Sciweavers

775 search results - page 32 / 155
» Email data cleaning
Sort
View
IUI
2006
ACM
14 years 3 months ago
A hybrid learning system for recognizing user tasks from desktop activities and email messages
The TaskTracer system seeks to help multi-tasking users manage the resources that they create and access while carrying out their work activities. It does this by associating with...
Jianqiang Shen, Lida Li, Thomas G. Dietterich, Jon...
IQIS
2005
ACM
14 years 3 months ago
Exploiting relationships for object consolidation
Researchers in the data mining area frequently have to spend significant portion of their time on preprocessing the data in order to apply their algorithms to real-world datasets...
Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotr...
SOUPS
2006
ACM
14 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
SIGUCCS
2003
ACM
14 years 3 months ago
Achieving rapid service deployment in an academic environment
Rapid product or service deployment is most commonly thought of in the corporate, rather than academic, environment. Utilizing a rapid deployment process and a number of highly de...
Shea Nangle
STOC
1995
ACM
114views Algorithms» more  STOC 1995»
14 years 1 months ago
On data structures and asymmetric communication complexity
c communication case. This lemma generalizes and abstracts in a very clean form the ``round reduction'' techniques used in many previous lower bound proofs. ] 1998 Academ...
Peter Bro Miltersen, Noam Nisan, Shmuel Safra, Avi...