نتایج جستجو برای: e mail messages
تعداد نتایج: 1062643 فیلتر نتایج به سال:
We conduct laboratory experiments on sender-receiver games with an incentive for biased transmission (such as security analysts painting a rosy picture about earnings prospects). Our results confirm earlier experimental findings of “overcommunication”—messages are more informative of the true state than they should be, in equilibrium theory. Furthermore, we used eyetracking to show that senders...
This document describes a language for filtering e-mail messages at time of final delivery. It is designed to be implementable on either a mail client or mail server. It is meant to be extensible, simple, and independent of access protocol, mail architecture, and operating system. It is suitable for running on a mail server where users may not be allowed to execute arbitrary programs, such as o...
In this article we formulated a model of psycho-social elements of the process of receiving an e-mail. The corresponding technique starts by recognising the relevant states of a human receiver and a received e-mail. The states are parameterised, paying special attention to the description of receiver’s emotional states, as the event of receiving is more localised in time than that of sending an...
This paper reports on experiments in multi-class document categorization with support vector machines and self-organizing maps. A data set consisting of personal e-mail messages is used for the experiments. Two distinct document representation formalisms are employed to characterize these messages, namely a standard word-based approach and a character n-gram document representation. Based on th...
We propose a model, called a deliberation structure model, that represents streams of relevant messages in email communication. The deliberation structure model treats e-mail messages that include several topics and uses tree structure, called deliberation trees, that are based on Clark’s contribution trees to represent message structure. Deliberation trees are useful to visualize the message s...
Public Key Infrastructure (PKI) is one of the primary weapons in the Department of Defense’s (DoD) “defense in depth” information assurance strategy, and will be used to sign all DoD e-mail messages by October 2003. PKI uses asymmetric “public” and “private” keys to sign and/or encrypt e-mail messages and other information. The effect of this additional workload on the existing network and serv...
The main problem of the Internet e-mail service is the massive spam message delivery. Everyday, hundreds of unwanted and unhelpful messages are received by Internet users flooding their mailboxes. Fortunately, nowadays there are different kinds of filters able to identify and automatically delete most of these messages. In order to reduce the problem dimensionality only representative attribute...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید