Sciweavers

775 search results - page 153 / 155
» Email data cleaning
Sort
View
OOPSLA
2005
Springer
14 years 4 months ago
Exploring the acceptability envelope
An acceptability envelope is a region of imperfect but acceptable software systems surrounding a given perfect system. Explicitly targeting the acceptability envelope during devel...
Martin C. Rinard, Cristian Cadar, Huu Hai Nguyen
SIGUCCS
2000
ACM
14 years 3 months ago
There is No Such Thing as Free Support
Every campus department needs computer support, from ordering and setting up new computers to installing software and answering software questions. This is in addition to training...
Dianne Brotherson
SIGUCCS
2000
ACM
14 years 3 months ago
Three Years in the Solution Center
After thirty-plus years of making small “mid-course corrections” types of changes to the support paradigm, many on the Iowa State University campus thought it was time to make...
Frank Poduska
DOCENG
2010
ACM
13 years 12 months ago
APEX: automated policy enforcement eXchange
: APEX: Automated Policy Enforcement eXchange Steven J. Simske, Helen Balinsky HP Laboratories HPL-2010-134 Policy, Text Analysis, Policy Server, Policy Editor, Document Systems, ...
Steven J. Simske, Helen Balinsky
CCS
2010
ACM
13 years 11 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...