Sciweavers

126 search results - page 9 / 26
» Email classification with co-training
Sort
View
CHI
2005
ACM
16 years 3 days ago
Managers' email: beyond tasks and to-dos
In this paper, we describe preliminary findings that indicate that managers and non-mangers think about their email differently. We asked three research managers and three researc...
Catalina Danis, Wendy A. Kellogg, Tessa A. Lau, Ma...
CHI
2005
ACM
16 years 3 days ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
103
Voted
CAIP
2007
Springer
134views Image Analysis» more  CAIP 2007»
15 years 3 months ago
An Efficient Method for Filtering Image-Based Spam E-mail
Spam e-mail with advertisement text embedded in images presents a great challenge to anti-spam filters. In this paper, we present a fast method to detect image-based spam e-mail. U...
Ngo Phuong Nhung, Tu Minh Phuong
OZCHI
2009
ACM
15 years 6 months ago
A study of email and SMS use in rural Indonesia
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Dean M. G. Hargreaves, Toni Robertson
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 6 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...