Sciweavers

154 search results - page 9 / 31
» Spam Construction Trends
Sort
View
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
FLAIRS
2007
13 years 10 months ago
An Approach to Email Categorization with the ME Model
This paper puts forward a hierarchical approach for categorizing emails with the ME model based on its contents and properties. This approach categorizes emails in a two-phase way...
Peifeng Li, Jinhui Li, Qiaoming Zhu
CEAS
2008
Springer
13 years 9 months ago
Global-scale Anti-spam Testing in Your Own Back Yard
The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we deter...
Margaret Nielsen, Dane Bertram, Sampson Pun, John ...
WWW
2011
ACM
13 years 2 months ago
Wikipedia vandalism detection
Wikipedia is an online encyclopedia which anyone can edit. While most edits are constructive, about 7% are acts of vandalism. Such behavior is characterized by modifications made ...
Santiago Moisés Mola-Velasco
BMCBI
2005
104views more  BMCBI 2005»
13 years 7 months ago
Wildfire: distributed, Grid-enabled workflow construction and execution
Background: We observe two trends in bioinformatics: (i) analyses are increasing in complexity, often requiring several applications to be run as a workflow; and (ii) multiple CPU...
Francis Tang, Ching Lian Chua, Liang-Yoong Ho, Yun...