Sciweavers

CCR
2004
84views more  CCR 2004»
13 years 4 months ago
The state of the email address
Electronic mail is an unquestionably vital component of the Internet infrastructure. While the general perception of email is that it "just works," surprisingly little d...
Mike Afergan, Robert Beverly
KES
2006
Springer
13 years 4 months ago
Express Emoticons Choice Method for Smooth Communication of e-Business
For the business communication by email with cellular phones, it has an important weak point. That is to hard to tell to be utterance speed and the pitch of sounds involved in the ...
Nobuo Suzuki, Kazuhiko Tsuda
CN
2007
88views more  CN 2007»
13 years 4 months ago
DMTP: Controlling spam through message delivery differentiation
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current...
Zhenhai Duan, Yingfei Dong, Kartik Gopalan
CORR
2010
Springer
154views Education» more  CORR 2010»
13 years 4 months ago
A New Email Retrieval Ranking Approach
Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking...
Samir AbdelRahman, Basma Hassan, Reem Bahgat
ECSCW
2003
13 years 5 months ago
When Can I Expect an Email Response? A Study of Rhythms in Email Usage
A study of email responsiveness was conducted to understand how the timing of email responses conveys important information. Interviews and observations explored users’ perceptio...
Joshua R. Tyler, John C. Tang
LREC
2008
134views Education» more  LREC 2008»
13 years 5 months ago
Evaluating the Ontology underlying sMail - the Conceptual Framework for Semantic Email Communication
The lack of structure in the content of email messages makes it very hard for data channelled between the sender and the recipient to be correctly interpreted and acted upon. As a...
Simon Scerri, Myriam Mencke, Brian Davis, Siegfrie...
HCI
2007
13 years 5 months ago
Using Social Metadata in Email Triage: Lessons from the Field
Email archives are full of social information, including how messages are addressed and frequency of contact between senders and receivers. To study the use of this rich metadata ...
Danyel Fisher, A. J. Bernheim Brush, Bernie Hogan,...
CEAS
2008
Springer
13 years 6 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
CEAS
2008
Springer
13 years 6 months ago
Reducing E-Discovery Cost by Filtering Included Emails
As businesses become more reliance on information technology, electronic information is often produced as vital evidence during civil litigation. The process of discovering electr...
Tsuen-Wan Ngan
CEAS
2008
Springer
13 years 6 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown