Sciweavers

194 search results - page 14 / 39
» The Technical Development of Internet Email
Sort
View
78
Voted
CEAS
2007
Springer
15 years 8 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
KBSE
2003
IEEE
15 years 7 months ago
A Programmable Client-Server Model: Robust Extensibility via DSLs
The client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature make...
Charles Consel, Laurent Réveillère
127
Voted
INFOCOM
2003
IEEE
15 years 7 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
IADIS
2003
15 years 3 months ago
E-Procurement Decision Support System for a Civil Construction Company
The Portuguese construction industry is, in an attempt to keep up with market demands, striving to maintain its competitiveness. The communication practices and policies throughou...
Jorge Aguiar Miguens, João Falcão e ...
DIGITALCITIES
2001
Springer
15 years 6 months ago
Knowledge-Based Economic Services Supported by Digital Experiments
Successful knowledge-based strategies for organizations require to build digital experiments which combine the power of networked information technologies like the Internet and the...
Dieter Rehfeld, Ileana Hamburg