Sciweavers

16 search results - page 2 / 4
» Beyond Keyword Filtering for Message and Conversation Detect...
Sort
View
RECSYS
2009
ACM
13 years 11 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
ECRIME
2007
13 years 9 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm
CHI
2002
ACM
14 years 5 months ago
Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap
In this paper we describe an evaluation of behavioral descriptors generated from an analysis of a large collection of Usenet newsgroup messages. The metrics describe aspects of ne...
Andrew T. Fiore, Scott Lee Tiernan, Marc A. Smith
IH
2001
Springer
13 years 9 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
DOCENG
2006
ACM
13 years 11 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...