Results 61 to 70 of about 3,474 (186)

Computational Measures of Deceptive Language: Prospects and Issues

open access: yesFrontiers in Communication, 2022
In this article, we wish to foster a dialogue between theory-based and classification-oriented stylometric approaches regarding deception detection. To do so, we review how cue-based and model-based stylometric systems are used to detect deceit. Baseline
Frédéric Tomas   +3 more
doaj   +1 more source

A topic modeling‐based bibliometric exploration of automatic summarization research

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 14, Issue 5, September/October 2024.
This work presents a topic modeling‐based bibliometric analysis of the scientific output from 2010 to 2022 regarding automatic summarization to understand research topics and trends, top sources, countries/regions, institutions, researchers, and scientific collaborations in the field.
Xieling Chen   +6 more
wiley   +1 more source

Navigating misinformation in voice messages: Identification of user‐centered features for digital interventions

open access: yesRisk, Hazards &Crisis in Public Policy, Volume 15, Issue 2, Page 203-235, June 2024.
Abstract Misinformation presents a challenge to democracies, particularly in times of crisis. One way in which misinformation is spread is through voice messages sent via messenger groups, which enable members to share information on a larger scale. Gaining user perspectives on digital misinformation interventions as countermeasure after detection is ...
Katrin Hartwig   +2 more
wiley   +1 more source

In search of an evolutionary coding style [PDF]

open access: yes, 2000
In the near future, all the human genes will be identified. But understanding the functions coded in the genes is a much harder problem. For example, by using block entropy, one has that the DNA code is closer to a random code then written text, which in
Lundh, Torbjörn
core   +2 more sources

Ass‐troll‐ogical Nashe: Revisiting Two Dangerous Comets and A Wonderful Prognostication

open access: yesRenaissance Studies, Volume 38, Issue 3, Page 335-362, June 2024.
Abstract This article revisits the authorship of and relationship between three mock‐prognostications published pseudonymously in 1591, drawing on contextual, bibliographical, and stylistical analysis to attribute Two Dangerous Comets and A Wonderful Prognostication to Thomas Nashe.
Rachel White, Brett Greatley‐Hirsch
wiley   +1 more source

Text Classification by Genre Based on Rhythm Features

open access: yesМоделирование и анализ информационных систем, 2021
The article is devoted to the analysis of the rhythm of texts of different genres: fiction novels, advertisements, scientific articles, reviews, tweets, and political articles.
Ksenia Vladimirovna Lagutina   +2 more
doaj   +1 more source

Drawing Elena Ferrante's Profile. Workshop Proceedings, Padova, 7 September 2017 [PDF]

open access: yes, 2018
Elena Ferrante is an internationally acclaimed Italian novelist whose real identity has been kept secret by E/O publishing house for more than 25 years.
Arjuna Tuzzi, Michele A. Cortelazzo
core  

Stylo visualisations of Middle English documents [PDF]

open access: yesJournal of Data Mining and Digital Humanities, 2020
International audience Automated approaches to identifying authorship of a text have become commonplace in the stylometric studies. The current article applies an unsupervised stylometric approach on Middle English documents using the script Stylo in R ...
Martti Mäkinen
doaj  

Dynamic Stylometry for Defect Prediction

open access: yes, 2016
All metrics used by QAs to assess code quality describe the characteristics of a ready-made code. In this article we propose a novel, different approach which tries to catch the dynamics of the coding process. For this purpose we utilize some basic ideas from the science of stylometry.
Roman, Adam, Babiarz, Rafał
openaire   +2 more sources

PATH: Person Authentication using Trace Histories

open access: yes, 2016
In this paper, a solution to the problem of Active Authentication using trace histories is addressed. Specifically, the task is to perform user verification on mobile devices using historical location traces of the user as a function of time. Considering
Chellappa, Rama, Mahbub, Upal
core   +1 more source

Home - About - Disclaimer - Privacy