E-mail recovery from websites using Gravatar
نویسندگان
چکیده
منابع مشابه
Permission-Based E-Mail Marketing Websites Success: An Integrated Perspective
Extant research on websites success has paid insufficient attention to the success of permission-based email marketing (PEM) websites. In order to bridge this knowledge gap, the contribution of this study lies in synthesizing information management/e-commerce, media/communication, as well as customer/marketing research to propose a PEM websites success model consisting of antecedent (i.e., func...
متن کاملE-mail Classification Using Deep Networks Ahmad
Email has become an essential communication tool in modern life, creating the need to manage the huge information generated. Email classification is a desirable feature in an email client to manage the email messages and categorize them into semantic groups. Statistical artificial intelligence and machine learning is a typical approach to solve such problem, driven by the success of such method...
متن کاملE-Mail Worm Detection Using Data Mining
This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject, presence/absence of binary attachments, type of attachments, and so on. The goal is to obtain an efficient classification model based on these features. The solution consists of several steps. First, the number of feat...
متن کاملAddressing Spam E-Mail Using Hashcast
This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for future growth are jeopardized by the rising tide of unwanted e-mail, both SPAM and viruses. This threatens to wipe out the advantages and benefits of e-mail. An important flaw in current e-mail standards (most notably SMT...
متن کاملMining E-Mail Messages: Uncovering Interaction Patterns and Processes using E-Mail Logs
Buzzwords such as BAM (Business Activity Monitoring), BOM (Business Operations Management), BPI (Business Process Intelligence) illustrate the interest in closing the business process management loop (van der Aalst and van Hee, 2002; Dumas et al., 2005). This is illustrated by the Figure 1, which shows the increasing level of support for closing the so-called BPM lifecycle. The lifecycle identi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Military University of Technology
سال: 2019
ISSN: 1234-5865
DOI: 10.5604/01.3001.0013.3003