Nuisance level of a voice call
暂无分享,去创建一个
[1] Ram Dantu,et al. Automatic Calibration Using Receiver Operating Characteristics Curves , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.
[2] Ram Dantu,et al. Socio-technical defense against voice spamming , 2007, TAAS.
[3] Nathan Eagle,et al. Machine perception and learning of complex social systems , 2005 .
[4] John F. Canny,et al. The Future of Human-Computer Interaction , 2006, ACM Queue.
[5] K.K. Tam,et al. Session Initiation Protocol , 2002, 2002 IEEE International Conference on Industrial Technology, 2002. IEEE ICIT '02..
[6] Ram Dantu,et al. Detecting Spam in VoIP Networks , 2005, SRUTI.
[7] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[8] Mark S. Granovetter. The Strength of Weak Ties , 1973, American Journal of Sociology.
[9] Georgios Paliouras,et al. A Memory-Based Approach to Anti-Spam Filtering for Mailing Lists , 2004, Information Retrieval.
[10] William W. Cohen. Learning Rules that Classify E-Mail , 1996 .
[11] N. Soonthornphisaj,et al. Anti-spam filtering: a centroid-based classification approach , 2002, 6th International Conference on Signal Processing, 2002..
[12] Newton Lee,et al. ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.
[13] Jeffrey O. Kephart,et al. MailCat: an intelligent assistant for organizing e-mail , 1999, AGENTS '99.
[14] Susan T. Dumais,et al. A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.
[15] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[16] Salvatore J. Stolfo,et al. Identifying spam without peeking at the contents , 2004, CROS.
[17] P. V. Marsden,et al. Measuring Tie Strength , 1984 .
[18] Isidore Rigoutsos,et al. Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM) , 2004, CEAS.
[19] Salvatore J. Stolfo,et al. Combining email models for false positive reduction , 2005, KDD '05.
[20] Cullen Jennings,et al. The Session Initiation Protocol (SIP) and Spam , 2008, RFC.
[21] Ashraf Khalil,et al. Context-aware telephony: privacy preferences and sharing patterns , 2006, CSCW '06.
[22] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[23] Ashraf Khalil,et al. Improving Cell Phone Awareness by Using Calendar Information , 2005, INTERACT.