Sciweavers

225 search results - page 27 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
EWCBR
2008
Springer
13 years 9 months ago
Provenance, Trust, and Sharing in Peer-to-Peer Case-Based Web Search
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
Peter Briggs, Barry Smyth
ICML
2007
IEEE
14 years 8 months ago
Supervised clustering of streaming data for email batch detection
We address the problem of detecting batches of emails that have been created according to the same template. This problem is motivated by the desire to filter spam more effectivel...
Peter Haider, Ulf Brefeld, Tobias Scheffer
SDM
2012
SIAM
304views Data Mining» more  SDM 2012»
11 years 10 months ago
Robust Reputation-Based Ranking on Bipartite Rating Networks
With the growth of the Internet and E-commerce, bipartite rating networks are ubiquitous. In such bipartite rating networks, there exist two types of entities: the users and the o...
Rong-Hua Li, Jeffrey Xu Yu, Xin Huang, Hong Cheng
IKE
2004
13 years 9 months ago
Analyzing Large Collections of Email
One of the first applications of the Internet was the electronic mailing (e-mail). Along with the evolution of the Internet, e-mail has evolved into a powerful and popular technolo...
Daniel A. Keim, Christian Panse, Jörn Schneid...
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay