نتایج جستجو برای: e mail messages

تعداد نتایج: 1062643  

2004
M. Muztaba Fuad Debzani Deb M. Shahriar Hossain

Electronic mail (e-mail) has been considered as one of the most convenient way to communicate among the users in the Internet. The rapid growth of users in the Internet and the abuse of e-mail by unsolicited users cause an exponential increase of e-mails in user mailboxes. Although there are several systems which use different AI techniques to filter out spam, there is hardly any system develop...

2004
Daniel A. Keim Christian Panse Jörn Schneidewind Mike Sips

One of the first applications of the Internet was the electronic mailing (e-mail). Along with the evolution of the Internet, e-mail has evolved into a powerful and popular technology. Messages, electronically documents, pictures and even movies can be send between users of computer systems at different places all over the world within seconds. Electronic mail is a fast, a cheap and a comfortabl...

2005
Vincent Naessens Bart De Decker Liesje Demuynck

Current anonymous e-mail systems offer unconditional anonymity to their users which can provoke abusive behaviour. Dissatisfied users will drop out and liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users when designing anonymous applications. This paper describes the design and ...

2002
Roger Mensah Louise Guthrie

As e-mail becomes on of the most widely used methods of communication, with it’s ease of use, speed and low cost it has also become the target of advertisers. Just like “snail” mail, e-mail has become prone to junk e-mail but unlike “snail” mail the cost of distributing unsolicited junk e-mail to vast numbers of people is relatively cheap. This has lead to the desire for these unwanted e-mails ...

Journal: :Inf. Process. Manage. 1997
David D. Lewis K. A. Knowles

Tools for processing e-mail and other electronic messages should be able to recognize and manipulate threads, that is, conversations among two or more people carried out by exchange of messages. While user clients typically insert in messages structural information useful for recovering threads, inconsistencies between clients, loose standards, creative user behavior, and the subjective nature ...

2005
Tomislav Petković Zvonko Kostanjčar Predrag Pale

With the advent of Information society false and inaccurate information represents one of the major problems. Hoaxes and unsolicited commercial e-mail messages (SPAM) are an important example of such information. A conceptual solution together with the developed system for automatic hoax recognition is presented. Hoax recognition is done in several parallel steps to increase system accuracy and...

2004
Geoff Hulten Anthony Penta Gopalakrishnan Seshadrinathan Manav Mishra

Introduction In this paper we analyze a very large junk e-mail corpus which was generated by a hundred thousand volunteer users of the Hotmail e-mail service. We describe how the corpus is being collected and then discuss how both the products being advertised by spam and the specific exploits being used to avoid spam filters have changed over time. Every day we randomly select one message from...

2011
Santiago Porras Bruno Baruque Maria Belén Vaquerizo García Emilio Corchado

One of the main problems that modern e-mail systems face is the management of the high degree of spam or junk mail they recieve. Those systems are expected to be able to distinguish between legitimate mail and spam; in order to present the nal user as much interesting information as possible. This study presents a novel hybrid intelligent system using both unsupervised and supervised learning t...

2008
Wil M.P. van der Aalst Andriy Nikolov

Increasingly information systems log historic information in a systematic way. Workflow management systems, but also ERP, CRM, SCM, and B2B systems often provide a so-called “event log”, i.e., a log recording the execution of activities. Thus far, process mining has been focusing on such structured event logs resulting in powerful analysis techniques and tools for discovering process, control, ...

2003
CRISTINA ZUCCHERMAGLIO ALESSANDRA TALAMO Dorothy Winsor Lori Peterson

This article uses the notion of genre repertoire to examine electronic-mail communication exchanged in a period of three years by an interorganizational community of software developers (727 e-mail messages in total). It analyzes the development of this virtual work community by considering the use of communicative genres with respect to (1) the resources offered by the electronic-mail system, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید