WEB ACCESSIBLE MULTIACCOUNT CONFIGURABLE CLIENT EMAIL APPLICATIO
نویسندگان
چکیده
منابع مشابه
Tailoring Infrastructures: Supporting Cooperative Work with Configurable Email Filters
In fragmented work settings like networked organizations or virtual organizations, monolithic approaches to implement support for collaboration would require the actors involved to agree on the usage of the approach or tool under consideration. As the autonomy of actors in these settings makes this hard to achieve, we suggest an exploration and an increase in the end-user tailorability of basic...
متن کاملPrivacy Preserving Web-Based Email
Recent web-based applications offer users free service in exchange for access to personal communication, such as on-line email services and instant messaging. The inspection and retention of user communication is generally intended to enable targeted marketing. However, unless specifically stated otherwise by the collecting service’s privacy policy, such records have an indefinite lifetime and ...
متن کاملWeb Mediators for Accessible Browsing
We present a highly accurate method for classifying web pages based on link percentage, which is the percentage of text characters that are parts of links normalized by the number of all text characters on a web page. K -means clustering is used to create unique thresholds to differentiate index pages and article pages on individual web sites. Index pages contain mostly links to articles and ot...
متن کاملBeLearning: Designing accessible web applications
Flexibility and adaptivity are two of the outstanding characteristics of new media and new technologies. These properties allow new methods to provide physically challenged people with appropriate information. To build accessible Web applications, one has to respect the needs from the beginning of the design process. However, it is difficult to integrate the requirements of accessibility guidel...
متن کاملLightweight Client-Side Methods for Detecting Email Forgery
We examine a related, but distinct, problem to spam detection. Instead of trying to decide if email is spam or ham, we try to determine if email purporting to be from a known correspondent actually comes from that person – this may be seen as a way to address a class of targeted email attacks. We propose two methods, geolocation and stylometry analysis. The efficacy of geolocation was evaluated...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computing
سال: 2014
ISSN: 2312-5381,1727-6209
DOI: 10.47839/ijc.5.1.385