Sciweavers

CEAS
2004
Springer
14 years 3 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
CEAS
2004
Springer
14 years 1 months ago
Managing Customer Opt-Outs in a Complex Global Environment
The day to day rhetoric associated with spam control focuses on measures, technology, rules or fees to impose order or control. These efforts concentrate on the broad range of mess...
Matt Leonard, Mayra Rodriguez, Richard Segal, Robe...
CEAS
2004
Springer
14 years 3 months ago
IP Addresses in Email Clients
IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP add...
Joshua Goodman
CEAS
2004
Springer
14 years 3 months ago
Word Stemming to Enhance Spam Filtering
Generally a content based spam filter works on words and phrases of email text and if it finds offensive content it gives that email a numerical value (depending on the content). A...
Shabbir Ahmed, Farzana Mithun
CEAS
2004
Springer
14 years 3 months ago
SpamBayes: Effective open-source, Bayesian based, email classification system
This paper introduces the SpamBayes classification engine and outlines the most important features and techniques which contribute to its success. The importance of using the indet...
Tony A. Meyer, Brendon Whateley
Internet Technology
Top of PageReset Settings