E-mail recovery from websites using Gravatar

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Permission-Based E-Mail Marketing Websites Success: An Integrated Perspective

Extant research on websites success has paid insufficient attention to the success of permission-based email marketing (PEM) websites. In order to bridge this knowledge gap, the contribution of this study lies in synthesizing information management/e-commerce, media/communication, as well as customer/marketing research to propose a PEM websites success model consisting of antecedent (i.e., func...

متن کامل

E-mail Classification Using Deep Networks Ahmad

Email has become an essential communication tool in modern life, creating the need to manage the huge information generated. Email classification is a desirable feature in an email client to manage the email messages and categorize them into semantic groups. Statistical artificial intelligence and machine learning is a typical approach to solve such problem, driven by the success of such method...

متن کامل

E-Mail Worm Detection Using Data Mining

This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject, presence/absence of binary attachments, type of attachments, and so on. The goal is to obtain an efficient classification model based on these features. The solution consists of several steps. First, the number of feat...

متن کامل

Addressing Spam E-Mail Using Hashcast

This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for future growth are jeopardized by the rising tide of unwanted e-mail, both SPAM and viruses. This threatens to wipe out the advantages and benefits of e-mail. An important flaw in current e-mail standards (most notably SMT...

متن کامل

Mining E-Mail Messages: Uncovering Interaction Patterns and Processes using E-Mail Logs

Buzzwords such as BAM (Business Activity Monitoring), BOM (Business Operations Management), BPI (Business Process Intelligence) illustrate the interest in closing the business process management loop (van der Aalst and van Hee, 2002; Dumas et al., 2005). This is illustrated by the Figure 1, which shows the increasing level of support for closing the so-called BPM lifecycle. The lifecycle identi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Military University of Technology

سال: 2019

ISSN: 1234-5865

DOI: 10.5604/01.3001.0013.3003