Literary detective work on the computer:
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Amsterdam
John Benjamins Publishing Company
2014
|
Schlagwörter: | |
Links: | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 |
Beschreibung: | Computational linguistics can be used to uncover mysteries in text which are not always obvious to visual inspection. For example, the computer analysis of writing style can show who might be the true author of a text in cases of disputed authorship or suspected plagiarism. The theoretical background to authorship attribution is presented in a step by step manner, and comprehensive reviews of the field are given in two specialist areas, the writings of William Shakespeare and his contemporaries, and the various writing styles seen in religious texts. The final chapter looks at the progress com Author Identification -- Plagiarism and Spam Filtering -- Computer Studies Of Shakespearean Authorship -- Stylometric Analysis Of Religious Texts -- Computers and Decipherment |
Umfang: | 1 Online-Ressource |
ISBN: | 1306705908 9027270139 9781306705905 9789027270139 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV043129970 | ||
003 | DE-604 | ||
005 | 20160822 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2014 xx o|||| 00||| eng d | ||
020 | |a 1306705908 |9 1-306-70590-8 | ||
020 | |a 9027270139 |9 90-272-7013-9 | ||
020 | |a 9781306705905 |9 978-1-306-70590-5 | ||
020 | |a 9789027270139 |9 978-90-272-7013-9 | ||
035 | |a (OCoLC)878920007 | ||
035 | |a (DE-599)BVBBV043129970 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 006.3 |2 22 | |
082 | 0 | |a 006.35 | |
100 | 1 | |a Oakes, Michael P. |e Verfasser |0 (DE-588)1057567302 |4 aut | |
245 | 1 | 0 | |a Literary detective work on the computer |c Michael P. Oakes |
264 | 1 | |a Amsterdam |b John Benjamins Publishing Company |c 2014 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Computational linguistics can be used to uncover mysteries in text which are not always obvious to visual inspection. For example, the computer analysis of writing style can show who might be the true author of a text in cases of disputed authorship or suspected plagiarism. The theoretical background to authorship attribution is presented in a step by step manner, and comprehensive reviews of the field are given in two specialist areas, the writings of William Shakespeare and his contemporaries, and the various writing styles seen in religious texts. The final chapter looks at the progress com | ||
500 | |a Author Identification -- Plagiarism and Spam Filtering -- Computer Studies Of Shakespearean Authorship -- Stylometric Analysis Of Religious Texts -- Computers and Decipherment | ||
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 7 | |a Authorship / Study and teaching |2 fast | |
650 | 7 | |a Computational linguistics / Research |2 fast | |
650 | 7 | |a Imitation in literature |2 fast | |
650 | 7 | |a Linguistics / Research / Methodology |2 fast | |
650 | 7 | |a Plagiarism |2 fast | |
650 | 4 | |a Linguistik | |
650 | 4 | |a Computational linguistics |x Research | |
650 | 4 | |a Imitation in literature | |
650 | 4 | |a Plagiarism | |
650 | 4 | |a Linguistics |x Research |x Methodology | |
650 | 4 | |a Authorship |x Study and teaching | |
650 | 0 | 7 | |a Sprachanalyse |0 (DE-588)4129916-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Plagiat |0 (DE-588)4046196-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerlinguistik |0 (DE-588)4035843-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Literatur |0 (DE-588)4035964-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Autorschaft |0 (DE-588)4130545-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Literatur |0 (DE-588)4035964-5 |D s |
689 | 0 | 1 | |a Autorschaft |0 (DE-588)4130545-0 |D s |
689 | 0 | 2 | |a Plagiat |0 (DE-588)4046196-8 |D s |
689 | 0 | 3 | |a Computerlinguistik |0 (DE-588)4035843-4 |D s |
689 | 0 | 4 | |a Sprachanalyse |0 (DE-588)4129916-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-028554161 | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 |l DE-1046 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 |l DE-1047 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818981296985079808 |
---|---|
any_adam_object | |
author | Oakes, Michael P. |
author_GND | (DE-588)1057567302 |
author_facet | Oakes, Michael P. |
author_role | aut |
author_sort | Oakes, Michael P. |
author_variant | m p o mp mpo |
building | Verbundindex |
bvnumber | BV043129970 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)878920007 (DE-599)BVBBV043129970 |
dewey-full | 006.3 006.35 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 006.35 |
dewey-search | 006.3 006.35 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03463nam a2200673zc 4500</leader><controlfield tag="001">BV043129970</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160822 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2014 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306705908</subfield><subfield code="9">1-306-70590-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9027270139</subfield><subfield code="9">90-272-7013-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306705905</subfield><subfield code="9">978-1-306-70590-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789027270139</subfield><subfield code="9">978-90-272-7013-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)878920007</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043129970</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.35</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oakes, Michael P.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1057567302</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Literary detective work on the computer</subfield><subfield code="c">Michael P. Oakes</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">John Benjamins Publishing Company</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Computational linguistics can be used to uncover mysteries in text which are not always obvious to visual inspection. For example, the computer analysis of writing style can show who might be the true author of a text in cases of disputed authorship or suspected plagiarism. The theoretical background to authorship attribution is presented in a step by step manner, and comprehensive reviews of the field are given in two specialist areas, the writings of William Shakespeare and his contemporaries, and the various writing styles seen in religious texts. The final chapter looks at the progress com</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Author Identification -- Plagiarism and Spam Filtering -- Computer Studies Of Shakespearean Authorship -- Stylometric Analysis Of Religious Texts -- Computers and Decipherment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Authorship / Study and teaching</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computational linguistics / Research</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Imitation in literature</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linguistics / Research / Methodology</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Plagiarism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linguistik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational linguistics</subfield><subfield code="x">Research</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Imitation in literature</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Plagiarism</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linguistics</subfield><subfield code="x">Research</subfield><subfield code="x">Methodology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Authorship</subfield><subfield code="x">Study and teaching</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sprachanalyse</subfield><subfield code="0">(DE-588)4129916-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Plagiat</subfield><subfield code="0">(DE-588)4046196-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Literatur</subfield><subfield code="0">(DE-588)4035964-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Autorschaft</subfield><subfield code="0">(DE-588)4130545-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Literatur</subfield><subfield code="0">(DE-588)4035964-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Autorschaft</subfield><subfield code="0">(DE-588)4130545-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Plagiat</subfield><subfield code="0">(DE-588)4046196-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computerlinguistik</subfield><subfield code="0">(DE-588)4035843-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Sprachanalyse</subfield><subfield code="0">(DE-588)4129916-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028554161</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043129970 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T17:29:04Z |
institution | BVB |
isbn | 1306705908 9027270139 9781306705905 9789027270139 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028554161 |
oclc_num | 878920007 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | John Benjamins Publishing Company |
record_format | marc |
spelling | Oakes, Michael P. Verfasser (DE-588)1057567302 aut Literary detective work on the computer Michael P. Oakes Amsterdam John Benjamins Publishing Company 2014 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Computational linguistics can be used to uncover mysteries in text which are not always obvious to visual inspection. For example, the computer analysis of writing style can show who might be the true author of a text in cases of disputed authorship or suspected plagiarism. The theoretical background to authorship attribution is presented in a step by step manner, and comprehensive reviews of the field are given in two specialist areas, the writings of William Shakespeare and his contemporaries, and the various writing styles seen in religious texts. The final chapter looks at the progress com Author Identification -- Plagiarism and Spam Filtering -- Computer Studies Of Shakespearean Authorship -- Stylometric Analysis Of Religious Texts -- Computers and Decipherment COMPUTERS / General bisacsh Authorship / Study and teaching fast Computational linguistics / Research fast Imitation in literature fast Linguistics / Research / Methodology fast Plagiarism fast Linguistik Computational linguistics Research Imitation in literature Plagiarism Linguistics Research Methodology Authorship Study and teaching Sprachanalyse (DE-588)4129916-4 gnd rswk-swf Plagiat (DE-588)4046196-8 gnd rswk-swf Computerlinguistik (DE-588)4035843-4 gnd rswk-swf Literatur (DE-588)4035964-5 gnd rswk-swf Autorschaft (DE-588)4130545-0 gnd rswk-swf Literatur (DE-588)4035964-5 s Autorschaft (DE-588)4130545-0 s Plagiat (DE-588)4046196-8 s Computerlinguistik (DE-588)4035843-4 s Sprachanalyse (DE-588)4129916-4 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Oakes, Michael P. Literary detective work on the computer COMPUTERS / General bisacsh Authorship / Study and teaching fast Computational linguistics / Research fast Imitation in literature fast Linguistics / Research / Methodology fast Plagiarism fast Linguistik Computational linguistics Research Imitation in literature Plagiarism Linguistics Research Methodology Authorship Study and teaching Sprachanalyse (DE-588)4129916-4 gnd Plagiat (DE-588)4046196-8 gnd Computerlinguistik (DE-588)4035843-4 gnd Literatur (DE-588)4035964-5 gnd Autorschaft (DE-588)4130545-0 gnd |
subject_GND | (DE-588)4129916-4 (DE-588)4046196-8 (DE-588)4035843-4 (DE-588)4035964-5 (DE-588)4130545-0 |
title | Literary detective work on the computer |
title_auth | Literary detective work on the computer |
title_exact_search | Literary detective work on the computer |
title_full | Literary detective work on the computer Michael P. Oakes |
title_fullStr | Literary detective work on the computer Michael P. Oakes |
title_full_unstemmed | Literary detective work on the computer Michael P. Oakes |
title_short | Literary detective work on the computer |
title_sort | literary detective work on the computer |
topic | COMPUTERS / General bisacsh Authorship / Study and teaching fast Computational linguistics / Research fast Imitation in literature fast Linguistics / Research / Methodology fast Plagiarism fast Linguistik Computational linguistics Research Imitation in literature Plagiarism Linguistics Research Methodology Authorship Study and teaching Sprachanalyse (DE-588)4129916-4 gnd Plagiat (DE-588)4046196-8 gnd Computerlinguistik (DE-588)4035843-4 gnd Literatur (DE-588)4035964-5 gnd Autorschaft (DE-588)4130545-0 gnd |
topic_facet | COMPUTERS / General Authorship / Study and teaching Computational linguistics / Research Imitation in literature Linguistics / Research / Methodology Plagiarism Linguistik Computational linguistics Research Linguistics Research Methodology Authorship Study and teaching Sprachanalyse Plagiat Computerlinguistik Literatur Autorschaft |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=770267 |
work_keys_str_mv | AT oakesmichaelp literarydetectiveworkonthecomputer |