منابع مشابه
Trap E-mail Address for Combating E-mail Viruses
The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...
متن کاملVoice –Based E-Mail (V-Mail) for blind
Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case of social networking, which these people cannot do without external help. Voice-Mail architecture helps blind people to access e-m...
متن کاملE E-mail Data Stores
For many people, e-mail has become a running record of their business and personal lives. Somewhere in that big clot of e-mail messages that have accumulated over the years is a wealth of information about people they’ve met, work they’ve done, meetings they’ve held. There are tough calls and tender moments, great debates and funny episodes. When did you first meet a certain person? Just what w...
متن کاملCollaborative E-Mail Filtering
Acknowledgements I would like to thank my advisor, Dr. Susan Gauch, for guidance throughout my undergraduate and graduate years at the University of Kansas. Also, thanks to my thesis committee: Dr. Victor Frost, to whom I also owe my many opportunities at ITTC, and Dr. Perry Alexander, who served on my committee on short notice. I would like to thank my family: Ralph, Charlene, Jeff, and Denise...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Biochemistry and Molecular Biology Education
سال: 2005
ISSN: 1470-8175,1539-3429
DOI: 10.1002/bmb.2005.494033010431