Sciweavers

1592 search results - page 31 / 319
» The state of the email address
Sort
View
CGF
2004
145views more  CGF 2004»
13 years 7 months ago
The State of the Art in Flow Visualization: Dense and Texture-Based Techniques
Flow visualization has been a very attractive component of scientific visualization research for a long time. Usually very large multivariate datasets require processing. These da...
Robert S. Laramee, Helwig Hauser, Helmut Doleisch,...
SAINT
2005
IEEE
14 years 1 months ago
A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails
Wide spread of spam mails is one of the most serious problems on e-mail environment. Particularly, spam mails with a spoofed sender address should not be left alone, since they ma...
Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashit...
LWA
2007
13 years 9 months ago
Towards Learning User-Adaptive State Models in a Conversational Recommender System
Typical conversational recommender systems support interactive strategies that are hard-coded in advance and followed rigidly during a recommendation session. In fact, Reinforceme...
Tariq Mahmood, Francesco Ricci
STOC
2009
ACM
167views Algorithms» more  STOC 2009»
14 years 8 months ago
On the complexity of communication complexity
We consider the following question: given a two-argument boolean function f, represented as an N ? N binary matrix, how hard is to determine the (deterministic) communication comp...
Eyal Kushilevitz, Enav Weinreb
CEAS
2007
Springer
14 years 2 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage