نتایج جستجو برای: email

تعداد نتایج: 93671  

2004
Matthew B. Prince Arthur M. Keller Benjamin M. Dahl

One source major of email addresses for spammers involves “harvesting” them from websites. This paper describes a proposal to allow a website owner to make illegal such automated extraction of email addresses. We propose a “no-email-collection” standard for websites and a mechanism to track spammers violating the standard. There are four parts to this proposal. The first part is to create speci...

1996
Ceki Gülcü Gene Tsudik

Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identiication of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and des...

2004
Luke K. McDowell Oren Etzioni Alon Y. Halevy

Prior work has shown that semantic email processes (SEPs) can be an effective tool for automating emailmediated tasks that are currently performed manually in a tedious, time-consuming, and error-prone manner. However, specifying a SEP can be difficult to accomplish, even for users familiar with RDF and semantic email. In response, this paper considers an approach for specifying SEP templates t...

2007
D. Crocker

Email has become a popular distribution service for a variety of socially unacceptable, mass-effect purposes. The most obvious ones include spam and worms. This note recommends conventions for the operation of email submission and transport services between independent operators, such as enterprises and Internet Service Providers. Its goal is to improve lines of accountability for controlling a...

2010
Yun Wang Eric McCreath

Along with the prevalence of email, a number of free email managers have been developed to assist people to deal with personal and interpersonal affairs. Beside sending and receiving email, they provide a diversity of function such as memorandum and calendar. Many researchers are interested in how people communicate via email. They may have questions such as " how long does it take them to repl...

2009
Fred Cohen

Legal matters related to unsolicited commercial email often involve several hundred thousand messages. Manual examination and interpretation methods are unable to deal with such large volumes of evidence. Furthermore, as the actors gain experience, it is increasingly difficult to show evidence of spoliation and detect intentional evidence construction. This paper presents improved automated tec...

2003
Sharman Lichtenstein Paula M. C. Swatman

In this paper, we investigate the advantages of email for knowledge management (KM) by undertaking a feature analysis of the email tool Eudora, and a discourse analysis of messages and conversations in an email archive. We believe the advantages of email for KM have contributed to the appropriation of email for everyday knowledge work. We provide a table of the characteristics of KM in email, a...

2005
Ben Adida David Chau Susan Hohenberger Ronald L. Rivest

We present the design and prototype implementation of a new public key infrastucture for email authentication. Our approach applies recent developments in identity-based cryptography and observations concerning the role of DNS and email servers in the current email architecture to produce end-to-end email signatures with no infrastructure change or new security assumption. Like current email si...

2010
Paul Sroufe Santi Phithakkitnukoon Ram Dantu João W. Cangussu

Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out ...

2017
Aston Zhang Lluis Garcia Pueyo James Bradley Wendt Marc Najork Andrei Z. Broder

According to recent estimates, about 90% of consumer received emails are machine-generated. Such messages include shopping receipts, promotional campaigns, newsletters, booking confirmations, etc. Most such messages are created by populating a fixed template with a small amount of personalized information, such as name, salutation, reservation numbers, dates, etc. Web mail providers (Gmail, Hot...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید