Sciweavers

225 search results - page 32 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
CACM
2006
102views more  CACM 2006»
13 years 7 months ago
Infoglut
whose titles and abstracts sound very interesting, the pile of unread reports continues to grow on the table in my office." (How quaint the terminology: mail and electronic me...
Peter J. Denning
CSCW
2012
ACM
12 years 3 months ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
KDD
2009
ACM
170views Data Mining» more  KDD 2009»
14 years 8 months ago
Genre-based decomposition of email class noise
Corruption of data by class-label noise is an important practical concern impacting many classification problems. Studies of data cleaning techniques often assume a uniform label ...
Aleksander Kolcz, Gordon V. Cormack
CEAS
2008
Springer
13 years 9 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
PIMRC
2008
IEEE
14 years 2 months ago
Increasing SIP firewall performance by ruleset size limitation
Abstract— To protect SIP communication networks from attacks, especially flooding attacks like Denial-of-Service or message spam, Intrusion Detection Systems (IDS) are deployed ...
Sven Ehlert, Ge Zhang, Thomas Magedanz