نتایج جستجو برای: mail hemadzadeh26gmailcom2

تعداد نتایج: 84447  

2005
Doug Herbers

Acknowledgements I would like to thank my advisor, Dr. Susan Gauch, for guidance throughout my undergraduate and graduate years at the University of Kansas. Also, thanks to my thesis committee: Dr. Victor Frost, to whom I also owe my many opportunities at ITTC, and Dr. Perry Alexander, who served on my committee on short notice. I would like to thank my family: Ralph, Charlene, Jeff, and Denise...

Journal: :IACR Cryptology ePrint Archive 2006
Birgit Pfitzmann Matthias Schunter Michael Waidner

Certified mail is the fair exchange of a message for a receipt, i.e., the recipient gets the message if and only if the sender gets a receipt. It is an important primitive for electronic commerce and other atomicity services. Certified-mail protocols are known in the literature, but there was no rigorous definition yet, in particular for optimistic protocols and for many interleaved executions....

2000
Olivier de Vel

In this paper we report an investigation into the learning of authorship identification or categorisation for the case of e-mail documents. We use various e-mail document features such as structural characteristics and linguistic evidence together with the Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents give promising results with some e-mail docume...

2004
Marwan Al-Zarouni

This paper will discuss tracing e-mail headers and issues associated with it. It will address both HTTP & SMTP initiated e-mails. It will discuss different ways used by e-mail senders to evade tracing and workarounds used by investigators to combat them. It will also discuss advanced measures and techniques used by investigators to track emails. The paper will not however discuss any particular...

Journal: :CoRR 2005
Evan P. Greenberg David R. Cheriton

Spam costs US corporations upwards of $8.9 billion a year, and comprises as much as 40% of all email received [1]. Solutions exist to reduce the amount of spam seen by end users, but cannot withstand sophisticated attacks. Worse yet, many will occasionally misclassify and silently drop legitimate email. Spammers take advantage of the near-zero cost of sending email to flood the network, knowing...

Journal: :RFC 2006
Randall Gellens John C. Klensin

This memo splits message submission from message relay, allowing each service to operate according to its own rules (for security, policy, etc.), and specifies what actions are to be taken by a submission server. Message relay is unaffected, and continues to use SMTP over port 25. When conforming to this document, message submission uses the protocol specified here, normally over port 587. This...

1996
Stuart Watt

In November 1994 we (members of the former Human Cognition Research Laboratory) ran an experimental version of the Masters level course DM863, ‘Common Lisp for Artificial Intelligence,’ taught as far as possible entirely through the Internet. This report describes this course and outlines some of the experiences and ideas that evolved during this course. Introduction The intention behind this c...

Journal: :Jurnal Ilmiah Eco Buss 2022

Mail management in an organization is important because it will support performance through information fluency, time efficiency, and labor This study intends to find out how the of e-mail Web applications improves at Waluyo Jati Kraksaan Hospital. The research used field with qualitative descriptive methods, data sources from observation, in-depth interviews informants, Data credibility test u...

2012
Raja Ramesh

With the increasing popularity of a E-mail users, E-mail spam problem growing proportionally. Spam filtering with near duplicate matching scheme is widely discussed in recent years. It is based on a known spam database formed by user feedback which cannot fully catch the evolving nature of spam and also it requires much storage. In view of above drawbacks, we proposed an effective spam detectio...

Journal: :RFC 1973
Michael D. Kudlick

Michael D. Kudlick MDK (SRI-ARC) NIC 14798 8-MAR-73 Network Mail Meeting Summary Introduction The purpose of this RFC is to briefly summarize, from the NIC’s viewpoint, the principal conclusions reached at the Network Mail Meeting held Friday, February 23 1973, at SRI-ARC. Please refer to RFC #475 (NIC 14919) for Abhay Bhushan’s comprehensive summary of the issues discussed at the meeting. Ther...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید