Sciweavers

CEAS
2007
Springer
14 years 5 months ago
Discovering Leadership Roles in Email Workgroups
Email is a key communication tool for collaborative workgroups. In this paper, we investigate how team leadership roles can be inferred from a collection of email messages exchang...
Vitor R. Carvalho, Wen Wu, William W. Cohen
CEAS
2007
Springer
14 years 5 months ago
Asymmetric Gradient Boosting with Application to Spam Filtering
In this paper, we propose a new asymmetric boosting method, Boosting with Different Costs. Traditional boosting methods assume the same cost for misclassified instances from di...
Jingrui He, Bo Thiesson
CEAS
2007
Springer
14 years 5 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
CEAS
2007
Springer
14 years 5 months ago
TV-ACTA: Embedding an Activity-Centered Interface for Task Management in Email
In contextual computing, where cues beyond direct user input are used to trigger computation, one of the most daunting challenges is inferring what the user is doing. For the doma...
Victoria Bellotti, Jim Thornton, Alvin Chin, Diane...
CEAS
2007
Springer
14 years 5 months ago
Slicing Spam with Occam's Razor
To evade blacklisting, the vast majority of spam email is sent from exploited MTAs (i.e., botnets) and with forged “From” addresses. In response, the anti-spam community has d...
Chris Fleizach, Geoffrey M. Voelker, Stefan Savage
CEAS
2007
Springer
14 years 5 months ago
Email Communities of Interest
Email has become an integral and sometimes overwhelming part of users’ personal and professional lives. In this paper, we measure the flow and frequency of user email toward th...
Lisa Johansen, Michael Rowell, Kevin R. B. Butler,...
CEAS
2007
Springer
14 years 5 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
CEAS
2007
Springer
14 years 5 months ago
Combining Global and Personal Anti-Spam Filtering
Many of the first successful applications of statistical learning to anti-spam filtering were personalized classifiers that were trained on an individual user’s spam and ham ...
Richard Segal
CEAS
2007
Springer
14 years 5 months ago
Characterizing Web Spam Using Content and HTTP Session Analysis
Web spam research has been hampered by a lack of statistically significant collections. In this paper, we perform the first large-scale characterization of web spam using conten...
Steve Webb, James Caverlee, Calton Pu
CEAS
2007
Springer
14 years 5 months ago
A Game-Theoretic Investigation of the Effect of Human Interactive Proofs on Spam E-mail
We show how a game-theoretic model of spam e-mailing, which we had introduced in previous work, can be extended to include the possibility of employing Human Interactive Proofs (h...
Dimitrios K. Vassilakis, Ion Androutsopoulos, Evan...