Scalability Issues in Authorship Attribution


Book Description

Provides an in-depth and systematic study of the so-called scalability issues in authorship attribution -- the task that aims to identify the author of a text, given a model of authorial style based on texts of known authorship. Computational authorship attribution does not rely on in-depth reading, but rather automates the process. This book investigates the behavior of a text categorization approach to the task when confronted with scalability issues. By addressing the issues of experimental design, data size, and author set size, the dissertation demonstrates whether the approach taken is valid in experiments with limited or sufficient data, and with small or large sets of authors.




Authorship Attribution


Book Description

Authorship Attribution surveys the history and present state of the discipline, presenting some comparative results where available. It also provides a theoretical and empirically-tested basis for further work. Many modern techniques are described and evaluated, along with some insights for application for novices and experts alike.




Advances in Computational Intelligence


Book Description

The two-volume set LNAI 7629 and LNAI 7630 constitutes the refereed proceedings of the 11th Mexican International Conference on Artificial Intelligence, MICAI 2012, held in San Luis Potosí, Mexico, in October/November 2012. The 80 revised papers presented were carefully reviewed and selected from 224 submissions. The second volume includes 40 papers focusing on soft computing. The papers are organized in the following topical sections: natural language processing; evolutionary and nature-inspired metaheuristic algorithms; neural networks and hybrid intelligent systems; fuzzy systems and probabilistic models in decision making.




Computational Linguistics and Intelligent Text Processing


Book Description

This two-volume set, consisting of LNCS 7816 and LNCS 7817, constitutes the thoroughly refereed proceedings of the 13th International Conference on Computer Linguistics and Intelligent Processing, CICLING 2013, held on Samos, Greece, in March 2013. The total of 91 contributions presented was carefully reviewed and selected for inclusion in the proceedings. The papers are organized in topical sections named: general techniques; lexical resources; morphology and tokenization; syntax and named entity recognition; word sense disambiguation and coreference resolution; semantics and discourse; sentiment, polarity, subjectivity, and opinion; machine translation and multilingualism; text mining, information extraction, and information retrieval; text summarization; stylometry and text simplification; and applications.




Social Network Analytics for Contemporary Business Organizations


Book Description

Social technology is quickly becoming a vital tool in our personal, educational, and professional lives. Its use must be further examined in order to determine the role of social media technology in organizational settings to promote business development and growth. Social Network Analytics for Contemporary Business Organizations is a critical scholarly resource that analyzes the application of social media in business applications. Featuring coverage on a broad range of topics, such as business management, dynamic networks, and online interaction, this book is geared towards professionals, researchers, academics, students, managers, and practitioners actively involved in the business industry.




Advanced Data Mining and Applications


Book Description

The two-volume set LNAI 8346 and 8347 constitutes the thoroughly refereed proceedings of the 9th International Conference on Advanced Data Mining and Applications, ADMA 2013, held in Hangzhou, China, in December 2013. The 32 regular papers and 64 short papers presented in these two volumes were carefully reviewed and selected from 222 submissions. The papers included in these two volumes cover the following topics: opinion mining, behavior mining, data stream mining, sequential data mining, web mining, image mining, text mining, social network mining, classification, clustering, association rule mining, pattern mining, regression, predication, feature extraction, identification, privacy preservation, applications, and machine learning.




Intelligent Computing and Applications


Book Description

The idea of the 1st International Conference on Intelligent Computing and Applications (ICICA 2014) is to bring the Research Engineers, Scientists, Industrialists, Scholars and Students together from in and around the globe to present the on-going research activities and hence to encourage research interactions between universities and industries. The conference provides opportunities for the delegates to exchange new ideas, applications and experiences, to establish research relations and to find global partners for future collaboration. The proceedings covers latest progresses in the cutting-edge research on various research areas of Image, Language Processing, Computer Vision and Pattern Recognition, Machine Learning, Data Mining and Computational Life Sciences, Management of Data including Big Data and Analytics, Distributed and Mobile Systems including Grid and Cloud infrastructure, Information Security and Privacy, VLSI, Electronic Circuits, Power Systems, Antenna, Computational fluid dynamics & Heat transfer, Intelligent Manufacturing, Signal Processing, Intelligent Computing, Soft Computing, Bio-informatics, Bio Computing, Web Security, Privacy and E-Commerce, E-governance, Service Orient Architecture, Data Engineering, Open Systems, Optimization, Communications, Smart wireless and sensor Networks, Smart Antennae, Networking and Information security, Machine Learning, Mobile Computing and Applications, Industrial Automation and MES, Cloud Computing, Green IT, IT for Rural Engineering, Business Computing, Business Intelligence, ICT for Education for solving hard problems, and finally to create awareness about these domains to a wider audience of practitioners.




The Arden Research Handbook of Contemporary Shakespeare Criticism


Book Description

The Arden Research Handbook of Contemporary Shakespeare Criticism is a wide-ranging, authoritative guide to research on critical approaches to Shakespeare by an international team of leading scholars. It contains chapters on 20 specific critical practices, each grounded in analysis of a Shakespeare play. These practices range from foundational approaches including character studies, close reading and genre studies, through those that emerged in the 1970s and 1980s that challenged the preconceptions on which traditional liberal humanism is based, including feminism, cultural materialism and new historicism. Perspectives drawn from postcolonial, queer studies and critical race studies, besides more recent critical practices including presentism, ecofeminism and cognitive ethology all receive detailed treatment. In addition to its coverage of distinct critical approaches, the handbook contains various sections that provide non-specialists with practical help: an A–Z glossary of key terms and concepts, a chronology of major publications and events, an introduction to resources for study of the field and a substantial annotated bibliography.




Machine Learning for Authorship Attribution and Cyber Forensics


Book Description

The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law.




Computation and the Humanities


Book Description

This book addresses the application of computing to cultural heritage and the discipline of Digital Humanities that formed around it. Digital Humanities research is transforming how the Human record can be transmitted, shaped, understood, questioned and imagined and it has been ongoing for more than 70 years. However, we have no comprehensive histories of its research trajectory or its disciplinary development. The authors make a first contribution towards remedying this by uncovering, documenting, and analysing a number of the social, intellectual and creative processes that helped to shape this research from the 1950s until the present day. By taking an oral history approach, this book explores questions like, among others, researchers’ earliest memories of encountering computers and the factors that subsequently prompted them to use the computer in Humanities research. Computation and the Humanities will be an essential read for cultural and computing historians, digital humanists and those interested in developments like the digitisation of cultural heritage and artefacts. This book is open access under a CC BY-NC 2.5 license