Sciweavers

TAL
2010
Springer
13 years 9 months ago
Clustering E-Mails for the Swedish Social Insurance Agency - What Part of the E-Mail Thread Gives the Best Quality?
We need to analyse a large number of e-mails sent by the citizens to the customer services department of a governmental organisation based in Sweden. To carry out this analysis we ...
Hercules Dalianis, Magnus Rosell, Eriks Sneiders
IEEECIT
2010
IEEE
13 years 9 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi
SAC
2008
ACM
13 years 10 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
ISCI
2007
130views more  ISCI 2007»
13 years 11 months ago
Learning to classify e-mail
In this paper we study supervised and semi-supervised classification of e-mails. We consider two tasks: filing e-mails into folders and spam e-mail filtering. Firstly, in a sup...
Irena Koprinska, Josiah Poon, James Clark, Jason C...
AUSAI
2004
Springer
14 years 2 months ago
On Enhancing the Performance of Spam Mail Filtering System Using Semantic Enrichment
With the explosive growth of the Internet, e-mails are regarded as one of the most important methods to send e-mails as a substitute for traditional communications. As e-mail has b...
Hyun-Jun Kim, Heung-Nam Kim, Jason J. Jung, GeunSi...
DEXAW
1998
IEEE
160views Database» more  DEXAW 1998»
14 years 3 months ago
Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks
In this paper we consider e-mail as a task management tool. Our general goal is to restructure the domain of e-mail. The purpose is to make e-mail even more suitable for messageba...
Juha Takkinen, Nahid Shahmehri
SAC
2009
ACM
14 years 3 months ago
Spam decisions on gray e-mail using personalized ontologies
E-mail is one of the most common communication methods among people on the Internet. However, the increase of e-mail misuse/abuse has resulted in an increasing volume of spam e-ma...
Seongwook Youn, Dennis McLeod
NDSS
2003
IEEE
14 years 4 months ago
Moderately Hard, Memory-Bound Functions
A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. It has been sugge...
Martín Abadi, Michael Burrows, Ted Wobber
SCN
2004
Springer
112views Communications» more  SCN 2004»
14 years 4 months ago
Controlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an effic...
Amir Herzberg
ICICS
2004
Springer
14 years 4 months ago
Adaptive-CCA on OpenPGP Revisited
E-mail system has become one of the most important and popular Internet services. Instead of using traditional surface mail, we have the alternative of employing e-mail system whic...
Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen