. Computers and the Humanities, 37, 1 (2003), 77-96.
-
(2003)
Computers and the Humanities
, vol.37
, Issue.1
, pp. 77-96
-
-
Juola, P.1
-
28
-
-
31044454127
-
A controlled-corpus experiment in authorship identification by cross-entropy
-
Juola, P., and Baayen, H. A controlled-corpus experiment in authorship identification by cross-entropy. Literary and Linguistic Computing, 20, Supplement 1 (2005), 59-67.
-
(2005)
Literary and Linguistic Computing
, vol.20
, Issue.SUPPL.EMENT 1
, pp. 59-67
-
-
Juola, P.1
Baayen, H.2
-
29
-
-
49049084540
-
Obfuscating document stylometry to preserve author anonymity
-
N. Calzolari, C. Cardie, and P. Isabelle eds, East Straudsburg, PA: Association for Computational Linguistics
-
Kacmarcik, G., and Gamon, M. Obfuscating document stylometry to preserve author anonymity. In N. Calzolari, C. Cardie, and P. Isabelle (eds.), Proceedings of the Forty-Fourth Annual Meeting of the Association for Computational Linguistics. East Straudsburg, PA: Association for Computational Linguistics, 2006, pp. 444-451.
-
(2006)
Proceedings of the Forty-Fourth Annual Meeting of the Association for Computational Linguistics
, pp. 444-451
-
-
Kacmarcik, G.1
Gamon, M.2
-
30
-
-
33745868242
-
N-gram based author profiles for authorship attribution
-
Hoboken, NJ: John Wiley and Sons
-
Keselj, V.; Peng, F.; Cercone, N.; and Thomas, C. N-gram based author profiles for authorship attribution. In Proceedings of the Sixth Conference of the Pacific Association for Computational Linguistics. Hoboken, NJ: John Wiley and Sons, 2003, pp. 255-264.
-
(2003)
Proceedings of the Sixth Conference of the Pacific Association for Computational Linguistics
, pp. 255-264
-
-
Keselj, V.1
Peng, F.2
Cercone, N.3
Thomas, C.4
-
31
-
-
1542340393
-
Disputed authorship resolution using relative entropy for Markov chains of letters in human language texts
-
Khmelev, D.V. Disputed authorship resolution using relative entropy for Markov chains of letters in human language texts. Journal of Quantitative Linguistics, 7, 3 (2000), 115-126.
-
(2000)
Journal of Quantitative Linguistics
, vol.7
, Issue.3
, pp. 115-126
-
-
Khmelev, D.V.1
-
32
-
-
33646138699
-
Using Markov chains for identification of writers
-
Khmelev, D.V., and Tweedie, F.J. Using Markov chains for identification of writers. Literary and Linguistic Computing, 16, 3 (2001), 299-307.
-
(2001)
Literary and Linguistic Computing
, vol.16
, Issue.3
, pp. 299-307
-
-
Khmelev, D.V.1
Tweedie, F.J.2
-
33
-
-
12244278769
-
Discrimination of authorship using visualization
-
Kjell, B.; Woods, W.A.; and Frieder, O. Discrimination of authorship using visualization. Information Processing and Management, 30, 1 (1994), 141-150.
-
(1994)
Information Processing and Management
, vol.30
, Issue.1
, pp. 141-150
-
-
Kjell, B.1
Woods, W.A.2
Frieder, O.3
-
34
-
-
14344251227
-
Exploiting stylistic idiosyncrasies for authorship attribution
-
A.G. Cohn ed, San Francisco: Morgan Kaufmann
-
Koppel, M., and Schler, J. Exploiting stylistic idiosyncrasies for authorship attribution. In A.G. Cohn (ed.), Proceedings of the IJCAI Workshop on Computational Approaches to Style Analysis and Synthesis. San Francisco: Morgan Kaufmann, 2003, pp. 69-72.
-
(2003)
Proceedings of the IJCAI Workshop on Computational Approaches to Style Analysis and Synthesis
, pp. 69-72
-
-
Koppel, M.1
Schler, J.2
-
35
-
-
33748455668
-
Feature instability as a criterion for selecting potential style markers
-
Koppel, M.; Akiva, N.; and Dagan, I. Feature instability as a criterion for selecting potential style markers. Journal of the American Society for Information Science and Technology, 57, 11 (2006), 1519-1525.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.11
, pp. 1519-1525
-
-
Koppel, M.1
Akiva, N.2
Dagan, I.3
-
36
-
-
84951713481
-
The effect of negative buyer feedback on prices in Internet auction markets
-
S. Ang, H. Krcmar, W.J. Orlikowski, P. Weill, and J.I. DeGross eds, Atlanta, GA: Association for Information Systems
-
Lee, Z.; Im, L.; and Lee, S. J. The effect of negative buyer feedback on prices in Internet auction markets. In S. Ang, H. Krcmar, W.J. Orlikowski, P. Weill, and J.I. DeGross (eds.), Proceedings of the Twenty-First International Conference on Information Systems. Atlanta, GA: Association for Information Systems, 2000, pp. 286-287.
-
(2000)
Proceedings of the Twenty-First International Conference on Information Systems
, pp. 286-287
-
-
Lee, Z.1
Im, L.2
Lee, S.J.3
-
37
-
-
33745213523
-
From fingerprint to Writeprint
-
Li, J.; Zheng, R.; and Chen, H. From fingerprint to Writeprint. Communications of the ACM, 49, 4 (2006), 76-82.
-
(2006)
Communications of the ACM
, vol.49
, Issue.4
, pp. 76-82
-
-
Li, J.1
Zheng, R.2
Chen, H.3
-
38
-
-
84948698587
-
A computational model of trust and reputation
-
R.H. Sprague ed, Los Alamitos, CA: IEEE Computer Society Press, available at
-
Mui, L.; Mohtashemi, M.; and Halberstadt, A. A computational model of trust and reputation. In R.H. Sprague (ed.), Proceedings of the Thirty-Fifth Annual Hawaii International Conference on System Sciences. Los Alamitos, CA: IEEE Computer Society Press, 2002 (available at http://csd12.computer.org/comp/proceedings/hicss/2002/1435 /07/14350188.pdf).
-
(2002)
Proceedings of the Thirty-Fifth Annual Hawaii International Conference on System Sciences
-
-
Mui, L.1
Mohtashemi, M.2
Halberstadt, A.3
-
39
-
-
19944400484
-
Anti-aliasing on the Web
-
S.I. Feldman, M. Uretsky, M. Najork, and C.E. Wills eds, New York: ACM Press
-
Novak, J.; Raghavan, P.; and Tomkins, A. Anti-aliasing on the Web. In S.I. Feldman, M. Uretsky, M. Najork, and C.E. Wills (eds.), Proceedings of the Thirteenth International World Wide Web Conference. New York: ACM Press, 2004, pp. 30-39.
-
(2004)
Proceedings of the Thirteenth International World Wide Web Conference
, pp. 30-39
-
-
Novak, J.1
Raghavan, P.2
Tomkins, A.3
-
40
-
-
2442676514
-
Building effective online marketplaces with institution-based trust
-
Pavlou, P.A., and Gefen, D. Building effective online marketplaces with institution-based trust. Information Systems Research, 15, 1 (2004), 37-59.
-
(2004)
Information Systems Research
, vol.15
, Issue.1
, pp. 37-59
-
-
Pavlou, P.A.1
Gefen, D.2
-
41
-
-
84863259659
-
Automated authorship attribution with character level language models
-
A. Copestake and J. Hajic eds, East Straudshurg, PA: Association for Computational Linguistics
-
Peng, F.; Schuurmans, D.; Keselj, V.; and Wang, S. Automated authorship attribution with character level language models. In A. Copestake and J. Hajic (eds.), Proceedings of the Tenth Conference of the European Chapter of the Association for Computational Linguistics. East Straudshurg, PA: Association for Computational Linguistics, 2003, pp. 267-274.
-
(2003)
Proceedings of the Tenth Conference of the European Chapter of the Association for Computational Linguistics
, pp. 267-274
-
-
Peng, F.1
Schuurmans, D.2
Keselj, V.3
Wang, S.4
-
42
-
-
85084161175
-
Can pseudonymity really guarantee privacy?
-
S. Bellovin and G. Rose eds, Berkeley, CA: USENIX Association
-
Rao, J.R., and Rohatgi, P. Can pseudonymity really guarantee privacy? In S. Bellovin and G. Rose (eds.), Proceedings of the Ninth USENIX Security Symposium. Berkeley, CA: USENIX Association, 2000, pp. 85-96.
-
(2000)
Proceedings of the Ninth USENIX Security Symposium
, pp. 85-96
-
-
Rao, J.R.1
Rohatgi, P.2
-
43
-
-
85029609685
-
Simulated social control for secure Internet commerce
-
H. Hosmer, J. Dobson, C. Meadows, and D. Bailey eds, New York: ACM Press
-
Rasmusson L., and Jansson, S. Simulated social control for secure Internet commerce. In H. Hosmer, J. Dobson, C. Meadows, and D. Bailey (eds.), Proceedings of the ACM SIGSAC Workshop on New Security Paradigm. New York: ACM Press, 1996, pp. 18-25.
-
(1996)
Proceedings of the ACM SIGSAC Workshop on New Security Paradigm
, pp. 18-25
-
-
Rasmusson, L.1
Jansson, S.2
-
44
-
-
0002101577
-
Reputation systems
-
Resnick, P.; Zeckhauser, R.; Friedman, E.; and Kuwabara, K. Reputation systems. Communications of the ACM, 43, 12 (2000), 45-48.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
45
-
-
33744807496
-
The value of reputation on eBay: A controlled experiment
-
Resnick, P.; Zeckhauser, R.; Swanson, J.; and Lockwood, K. The value of reputation on eBay: A controlled experiment. Experimental Economics, 9, 2 (2006), 79-101.
-
(2006)
Experimental Economics
, vol.9
, Issue.2
, pp. 79-101
-
-
Resnick, P.1
Zeckhauser, R.2
Swanson, J.3
Lockwood, K.4
-
46
-
-
0001318320
-
The state of authorship attribution studies: Some problems and solutions
-
Rudman, J. The state of authorship attribution studies: Some problems and solutions. Computers and the Humanities, 31, 4 (1997), 351-365.
-
(1997)
Computers and the Humanities
, vol.31
, Issue.4
, pp. 351-365
-
-
Rudman, J.1
-
48
-
-
0003141935
-
A comparative study on feature selection in text categorization
-
D.H. Fisher ed, San Francisco: Morgan Kaufmann
-
Yang, Y., and Pedersen, J. O. A comparative study on feature selection in text categorization. In D.H. Fisher (ed.), Proceedings of the Fourteenth International Conference on Machine Learning. San Francisco: Morgan Kaufmann, 1997, pp. 412-420.
-
(1997)
Proceedings of the Fourteenth International Conference on Machine Learning
, pp. 412-420
-
-
Yang, Y.1
Pedersen, J.O.2
-
49
-
-
33644552803
-
A framework for authorship analysis of online messages: Writing-style features and techniques
-
Zheng, R.; Qin, Y.; Huang, Z.; and Chen, H. A framework for authorship analysis of online messages: Writing-style features and techniques. Journal of the American Society for Information Science and Technology, 57, 3 (2006), 378-393.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.3
, pp. 378-393
-
-
Zheng, R.1
Qin, Y.2
Huang, Z.3
Chen, H.4
|