نتایج جستجو برای: e mail messages
تعداد نتایج: 1062643 فیلتر نتایج به سال:
E-mail Header Injection vulnerability is a class of vulnerability that can occur inweb applications that use user input to construct e-mailmessages. E-mail Header Injection is possiblewhen themailing script fails to check for the presence of e-mail headers in user input (either form fields or URL parameters). The vulnerability exists in the reference implementation of the built-in mail function...
In this paper we show an instance-based reasoning e-mail filtering model that outperforms classical machine learning techniques and other successful lazy learners approaches in the domain of anti-spam filtering. The architecture of the learning-based anti-spam filter is based on a tuneable enhanced instance retrieval network able to accurately generalize e-mail representations. The reuse of sim...
E-mail–based conversations between thousands of people— very large-scale conversations (VLSCs)—now take place in a variety of on-line public spaces such as Usenet newsgroups and large listservs. This article describes the author’s prototype Conversation Map system, which can automatically analyze and graphically summarize thousands of e-mail messages exchanged in VLSCs. Example conversation map...
Ken and Donald McIntyre worked on what was to be The Story of APL & J in 2004 through a series of e-mail messages, with the last e-mail from Ken coming in the morning of Saturday, 2004-10-16. Now Donald McIntyre’s health prevents him continuing work on The Story of APL & J. The following autobiographical sketch has been extracted from the manuscript, which Vector hopes eventually to publish in ...
ABSTRACT Mail-delivered get-out-the-vote (GOTV) field experiments have been found to increase voter turnout in some but not all contexts. We hypothesize that mail-delivered GOTV interventions are more successful low-salience elections and test this a systematic way for the first time. Relying on literature review meta-regression framework, we find primary strong significant positive impact succ...
Internet mail suffers from the fact that much unwanted mail is sent using spoofed addresses -"spoofed" in this case means the address is used without the permission of the domain owner. This document describes a family of tests by which SMTP servers can determine whether an e-mail address in a received message was used with the permission of the owner of the domain contained in that e-mail addr...
Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case of social networking, which these people cannot do without external help. Voice-Mail architecture helps blind people to access e-m...
PURPOSE This study compared the response time, response rate, and cost of two types of survey administration techniques: e-mail/web-based versus conventional postal mail. The main aim of the survey was to collect descriptive information on the existence of Acute Care for Elders units and their characteristics by surveying geriatric division chiefs. DESIGN AND METHODS Two randomized cohorts of...
We describe a protocol for quantum oblivious transfer, utilizing faint pulses of polarized light, by which one of two mutually distrustful parties (“Alice”) transmits two one-bit messages in such a way that the other party (“Bob”) can choose which message he gets but cannot obtain information about both messages (he wiU learn his chosen bit’s value with exponentially small error probability and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید