[1]FBI San Diego. IC3 2011 Internet crime report released [EB/OL]. [2014-01-20]. http://www.fbi.gov/sandiego/press-releases/2012/ic3-2011-Internet-crime-report-released.
[2]KSE C, ZYURT , AMANMYRADOV G. Mining chat conversations for sex identification [C]// Proceedings of the 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining. Berlin: Springer, 2007: 45-55.
[3]CHENG N, CHNANDRAMOULI R, SUBBALAKSHIMI K P. Author gender identification from text [J]. Digital Investigation, 2011, 8(1): 78-88.
[4]MILLER Z, DICKINSON B, HU W. Gender prediction on twitter using stream algorithms with N-gram character features [J]. International Journal of Intelligence Science, 2012, 2(4): 143-148.
[5]KSE C, ZYURT , IKIBAS C. A comparison of textual data mining methods for sex identification in chat conversations [C]// Proceedings of the 4th Asia Information Retrieval Symposium. Berlin: Springer, 2008: 638-643.
[6]TANG Q, LIN H. Research on gender recognition for character in text [J]. Journal of Chinese Information Processing, 2010, 24(2): 46-51.(唐琴,林鸿飞.文本中人物性别识别研究[J].中文信息学报,2010,24(2):46-51.)
[7]LAKOFF R. Language and woman's place [M]. New York: Harper and Row, 1975.
[8]TALBOT M M. Language and gender: an introduction [M]. New Jersey: Wiley-Blackwell, 1998.
[9]ZHOU Y. Words that matter: gender features in the language use of weblog [D]. Hangzhou: Zhejiang University, 2007.(周炎.网络博客中的语言性别特征分析[D].杭州:浙江大学,2007.)
[10]HUANG F, ZHANG S, HE M, et al. Clustering Web documents using hierarchical representation with multi-granularity [J]. World Wide Web, 2014, 17(1): 105-126.
[11]PAWLAK Z. Rough sets: theoretical aspects of reasoning about data [M]. Hingham: Kluwer Academic Publishers, 1991.
[12]AIMIRA J, LUTHER U. Generalized approximation spaces and applications[J]. Mathematische Nachrichten, 2004,263/264(1):3-35. |