Sciweavers

TAL
2010
Springer
13 years 10 months ago
Clustering E-Mails for the Swedish Social Insurance Agency - What Part of the E-Mail Thread Gives the Best Quality?
We need to analyse a large number of e-mails sent by the citizens to the customer services department of a governmental organisation based in Sweden. To carry out this analysis we ...
Hercules Dalianis, Magnus Rosell, Eriks Sneiders
IEEECIT
2010
IEEE
13 years 10 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
SAC
2008
ACM
13 years 11 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
ISCI
2007
130views more  ISCI 2007»
13 years 12 months ago
Learning to classify e-mail
In this paper we study supervised and semi-supervised classification of e-mails. We consider two tasks: filing e-mails into folders and spam e-mail filtering. Firstly, in a sup...
Irena Koprinska, Josiah Poon, James Clark, Jason C...
AUSAI
2004
Springer
14 years 3 months ago
On Enhancing the Performance of Spam Mail Filtering System Using Semantic Enrichment
With the explosive growth of the Internet, e-mails are regarded as one of the most important methods to send e-mails as a substitute for traditional communications. As e-mail has b...
Hyun-Jun Kim, Heung-Nam Kim, Jason J. Jung, GeunSi...
DEXAW
1998
IEEE
160views Database» more  DEXAW 1998»
14 years 4 months ago
Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
Juha Takkinen, Nahid Shahmehri
SAC
2009
ACM
14 years 4 months ago
Spam decisions on gray e-mail using personalized ontologies
E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-ma...
Seongwook Youn, Dennis McLeod
NDSS
2003
IEEE
14 years 5 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
SCN
2004
Springer
112views Communications» more  SCN 2004»
14 years 5 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
ICICS
2004
Springer
14 years 5 months ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen