Sciweavers

1592 search results - page 16 / 319
» The state of the email address
Sort
View
CIKM
2001
Springer
14 years 11 days ago
Keeping Found Things Found on the Web
This paper describes the results of an observational study into the methods people use to manage web information for re-use. People observed in our study used a diversity of metho...
William P. Jones, Harry Bruce, Susan T. Dumais
CCS
2007
ACM
14 years 2 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
ICCCN
2007
IEEE
14 years 2 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms tha...
Theodor Richardson, Chin-Tser Huang
JELIA
1998
Springer
14 years 2 days ago
Towards State Update Axioms: Reifying Successor State Axioms
Successor state axioms are an optimal solution to the famous Frame Problem in reasoning about actions--but only as far as its representational aspect is concerned. We show how by g...
Michael Thielscher
ACSW
2006
13 years 9 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...