Sciweavers

35 search results - page 4 / 7
» Learning Spam: Simple Techniques For Freely-Available Softwa...
Sort
View
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
EEMMAS
2007
Springer
14 years 1 months ago
Complex Systems and Agent-Oriented Software Engineering
Although there is a huge amount of work and valuable proposals about agent oriented software engineering, it seems that the paradigm has not been fully accepted yet by software ind...
Juan Pavón, Francisco J. Garijo, Jorge J. G...
IUI
2003
ACM
14 years 21 days ago
Abbreviated text input
We address the problem of improving the efficiency of natural language text input under degraded conditions (for instance, on PDAs or cell phones or by disabled users) by taking a...
Stuart M. Shieber, Ellie Baker
IUI
2005
ACM
14 years 1 months ago
Intelligent data entry assistant for XML using ensemble learning
XML has emerged as the primary standard of data representation and data exchange [13]. Although many software tools exist to assist the XML implementation process, data must be ma...
Danico Lee, Costas Tsatsoulis
SIGSOFT
2008
ACM
14 years 8 months ago
Javert: fully automatic mining of general temporal properties from dynamic traces
Program specifications are important for many tasks during software design, development, and maintenance. Among these, temporal specifications are particularly useful. They expres...
Mark Gabel, Zhendong Su