A technique for computer detection and correction of spelling errors.

Commun. ACM 01/1964; 7:171-176. DOI: 10.1145/363958.363994
Source: DBLP

ABSTRACT The method described assumes that a word which cannot be found in a dictionary has at most one error, which might be a wrong, missing or extra letter or a single transposition. The unidentified input word is compared to the dictionary again, testing each time to see if the words match—assuming one of these errors occurred. During a test run on garbled text, correct identifications were made for over 95 percent of these error types.

  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Chinese Pinyin input method is very important for Chinese language information processing. Users may make errors when they are typing in Chinese words. In this paper, we are concerned with the reasons that cause the errors. Inspired by the observation that pressing backspace is one of the most common user behaviors to modify the errors, we collect 54, 309, 334 error-correction pairs from a real-world data set that contains 2, 277, 786 users via backspace operations. In addition, we present a comparative analysis of the data to achieve a better understanding of users' input behaviors. Comparisons with English typos suggest that some language-specific properties result in a part of Chinese input errors.
    The 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Proceedings of the Conference, 19-24 June, 2011, Portland, Oregon, USA - Short Papers; 01/2011
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Third-party applications (apps) drive the attractiveness of web and mobile application platforms. Many of these platforms adopt a decentralized control strategy, relying on explicit user consent for granting permissions that the apps request. Users have to rely primarily on community ratings as the signals to identify the potentially harmful and inappropriate apps even though community ratings typically reflect opinions about perceived functionality or performance rather than about risks. With the arrival of HTML5 web apps, such user-consent permission systems will become more widespread. We study the effectiveness of user-consent permission systems through a large scale data collection of Facebook apps, Chrome extensions and Android apps. Our analysis confirms that the current forms of community ratings used in app markets today are not reliable indicators of privacy risks of an app. We find some evidence indicating attempts to mislead or entice users into granting permissions: free applications and applications with mature content request more permissions than is typical; 'look-alike' applications which have names similar to popular applications also request more permissions than is typical. We also find that across all three platforms popular applications request more permissions than average.
    Proceedings of the 21th International World Wide Web Conference (WWW 2012); 04/2012
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper describes a self-modelling, incremental algorithln for learning translation rules froill existing bilingual corpora. The notions of supracontext and subcontext are extended to encompass bilingual inforlnation through simultaneous analogy on both source and target sentences and juxtaposition of corresponding results. Analogical modelling is perforlned during the learuing phase and translation patterils are projected in a multi-dimensional analogical network. The proposed fi'amework was evaluated on a sinall trailting corpus providing promising results. Suggestions to improve system performance are 1.

Full-text (4 Sources)

Available from