<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Homotopy Based Classification for Author Verification Task</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Josue Gutierrez</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jose Casillas</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paola Ledesma</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gibran Fuentes</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ivan Meza</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Escuela Nacional de Antropologia e Historia</institution>
          ,
          <addr-line>ENAH</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Facultad de Ciencias (FC) Universidad Nacional Autonoma de Mexico</institution>
          ,
          <addr-line>UNAM</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Instituto de Investigaciones en Matematicas Aplicadas y en Sistemas</institution>
          ,
          <addr-line>IIMAS</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <abstract>
        <p>This paper presents our experience implementing a homotopy-based classification (HBC) system for the 'PAN 2015 Author Identification' [20]. Known documents from a specific author and randomly selected impostor documents are used as a dictionary to generate a contested document. Given the contribution of the known documents to the contested document we can verify the authorship of the document. This classification is embedded into the General Impostor Method resulting in an ensemble of the SBC model.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        Author verification has multiple applications in several areas including information
retrieval and computational linguistics, and has an impact in fields such as law and
journalism [
        <xref ref-type="bibr" rid="ref10 ref18 ref8">8,10,18</xref>
        ]. In this edition of the PAN 2015 Author Identification, the task was
formally defined as follows1:
      </p>
      <p>Given a small set (no more than 5, possibly as few as one) of "known"
documents by a single person and a "questioned" document, the task is to
determine whether the questioned document was written by the same person who
wrote the known document set. The genre and/or topic may differ significantly
between the known and unknown documents.</p>
      <p>This edition had documents in English, Spanish, Dutch and Greek.</p>
      <p>
        In this work we present our approach for author verification based on sparse-based
classification. Homotopy-based Classification (HBC) was first proposed for face
recognition in this setting the goal is to measure the contribution of known faces in the
generation of an unknown face. The amount of contribution determines the identity of the
person with the unknown face [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. This work is a continuation from the previous
version of our system [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In this version we have normalized the extraction of document
representation; additionally, we have added character-level features.
1 As described in the official website of the competition http://pan.webis.de/ (2015).
      </p>
    </sec>
    <sec id="sec-2">
      <title>Previous work</title>
      <p>
        Author verification is considered a corner stone of the authorship analysis together
with authorship attribution, author profiling and plagiarism detection tasks [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
Current work on the field depends on similarity metrics among texts such as: Jaccard,
cosine, Euclidean and min-max similarities. As aforementioned the general impostor
method has been successful at using similarity measures relative to documents in the
domain [
        <xref ref-type="bibr" rid="ref17 ref9">17,9</xref>
        ]. On the other hand, clustering approaches highly depends on similarity
measures [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Alternative methods for combining distances have been also proposed [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Even the
Common N-gram (CNG) method which was originally proposed for author profiling
had been adapted to author verification and it can be interpreted as a particular similarity
metric [
        <xref ref-type="bibr" rid="ref13 ref4">4,13</xref>
        ]. Metric distances have been important on the field since they facilitate an
unsupervised framework for the task. In order to surpass some of the limitations of
similarity metrics supervised approaches had been explore [
        <xref ref-type="bibr" rid="ref16 ref7">7,16</xref>
        ]. Hybrid approaches
on which model is built on a feature space based on similarity metrics had also been
proposed with mixed results [
        <xref ref-type="bibr" rid="ref14 ref5">5,14</xref>
        ].
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Document representation</title>
      <p>
        We use the vector space model to represent the documents. In this edition we use the
following features:
1. Bag of words Frequencies of words in the document.
2. Bigram of words Frequencies of two consecutive words.
3. Punctuation Frequencies of punctuations.
4. Trigram of words Frequencies up to three consecutive letters.
In order to present our proposal first we review the GI method, and the homotopy-based
classification, to follow with our proposal.
The GI method is a second order binary similarity metric for collections of
documents [
        <xref ref-type="bibr" rid="ref11 ref12">11,12</xref>
        ]. It uses two functions: the similarity metric sim that compares pairwise
documents, and the aggregate function agg to allow for comparing collections of
documents. The aggregate function does not work directly with the similarity function, it
rather aggregates the score calculated by the original impostor method which is also
a pairwise metric. This method has been described as an ensemble of random models
since several comparisons are performed with randomly selected impostors [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        The procedure to generate the impostor collection is the following: First, randomly
select n terms of a document and made a query to a search engine. Second, from the
results keep the first m results. Third for each result only take the k first words. Finally,
repeat this m times.
At the core of the proposal is performing variable selection over the equation system
represented in Figure 1 by optimizing the following objective x0 = argminjjxjj1.
A 2 &lt;MxN is a matrix composed of N columns of document examples for which
we know their associated authorship: known author (K) or impostor (I). x 2 &lt;N is a
vector that when linearly combined with A generates the y 2 &lt;M vector of the
questioned document. In particular a desirable x will be sparse so that variables are zeroed
and ignored in the reconstruction of y. To reach this type of solution we chose the
L1-homotopy algorithm which was used to find a sparse solution on an undetermined
system of equations [
        <xref ref-type="bibr" rid="ref1 ref3">3,1</xref>
        ].
      </p>
      <p>y
xN</p>
      <p>Wright et. al propose to calculate the residuals for each i identity represented in the
matrix A using the following formula:
ri(y) = jy</p>
      <p>Ax0ij
(1)
A vector x0i is created for which we zeroed the values of x0 that do not correspond to the
i identity. Thus the ri represents the difference between the unknown document and the
reconstructed document using only elements corresponding to the same identity. After
calculating the residual per identity, we look for the lower residual for figure out the
identity.</p>
      <p>Following this procedure we are able to assign one of the identities to the questioned
document: T rue if the residual i corresponds to the author of documents D, if not
F alse.
4.3</p>
      <p>GI with Homotopy-based Classification
Algorithm 1 shows the adaptation of the GI method to be used on the homotopy based
classification. The aggregate function agg iterates over a pairs of documents in the
collections to compare. It aggregates similarities based on the Homotopy-based
Classification procedure (HC) described above. At the end, the GIhc is a voting system over
randomly selected impostors.</p>
      <p>Algorithm 1 The General Impostor within sparse approximation</p>
      <p>jDj))
procedure HC(D,y,I)</p>
      <p>Ir (random(I; %; N
Dr (random(D; %))
A Ir + Dr
x0 homotopy(A; y)
for i I do</p>
      <p>ri jy Ax0ij
end for
if argmini ri = Di then</p>
      <p>returnT rue
else</p>
      <p>returnF alse
end if
end procedure
procedure GIHC (D1,D2,I)
for dj D2 do
for k K do</p>
      <p>agg[HC(D1; dj; I)]
end for
end for
returnagg
end procedure
5</p>
    </sec>
    <sec id="sec-4">
      <title>Results</title>
      <p>
        The performance of our approach is presented in Table 5 calculated using the TIRA [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Our approach performed the best for English (3rd position) while the worst performance
was for Dutch (9th position). From our development experiments we hypothesize that
this was related to the texts being shorter for this language than the rest.
In this year’s submission we have explored the use of Homotopy-based
Classification (HBC) for the verification of authorship. This is a continuation from our previous
work. In particular in this edition we embedded our approach into the general impostor
method. The performance of our system was stable for three languages: English, Greek
and Spanish; but it was severely affected by the size of text in the Dutch case.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Asif</surname>
            ,
            <given-names>M.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Romberg</surname>
          </string-name>
          , J.:
          <article-title>Sparse recovery of streaming signals using l1-homotopy</article-title>
          .
          <source>arXiv preprint arXiv:1306.3331</source>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Castillo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cervantes</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vilariño</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pinto</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>León</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Unsupervised method for the authorship identification task</article-title>
          .
          <source>In: Working Notes for CLEF 2014 Conference</source>
          . pp.
          <fpage>1035</fpage>
          -
          <lpage>1041</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Donoho</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsaig</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Fast solution of-norm minimization problems when the solution may be sparse</article-title>
          .
          <source>Information Theory</source>
          , IEEE Transactions on
          <volume>54</volume>
          (
          <issue>11</issue>
          ),
          <fpage>4789</fpage>
          -
          <lpage>4812</lpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Frantzeskou</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gritzalis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chaski</surname>
            ,
            <given-names>C.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Howald</surname>
            ,
            <given-names>B.S.:</given-names>
          </string-name>
          <article-title>Identifying authorship by byte-level n-grams: The source code author profile (scap) method</article-title>
          .
          <source>International Journal of Digital Evidence</source>
          <volume>6</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Fréry</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Largeron</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Juganaru-Mathieu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Ujm at clef in author identification</article-title>
          .
          <source>In: Working Notes for CLEF 2014 Conference</source>
          . pp.
          <fpage>1042</fpage>
          -
          <lpage>1048</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Gollub</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stein</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Burrows</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Ousting Ivory Tower Research:
          <article-title>Towards a Web Framework for Providing Experiments as a Service</article-title>
          . In: Hersh,
          <string-name>
            <given-names>B.</given-names>
            ,
            <surname>Callan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Maarek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Sanderson</surname>
          </string-name>
          , M. (eds.) 35th
          <source>International ACM Conference on Research and Development in Information Retrieval (SIGIR 12)</source>
          . pp.
          <fpage>1125</fpage>
          -
          <lpage>1126</lpage>
          . ACM (Aug
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Halvani</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steinebach</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zimmermann</surname>
          </string-name>
          , R.:
          <article-title>Authorship verification via k-nearest neighbor estimation notebook for pan at clef 2013</article-title>
          . In: Working Notes for CLEF 2013 Conference (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Juola</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Authorship attribution</article-title>
          .
          <source>Found. Trends Inf. Retr</source>
          .
          <volume>1</volume>
          (
          <issue>3</issue>
          ),
          <fpage>233</fpage>
          -
          <lpage>334</lpage>
          (
          <year>Dec 2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Khonji</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Iraqi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>A slightly-modified gi-based author-verifier with lots of features (asgalf)</article-title>
          .
          <source>In: Working Notes for CLEF 2014 Conference</source>
          . pp.
          <fpage>977</fpage>
          -
          <lpage>983</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Argamon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Computational methods in authorship attribution</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <issue>1</issue>
          ),
          <fpage>9</fpage>
          -
          <lpage>26</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schler</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Argamon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Computational methods in authorship attribution</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <issue>1</issue>
          ) (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Koppel</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Seidman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Automatically identifying pseudepigraphic texts</article-title>
          .
          <source>In: EMNLP</source>
          . pp.
          <fpage>1449</fpage>
          -
          <lpage>1454</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Layton</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Watters</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dazeley</surname>
          </string-name>
          , R.:
          <article-title>Local n-grams for author identification-notebook for pan at clef 2013</article-title>
          . In: Working Notes for CLEF 2013 Conference (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ledesma</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fuentes</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jasso</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toledo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meza</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          :
          <article-title>Distance learning for author verification</article-title>
          . In:
          <article-title>CLEF 2013 Evaluation Labs</article-title>
          and Workshop - Online Working Notes (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Mayor</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutierrez</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toledo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ledesma</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fuentes</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meza</surname>
            ,
            <given-names>I.:</given-names>
          </string-name>
          <article-title>A single author style representation for the author verification task</article-title>
          .
          <source>In: Working Notes for CLEF 2014 Conference</source>
          . pp.
          <fpage>1079</fpage>
          -
          <lpage>1083</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Moreau</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jayapal</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vogel</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Author verification: Exploring a large set of parameters using a genetic algorithm</article-title>
          .
          <source>In: Working Notes for CLEF 2014 Conference</source>
          . pp.
          <fpage>1092</fpage>
          -
          <lpage>1103</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Seidman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Authorship verification using the impostors method-notebook for pan at clef 2013</article-title>
          . In: Working Notes for CLEF 2013 Conference (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Stamatatos</surname>
          </string-name>
          , E.:
          <article-title>A survey of modern authorship attribution methods</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <issue>3</issue>
          ),
          <fpage>538</fpage>
          -
          <lpage>556</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Stamatatos</surname>
          </string-name>
          , E.:
          <article-title>A survey of modern authorship attribution methods</article-title>
          .
          <source>Journal of the American Society for Information Science and Technology</source>
          <volume>60</volume>
          (
          <issue>3</issue>
          ),
          <fpage>538</fpage>
          -
          <lpage>556</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Stamatatos</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Daelemans</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verhoeven</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Juola</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lopez</surname>
            <given-names>Lopez</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            ,
            <surname>Potthast</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Stein</surname>
          </string-name>
          ,
          <string-name>
            <surname>B.</surname>
          </string-name>
          :
          <article-title>Overview of the Author Identification Task at PAN 2015</article-title>
          .
          <article-title>In: Working Notes Papers of the CLEF 2015 Evaluation Labs</article-title>
          .
          <source>CEUR Workshop Proceedings, CLEF and CEUR-WS.org (Sep</source>
          <year>2015</year>
          ), http://www.clef-initiative.eu/publication/working-notes
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Wright</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>A.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganesh</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sastry</surname>
            ,
            <given-names>S.S.</given-names>
          </string-name>
          , Ma, Y.:
          <article-title>Robust face recognition via sparse representation</article-title>
          .
          <source>Pattern Analysis and Machine Intelligence</source>
          ,
          <source>IEEE Transactions on 31(2)</source>
          ,
          <fpage>210</fpage>
          -
          <lpage>227</lpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>