Sciweavers

126 search results - page 9 / 26
» Email classification with co-training
Sort
View
CHI
2005
ACM
14 years 11 months ago
Managers' email: beyond tasks and to-dos
In this paper, we describe preliminary findings that indicate that managers and non-mangers think about their email differently. We asked three research managers and three researc...
Catalina Danis, Wendy A. Kellogg, Tessa A. Lau, Ma...
CHI
2005
ACM
14 years 11 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
CAIP
2007
Springer
134views Image Analysis» more  CAIP 2007»
14 years 2 months ago
An Efficient Method for Filtering Image-Based Spam E-mail
Spam e-mail with advertisement text embedded in images presents a great challenge to anti-spam filters. In this paper, we present a fast method to detect image-based spam e-mail. U...
Ngo Phuong Nhung, Tu Minh Phuong
OZCHI
2009
ACM
14 years 5 months ago
A study of email and SMS use in rural Indonesia
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Dean M. G. Hargreaves, Toni Robertson
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
14 years 5 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...