Technical Field
The invention relates generally to Internet based information sharing technology. More particularly, this invention relates to a system and method for providing a scheme for dynamic Web service which enables registered users to interactively share their digital resources with other registered users and non-registered users based on categorized sharing relationships with respect to different views of the digital resources.
Description of the Prior Art
The development of Internet technology has provided a vast new world of resource sharing. Digital files, such as text, photos, and audio/video programs, can be shared with almost any number of designated recipients in just a few seconds via e-mail. News, magazines and other resources can be digitally delivered from a central repository to many users based on subscription policies. Internet service providers now provide group e-mail services in which a registered user subscribes a service or services in connection with a specific group or several groups. Some other companies provide Internet based solutions to automatically update address book or contact information.
One such service, for example, is “Yahoo! Group” (http://groups.yahoo.com/), which provides an easy way for groups of people to communicate on the Internet—discussing sports, health and current events with a group of people, sharing photos and files, planning events, sending newsletters; and staying in touch with friends and family. To start a group, the user needs first to select a “Yahoo! Groups Category” by browsing or searching for the category that best describes his group. Then, the user needs to describe his group. This includes giving a “group name”; entering the group's e-mail address and giving a brief description about the group. When the user sends a message to the group e-mail address, all members of this group receives a copy of the message. A recipient of the message can unsubscribe from the group messages by returning an e-mail or clicking a URL embedded in the message.
Plaxo, Inc. (www.plaxo.com), for example, has developed an address book updating application which enables a user to automatically update his address books. Immediately after the user downloads the application, he is prompted to choose which people from his address book he wants to get updated contact information from. The user may choose as many people as he likes. The application then, on behalf of the user, sends out a simple message to each of the selected people, showing the contact information the user currently has in his address book on them and requesting them to correct the out-of-date information. The replies to these e-mails are processed by the application and automatically inserted into the user's address book. The user receives notifications from Plaxo as the updates replies come in. The user can also use Plaxo to send his own updated contact information to the selected people in his address book. Plaxo allows the user to create two cards, i.e. a business card and a personal card, so that the user can offer different information to different people. Once the user creates his cards, he can send them to anyone in his address book. If they are not Plaxo members, they will receive an e-mail containing the user's card. If they are Plaxo members and the user is in their address books, they receive a message asking them if they want to add the user. As friends and contacts join Plaxo, the user is automatically kept up-to-date without e-mails. The user's address book is automatically updated with the latest contact information of his friends and contacts that join Plaxo. This synchronization happens automatically on a daily basis as long as Outlook is running. The major weakness of Plaxo's solution is that until people download and use Plaxo, requests for contact information arrive in the form of e-mail, which may be construed as spam because it simply asks people for their information.
GoodContacts (www.goodcontacts.com) provides a solution to help a user to send a short e-mail message to the people that the user selects in his address book for verification. The e-mail incorporates a snapshot of the business card information the user has about them and asks them to review that information, make sure it is accurate, change it if it is wrong, and add anything that is missing. When they do so, the GoodContacts software updates the user's address book with the new information automatically. The user has the control to select the contacts he wants to verify. No e-mails are sent by the GoodContacts software without the user actively choosing to do so. To personalize the GoodContacts e-mails to be sent out, the user can choose to use the text in one of the standard templates that comes with the software, or he can personalize the message and subject header to his taste. He can also purchase a customized template that incorporates his or an organization's logo and colors in every keep-in-touch e-mail he sends. The GoodContacts software currently interfaces with Outlook, Outlook Express and ACT!. It does not store users' address books and thus unauthorized persons cannot access a user's address book and send spam to the user's contacts. The major weakness of the GoodContacts solution is its lower level automation because it has a very complicated setting feature, offering a suite of options for frequency of update requests, privacy settings, and sending requests to alternate e-mail addresses. Further, like Plaxo, until people download and use the software, requests for contact information arrive in the form of e-mail, which may be treated as spam.
AddresSender (www.addressendercorn) is a Web-based anywhere-accessible address book service that offers automatic updates within their network as well as synchronization capability with desktop PIMs. It forms links between one user and other AddresSender users to create a network and automatically sends and receives updates within the network. AddresSender's address book synchronizes with the user's Outlook (or OE or ACT!) contact list. It enables the user to send his information to his contacts. The user's in-network contacts get updates automatically; others get e-mails or even physical postcards. Unlike Plaxo and GoodContacts, AddresSender does not automatically import contact information for anybody except other users in the AddresSender network.
CardScan (www.cardscan.com/accucard) offers scanners and text-recognition software for transferring business cards into the user's electronic address book. The software is bundled with AccuCard Service with a functionality to confirm the accuracy of contact information and keep the user's entire address book up-to-date automatically. Like Plaxo, the AccuCard Service stores address information on a central server. On a quarterly basis, the AccuCard asks the user's contacts to confirm or update their information. It reminds the user whether a contact in his address book is out-of-state (i.e. if there is new information for that contact on the AccuCard server). The user must view the updates and accept or reject the changes for that contact. AccuCard allows the user to choose whether to reveal his identity or include a personal message with requests for updates. It stores images of business cards as well as the information therein.
CardScan is compatible with Microsoft Outlook, ACT!, Lotus Notes, and over 30 more contact managers. It synchronizes with any Palm, Handspring or Sony handheld, most Pocket PCs and the web. No matter where the user keeps his contact information, it can be up-to-date all the time. The primary weakness of this system is in privacy and control. For example, few controls are offered for distribution of information. Data need not originate with the contact himself, and updates are distributed to anyone who held the card originally. Update requestors need not reveal their identities though CardScan recommends that disclosing the requestor's name yields a better response rate. While this may be effective for a business application, it is not conducive to sharing personal information.
Now-defunct Ants.com developed a product called Scout for keeping address books up-to-date. It stores a user's “business card” information in a central database, and other Scout users who have that user's e-mail address could get the user's latest information automatically. Based on the e-mail address a user has, Scout automatically fills and automatically updates the user's Outlook address book with information from its database. Like several other products, Scout offers to send invitations for the user's other contacts to join. The critical weakness in Scout's model is that, although some limited restrictions can be set, it allows anyone with the user's e-mail address to get the rest of the data from the user's business card.
The approaches introduced above have many problems. For example, if a user wants to have a multiple-group sharing business, he has to set up many different groups manually and he has to spend a lot of time to manage these groups. For another example, if the user wants to send different views of a shared resource to different groups, he has to create different versions of the resource and send different versions to different groups manually. Further, when the shared resource is updated, the local copies cannot be automatically updated. Further more, the group members cannot interactively share a centric resource such as a calendar.
What is desired is a universal sharing scheme that includes the following features:
This invention provides a Web service which enables a publisher to share his digital resources with a number of subscribers based on different sharing relationships. The Web service includes an interface called “My Community”, for example, with which the publisher manages the sharing relationships with his community members. In a preferred embodiment of this invention, a community member refers to a user in a UNIX or any computer system who has an account with the system. The community members are organized into different groups. Each group includes a number of community members who have a common sharing relationship with the publisher with respect to one or more views of the shared resources. A resource may have multiple views, such as “full view” v. “basic view” v. “professional view” of a digital address card, or “normal view” v. “personal view” v. “confidential view” of a calendar. Each of the views has Metadata describing sharing styles, as well as version, creation date, size, and the like. Each sharing style corresponds to a specific sharing relationship between a community member and the publisher.
In an equally preferred embodiment, an address card service is incorporated with the existing address book technology, which enables automatic sharing and updates of address book information. Members, i.e. registered users, can share (“publish”) personal contact information, work information or/and personal notes with the people they want to stay in touch with. Those members can “subscribe” to automatically receive changes when the information is updated. The address card provides a link between members to help them stay in touch, and to keep their address books up-to-date with all the right information. The service ensures that the members always have the right contact information for their friends and family whenever they need it.
The address book is a central way for the user to share personal information and automatically keep it up-to-date. All his friends and family can always have his current contact information whenever he updates it and he never has to worry about mistyping a friend's new phone number or e-mail address to copy it into his address book because they can share it with him automatically.
Members can easily create an address card of personal and contact information. Even they can include self-expression elements such as Buddy Icon, personal/business logo, stationery, etc. Further, the member can create his address cards with different views for different audiences.
Members can share a personal address card with designated others. Sharing may take place via e-mail or a one-click communication mechanism. They can share an address card with all or part of the address book/“buddy list”, leveraging the groups and categories of people in those lists. They can also share an address card with recipients of mail messages. They can even make an address card “public,” open to subscription by any member.
Members with whom an address card is shared can accept the card to add that information to their address book. They receive automatic updates when the card is modified. They can choose to automatically accept address cards from contacts already in their address book or “buddy list” or contacts with whom they have shared. Where possible, address cards are resolved with existing entries in the subscriber's address book, using screen name and other key fields to detect duplicates.
A member can share his address card with another member (e.g. via Member Directory, Buddy Info). When a subscriber accepts, it is easy to reciprocate with a share.
When a member updates his address card, the modification is automatically reflected for subscribers with whom it is shared so that information is always up-to-date. It may include options to unsubscribe automatic updates on the publisher or subscriber side. It may also include an option to notify subscriber of updates so that new information is not missed.
Once a member has subscribed to an address card, the address card's information is available wherever the address book information is accessed. The subscriber may make edits to the local copy of the address card, but any edits are overwritten if the publisher updates the address card because the publisher's address card always contains the most up-to-date information.
The member's privacy is always protected. Policy for forwarding (i.e. passing on) another member's address card will limit or restrict the ability for forwarded cards to maintain subscriptions to the original card; original publisher must grant permission. Forwarding an invitation to request an address card affords the most control and privacy while still enabling the spread of address cards.
While the address card works best among registered members, it still supports sharing with non-members through export of standard contact card formats for a seamless sharing experience. Publishing to non-members includes e-mail based updates for published modifications.
A similar mechanism can enable sharing among a group, such as a Family, to which members can easily publish and subscribe to share updates among all members of the group.
The address card and group sharing models may be applied for sharing other member-created information and lists, such as “favorite place” and “buddy list”.
The address card system disclosed herein has numerous advantages. For example: the publisher is in control of who receives which view of the address card; users have flexible preferences for automatically publishing or automatically subscribing address cards; unlike any prior art system which focuses on a “pull” model of soliciting other users' contact information, the address card system taught herein focuses on a “push” model of sharing publishers' information, allowing recipients to simply accept; it propagates automatic updates within an existing network of registered users; furthermore, it enables the users to easily choose groups or categories with which to share.
The invention provides a Web service which enables a registered member, called a publisher, to share his digital resources, such as his address card or his calendar, with a number of subscribers based on different sharing relationships. The Web service includes a user interface, called “My Community” for example, with which the publisher manages the share-relationships with his community members. In the preferred embodiment of this invention, a community member refers to a registered user in a UNIX or any computer system who has an account in the system. The community members are organized into different groups. Each group includes a number of community members who have a common sharing relationship with the publisher with respect to one or more views of the resources. A resource may have multiple views, such as “full view” v. “basic view” v. “professional view” of an address card, or “normal view” v. “personal view” v. “confidential view” of a calendar. Each of the views has Metadata describing sharing-styles, as well as version, creation date, size, and the like. Each sharing style corresponds to a specific sharing relationship between a community member and the publisher.
A sharing relationship defines what and how a specific group of community members can do on the shared resource during the life-span, i.e. the duration, of the sharing relationship. The life span may be “one-time only” or “ongoing”. The following are three exemplary sharing relationships:
Optionally, the process may further include Step 220 to hold the status pending.
Note that the publisher's “My Community” is dynamically extended because the existing community members spread the resource sharing announcements to non community members such as friends and family members. This is illustrated by Step 221. When a non community member submits his subscription request, his identity information such as name, e-mail address and his relationship with referral members should also be provided.
Under an ongoing type sharing relationship, whenever a shared resource is modified, community members' local copies are updated accordingly. In particular, the publisher first sends a change notification to the members who subscribed to the ongoing type relationship. In one option, a subscriber's local copy of the shared resource is automatically updated. In another option, when a subscriber receives the change notification, he can choose to update the local copy, not update, or choose to block future notification. In case he chooses to block future notification, the sharing relationship is modified on the publisher's side and thus the subscriber will no longer receive the change notification.
As mentioned above, the sharing relationships are managed via both the publisher's side and the subscriber's side. On the publisher's side, he can set the sharing preferences as to the groups that a resource should be shared with and relationships that should be applied for each group. The factors concerning the sharing relationship for each resource may include the groups/members that the resource is being shared with, current sharing relationship, life-span of the relationship (ongoing or one-time), status, and rejected sharing requests. For the publisher's community management, the system maintains a list of community members and their groups, a list of pending members and a list of rejected members. On the subscriber's side, he can set the sharing preferences as to the types of announcements that should be rejected and publishers from whom publishing is automatically applied after receiving an announcement. For example, the subscriber may set to block spam and set to automatically update the local copy of some resources upon receipt of the update notification. The factors concerning the sharing relationship for each resource may include a list of resources received, current sharing relationship, life-span of the relationship (ongoing or one-time) and status.
In an equally preferred embodiment of the invention, agents for facilitating resource sharing are used.
Step 401: A publisher uses “Publisher Management Tool” to setup preferences, community directory, and resource directory;
Step 402: The publisher uses applications to create, edit or update resources in the resource directory;
Step 403: The publisher's agent sends out publisher announcements for any new created resources and changes notification for updated resources to community members;
Step 404: The subscriber's agent accepts all requests (such as the publisher's announcement and change notification) from the publisher's agent, and automatically generates a response per the subscriber's preferences;
Step 405: The publisher's agent automatically handles the responses from the subscriber's agent and generates responses per the publisher's preferences;
Step 406: The subscriber's agent invokes the subscriber's applications for accepted sharing.
While a sharing service allows publishers to notify subscribers of their shared resources via e-mail etc., checks need to be in place to prevent this feature from being abused by spamming users. Therefore, in another equally preferred embodiment, a spam control mechanism is included. The spam control mechanism performs the following functions:
Such settings should be configurable by the system administrator without bringing down the system. It is hoped that having such policies in place should act as a deterrent to spammers from misusing sharing systems.
In an equally preferred embodiment, an Internet based address card service is incorporated with an existing address book service, which enables automatic sharing and updates of address book information. The members of the service can publish personal contact information, work information or/and personal notes with the people they want to stay in touch with. Those members can subscribe to automatically receive changes when the information is updated. The address card provides a link among the members to help them stay in touch, and to keep their address books up-to-date with all the correct information. The service ensures that the members always have the right contact information for their friends and family whenever they need it. By subscribing to the service, the user's friends and family can always have his current contact information whenever he updates it and he never has to worry about mistyping a friend's new phone number or e-mail address to copy it into his address book because they can share it with him automatically. Contact information in address cards is available via any interface to the host-based address book. The address card contact information is also available offline.
A user/member can easily set up a master address card of personal and contact information based on a template or templates provided by the service provider. Optionally, the user/member may choose to create his custom address cards. He can even include self-expression elements such as a “buddy icon”, personal/business logo, stationery, etc. Based on the master address card, the user/member can create different address cards, or one address card with different views, for different audiences. If the user has more than one address card, he must indicate a default card. He can label each of his sub-cards, but the “label” itself is not published to the card subscribers. The user can edit the fields in his address cards by editing the master address card. When changes are saved, they are automatically published to subscribers of the address cards.
In a typical embodiment, the service provider provides templates from which a user/member selects sets of fields for sub-address cards. For example, the “Business” template may contain First Name, Last Name, Title, Company, Work Address, Work Phone, E-mail, and Web Page. These fields will be pulled from the address card and published as the user's “Business Card”. Similarly, a different set of data may be pulled from the address card as the user's “Personal Contact Information”.
A member/publisher can share his address card with certain designated recipients who may then choose to subscribe. Sharing may take place via e-mail or a new “direct” one-click communication mechanism. He can share an address card with all or part of the address book/“buddy list”, leveraging “people lists”. He can also share his address card with recipients of mail messages. He can even make his address card public, open to subscription by any member. The publisher may configure an expiration period of time for a publish offer or an invitation to share.
A member/subscriber with whom an address card is shared can accept the address card to add that information to his address book, and thereafter he receives automatic updates when the card changes. He may choose to automatically accept address cards from contacts already in his address book/“buddy list” or contacts with whom he has shared. Where possible, address cards are resolved with existing entries in the subscriber's address book, using screen name and other key fields to detect duplicates.
A member/publisher can share his address card with another member through various points of the service, e.g. via e-mail, instant messenger or online status displaying system such as AOL's Member Directory, Buddy Info Badge or People List. When a subscriber accepts, it will be easy to reciprocate with a share. A member/publisher may choose to publish to contacts not in his address book. In this case, these contacts can be manually or automatically added to the address book.
Conversely, if a member deletes a subscriber from his address book, the subscriber is then un-subscribed from the publisher's address card. The member can choose via member preferences to automatically publish his default address card to some or all of those in his address book. If he so chooses, an invitation to subscribe is automatically sent to the recipient.
When a member/publisher updates his address card, the modifications are automatically reflected for members with whom it is shared so that information is always up-to-date. It may include options to turn off automatic updates on the publisher or subscriber side. It may also include an option to notify the subscriber of updates so that new information is not missed. The user can view and manage accepted subscriptions. He may also view pending and rejected subscriptions. He may un-publish to subscribers and pending subscribers, i.e. break the connection or revoke the offer.
A member/user receives a share/publish offer in various forms, e.g. an immediate popup (if online), a popup at sign-on, an indicator in his address book, and an e-mail. The member with whom an address card is shared also has different options, e.g. (1) exchange: a member subscribes to the publisher's address card and reciprocates with a publishing of his own address card (if it exists, otherwise the member has the option to set one up); (2) accept the member subscribes to the publisher's address card only; and (3) reject the member does not subscribe to the publisher's address card.
A member/subscriber to whom an address card is published can choose to accept (subscribe). The publisher's address card information is added to the subscriber's address book, and the subscriber then receives automatic updates of modifications to the publisher's address card. A member must subscribe in order to accept address card data. He cannot just accept once without making the publish/subscribe connection. The member who has subscribed may later choose to unsubscribe.
A member/subscriber can specify whether published modifications to an address card to which he has subscribed may trigger a notification. He can also choose a notification method. He can specify whether each address card to which he has subscribed merits notification upon modification on a per-card basis. Notification may include details of specific changes made to the address card. The subscriber may choose to lock certain fields in an address card to which he has subscribed. This may prevent overwriting that field with any changes made by the publisher.
A member/subscriber can choose via member preferences to automatically accept an address card that is published to him. This means that the member automatically subscribes to any address card that is published to him. He can automatically accept address cards from the entire address book or the “buddy list”. In that case, anybody listed in the member's address book or “buddy list” at a given moment is accepted automatically by the member when any of them publishes his address card.
Once a member/subscriber has subscribed to an address card of another member's, the address card's information is available wherever address book information is accessed (Mail, YGP, etc.). The subscriber may make edits to the “local” copy of the address card, but any edits are then overwritten if the publisher updates the address card because the publisher's address card always contains the most up-to-date information. If the member subscribes to multiple cards from the same publisher, these cards are merged as a single entry in the subscriber's address book. If an existing contact in the subscriber's address book has the same screen name and/or e-mail address as an address card to which he is subscribing, a duplicate is detected and the subscriber is prompted to an option whether to delete the duplicate. If the address card contains a superset of the duplicate entry, the existing entry is then replaced by the address card. Superset means that the content in all fields in the existing entry are matched exactly by the contents of the fields within the address card, and that the address card may also contain some additional fields where the existing entry is blank. If the address card intersects with an existing entry but is not a superset, the subscriber has the option to overwrite the existing entry with the received address card, or to keep them separate.
The member/subscriber can unsubscribe from an address card at any time. After the member has unsubscribed, he receives no further updates but the information he has already received remains in his address book as-is. If the subscriber deletes an address card to which he has subscribed, his subscription is eliminated accordingly.
While the address card works best among registered members, it still supports sharing with non-members through the export of standard contact card formats for a seamless sharing experience. Publish/subscribe for non-members includes e-mail based updates for published modifications. If a member/publisher chooses to publish his address card to a non-member contact, the non-member contact then receives a notification of the publication via e-mail with information embedded and a vCard attached that contains the member's address card information. The publisher can insert a personal note in the e-mail generated on an initial publish (This also applies to any mails sent to members). In the published e-mail sent to a non-member, the non-member can opt-in (subscribe) to future address card modifications via a link in the e-mail. If the non-member opts in, any modification made to the address card then generates an e-mail to him with updated information embedded and the vCard attached. Each update e-mail offers the ability to opt out (unsubscribe).
A similar mechanism can enable sharing among a group, such as a family, to which members can easily publish and subscribe to share updates among all members of the group. The address card and group sharing models may be applied for sharing other member-created information and lists, such as “favorite places” and “buddy list”.
When a member/subscriber forwards an address card to a third party, the recipient receives a publish offer. Accepting the offer forms a publish/subscribe connection between the original publisher and the recipient. The original publisher is accordingly notified when the recipient has subscribed. Optionally, the original publisher is prompted to give permission to the recipient in order for a connection to be formed. The original publisher can set permissions on an address card, preventing subscribers from forwarding it. Default is to allow forwarding.
When a member/publisher sets a preference to automatically publish his address card to anybody to whom he sends mail, his default address card is published (unless otherwise specified). On a per-message basis, the member can choose whether his address card is automatically published to the mail recipient(s).
A member/subscriber can set a preference to automatically subscribe to anybody to whom he sends an e mail, if that contact is implicitly published. If the publisher publishes on “mail send”, the recipient must be able to subscribe when he reads that mail. If the recipient/member chooses to “Add Sender to Address Book,” he automatically subscribes to the sender's (publisher's) address card. Optionally, the recipient/member may choose to reciprocate with a publication to the sender.
The address card comprehends the parent control settings on the publisher side. Children do not have access to the address card. Young teens are prevented from publishing a public address card.
These are further illustrated by exemplary screens and pop-ups of a user interface (UI) implementing above described scheme.
Now referring back to
The “OK” button 535 in
Still in
The “OK” button 535 in
The address card is incorporated into an existing address book scheme.
Referring to
Now referring back to
In the screens 700a-700c, the hyperlink “Send My address card to this Contact” 701 takes the user to a “What Info do You Want to Share” screen 740 as shown in
Now referring back to
When the recipient of the e-mail screen 800 clicks the “accept and share” link 801, and, if he chooses to share his “Personal Information” or “Work Information” and clicks “Send” button 742, the sender of the e-mail screen 800 (i.e. the publisher who sends his address card initially) will receive an e-mail as illustrated in
Now referring to
Although the invention is described herein with reference to the preferred embodiment, one skilled in the art will readily appreciate that other applications may be substituted for those set forth herein without departing from the spirit and scope of the present invention.
Accordingly, the invention should only be limited by the Claims included below.
This application is a continuation of U.S. patent application Ser. No. 12/784,737, filed May 21, 2010, which is a continuation of U.S. patent application Ser. No. 10/606,021, filed Jun. 24, 2003 now U.S. Pat. No. 7,739,602, all of which are incorporated herein in their entirety by this reference thereto.
Number | Name | Date | Kind |
---|---|---|---|
4206315 | Matyas et al. | Jun 1980 | A |
4425665 | Stauffer | Jan 1984 | A |
4638356 | Frezza | Jan 1987 | A |
4807154 | Scully et al. | Feb 1989 | A |
4807155 | Cree et al. | Feb 1989 | A |
4817018 | Cree et al. | Mar 1989 | A |
4819191 | Scully et al. | Apr 1989 | A |
4831552 | Scully et al. | May 1989 | A |
4866611 | Cree et al. | Sep 1989 | A |
4977520 | McGaughey, III et al. | Dec 1990 | A |
5023851 | Murray et al. | Jun 1991 | A |
5124912 | Hotaling et al. | Jun 1992 | A |
5129057 | Strope et al. | Jul 1992 | A |
5202890 | Iketani et al. | Apr 1993 | A |
5204961 | Barlow | Apr 1993 | A |
5261045 | Scully et al. | Nov 1993 | A |
5327486 | Wolff et al. | Jul 1994 | A |
5329578 | Brennan et al. | Jul 1994 | A |
5457476 | Jenson | Oct 1995 | A |
5467388 | Redd, Jr. et al. | Nov 1995 | A |
5487100 | Kane | Jan 1996 | A |
5533110 | Pinard et al. | Jul 1996 | A |
5539828 | Davis | Jul 1996 | A |
5557659 | Hyde-Thomson | Sep 1996 | A |
5572246 | Ellis et al. | Nov 1996 | A |
5572667 | Ideta | Nov 1996 | A |
5583920 | Wheeler, Jr. | Dec 1996 | A |
5627764 | Schutzman et al. | May 1997 | A |
5694616 | Johnson et al. | Dec 1997 | A |
5721779 | Funk | Feb 1998 | A |
5734709 | De Witt et al. | Mar 1998 | A |
5793365 | Tang et al. | Aug 1998 | A |
5796840 | Davis | Aug 1998 | A |
5832227 | Anderson et al. | Nov 1998 | A |
5835087 | Herz et al. | Nov 1998 | A |
5872917 | Hellman | Feb 1999 | A |
5878219 | Vance, Jr. et al. | Mar 1999 | A |
5884033 | Duvall et al. | Mar 1999 | A |
5930479 | Hall | Jul 1999 | A |
5937160 | Davis et al. | Aug 1999 | A |
5944786 | Quinn | Aug 1999 | A |
5948040 | DeLorme et al. | Sep 1999 | A |
5960406 | Rasansky et al. | Sep 1999 | A |
5960411 | Hartman et al. | Sep 1999 | A |
5978791 | Farber et al. | Nov 1999 | A |
5987508 | Agraharam et al. | Nov 1999 | A |
5987606 | Cirasole et al. | Nov 1999 | A |
5999600 | Shin | Dec 1999 | A |
5999932 | Paul | Dec 1999 | A |
6006228 | McCollum et al. | Dec 1999 | A |
6012051 | Sammon, Jr. et al. | Jan 2000 | A |
6014638 | Burge et al. | Jan 2000 | A |
6018343 | Wang et al. | Jan 2000 | A |
6018774 | Mayle et al. | Jan 2000 | A |
6026403 | Siefert | Feb 2000 | A |
6047260 | Levinson | Apr 2000 | A |
6052709 | Paul | Apr 2000 | A |
6055510 | Henrick et al. | Apr 2000 | A |
6058428 | Wang et al. | May 2000 | A |
6073142 | Geiger et al. | Jun 2000 | A |
6076111 | Chiu et al. | Jun 2000 | A |
6085249 | Wang et al. | Jul 2000 | A |
6092067 | Girling et al. | Jul 2000 | A |
6097389 | Morris et al. | Aug 2000 | A |
6104990 | Chaney et al. | Aug 2000 | A |
6107990 | Fleming | Aug 2000 | A |
6111572 | Blair et al. | Aug 2000 | A |
6112227 | Heiner | Aug 2000 | A |
6141686 | Jackowski et al. | Oct 2000 | A |
6144934 | Stockwell et al. | Nov 2000 | A |
6151584 | Papierniak et al. | Nov 2000 | A |
6161130 | Horvitz et al. | Dec 2000 | A |
6161630 | Stump et al. | Dec 2000 | A |
6167434 | Pang | Dec 2000 | A |
6195354 | Skalecki et al. | Feb 2001 | B1 |
6195698 | Lillibridge et al. | Feb 2001 | B1 |
6199102 | Cobb | Mar 2001 | B1 |
6199103 | Sakaguchi et al. | Mar 2001 | B1 |
6202061 | Khosla et al. | Mar 2001 | B1 |
6216110 | Silverberg | Apr 2001 | B1 |
6249805 | Fleming, III | Jun 2001 | B1 |
6266692 | Greenstein | Jul 2001 | B1 |
6266814 | Lemmons et al. | Jul 2001 | B1 |
6269369 | Robertson | Jul 2001 | B1 |
6275810 | Hetherington et al. | Aug 2001 | B1 |
6278456 | Wang et al. | Aug 2001 | B1 |
6301608 | Rochkind | Oct 2001 | B1 |
6310946 | Bauer et al. | Oct 2001 | B1 |
6321267 | Donaldson | Nov 2001 | B1 |
6330590 | Cotten | Dec 2001 | B1 |
6336117 | Massarani | Jan 2002 | B1 |
6341349 | Takaragi et al. | Jan 2002 | B1 |
6345260 | Cummings, Jr. et al. | Feb 2002 | B1 |
6353848 | Morris | Mar 2002 | B1 |
6356937 | Montville et al. | Mar 2002 | B1 |
6366661 | Devillier et al. | Apr 2002 | B1 |
6393464 | Dieterman | May 2002 | B1 |
6393465 | Leeds | May 2002 | B2 |
6405319 | Arnold et al. | Jun 2002 | B1 |
6421709 | McCormick et al. | Jul 2002 | B1 |
6438597 | Mosberger et al. | Aug 2002 | B1 |
6453327 | Nielsen | Sep 2002 | B1 |
6460044 | Wang | Oct 2002 | B1 |
6466918 | Spiegel et al. | Oct 2002 | B1 |
6477544 | Bolosky et al. | Nov 2002 | B1 |
6493107 | Toyoda et al. | Dec 2002 | B1 |
6507866 | Barchi | Jan 2003 | B1 |
6519703 | Joyce | Feb 2003 | B1 |
6523115 | Ono et al. | Feb 2003 | B1 |
6542943 | Cheng et al. | Apr 2003 | B2 |
6546416 | Kirsch | Apr 2003 | B1 |
6549416 | Sterner et al. | Apr 2003 | B2 |
6584564 | Olkin et al. | Jun 2003 | B2 |
6599139 | Hunter | Jul 2003 | B1 |
6600750 | Joffe et al. | Jul 2003 | B1 |
6633311 | Douvikas et al. | Oct 2003 | B1 |
6640301 | Ng | Oct 2003 | B1 |
6650890 | Irlam et al. | Nov 2003 | B1 |
6654787 | Aronson et al. | Nov 2003 | B1 |
6660590 | Yoo | Dec 2003 | B2 |
6671357 | Roberts, Jr. | Dec 2003 | B1 |
6691156 | Drummond et al. | Feb 2004 | B1 |
6701440 | Kim et al. | Mar 2004 | B1 |
6704729 | Klein et al. | Mar 2004 | B1 |
6714967 | Horvitz | Mar 2004 | B1 |
6714982 | McDonough et al. | Mar 2004 | B1 |
6725381 | Smith et al. | Apr 2004 | B1 |
6728785 | Jungck | Apr 2004 | B1 |
6732149 | Kephart | May 2004 | B1 |
6745936 | Movalli et al. | Jun 2004 | B1 |
6751626 | Brown et al. | Jun 2004 | B2 |
6760752 | Liu et al. | Jul 2004 | B1 |
6763462 | Marsh | Jul 2004 | B1 |
6766352 | McBrearty et al. | Jul 2004 | B1 |
6772196 | Kirsch et al. | Aug 2004 | B1 |
6785679 | Dane et al. | Aug 2004 | B1 |
6799352 | Gilchrist et al. | Oct 2004 | B2 |
6820204 | Desai et al. | Nov 2004 | B1 |
6829635 | Townshend | Dec 2004 | B1 |
6845374 | Oliver et al. | Jan 2005 | B1 |
6901398 | Horvitz et al. | May 2005 | B1 |
6978419 | Kantrowitz | Dec 2005 | B1 |
7016939 | Rothwell et al. | Mar 2006 | B1 |
7062498 | Al-Kofahi et al. | Jun 2006 | B2 |
7072942 | Maller | Jul 2006 | B1 |
7089241 | Alspector et al. | Aug 2006 | B1 |
7092992 | Yu | Aug 2006 | B1 |
7133898 | Malik | Nov 2006 | B1 |
7149778 | Patel et al. | Dec 2006 | B1 |
7174303 | Glazer et al. | Feb 2007 | B2 |
7177905 | Slutsman et al. | Feb 2007 | B1 |
7188073 | Tam et al. | Mar 2007 | B1 |
7200606 | Elkan | Apr 2007 | B2 |
7249175 | Donaldson | Jul 2007 | B1 |
7283970 | Cragun et al. | Oct 2007 | B2 |
7587327 | Jacobs et al. | Sep 2009 | B2 |
7870200 | Slater et al. | Jan 2011 | B2 |
20010027472 | Guan | Oct 2001 | A1 |
20010027481 | Whyel | Oct 2001 | A1 |
20010032245 | Fodor | Oct 2001 | A1 |
20010054072 | Discolo et al. | Dec 2001 | A1 |
20020023132 | Tornabene et al. | Feb 2002 | A1 |
20020032602 | Lanzillo, Jr. et al. | Mar 2002 | A1 |
20020035493 | Mozayeny et al. | Mar 2002 | A1 |
20020049751 | Chen | Apr 2002 | A1 |
20020055940 | Elkan | May 2002 | A1 |
20020078158 | Brown et al. | Jun 2002 | A1 |
20020083068 | Quass et al. | Jun 2002 | A1 |
20020099938 | Spitz | Jul 2002 | A1 |
20020104021 | Gross | Aug 2002 | A1 |
20020116463 | Hart | Aug 2002 | A1 |
20020116506 | Lautner | Aug 2002 | A1 |
20020116508 | Khan et al. | Aug 2002 | A1 |
20020116641 | Mastrianni | Aug 2002 | A1 |
20020124170 | Johnson, Jr. | Sep 2002 | A1 |
20020132607 | Castell et al. | Sep 2002 | A1 |
20020143770 | Schran et al. | Oct 2002 | A1 |
20020147754 | Dempsey et al. | Oct 2002 | A1 |
20020147777 | Hackbarth et al. | Oct 2002 | A1 |
20020156895 | Brown | Oct 2002 | A1 |
20020166117 | Abrams et al. | Nov 2002 | A1 |
20020181703 | Logan et al. | Dec 2002 | A1 |
20020184624 | Spencer | Dec 2002 | A1 |
20020194502 | Sheth | Dec 2002 | A1 |
20020199095 | Bandini et al. | Dec 2002 | A1 |
20030009385 | Tucciarone et al. | Jan 2003 | A1 |
20030023736 | Abkemeier | Jan 2003 | A1 |
20030028606 | Koopmans et al. | Feb 2003 | A1 |
20030036941 | Leska et al. | Feb 2003 | A1 |
20030037041 | Hertz | Feb 2003 | A1 |
20030050986 | Matthews | Mar 2003 | A1 |
20030056100 | Beatson | Mar 2003 | A1 |
20030069874 | Hertzog et al. | Apr 2003 | A1 |
20030095527 | Shanbhag | May 2003 | A1 |
20030101181 | Al-Kofahi et al. | May 2003 | A1 |
20030110181 | Schuetze et al. | Jun 2003 | A1 |
20030110212 | Lewis | Jun 2003 | A1 |
20030167311 | Kirsch | Sep 2003 | A1 |
20030172167 | Judge et al. | Sep 2003 | A1 |
20030172291 | Judge et al. | Sep 2003 | A1 |
20030172294 | Judge | Sep 2003 | A1 |
20030191969 | Katsikas | Oct 2003 | A1 |
20030195937 | Kircher, Jr. et al. | Oct 2003 | A1 |
20030212791 | Pickup | Nov 2003 | A1 |
20030222912 | Fairweather | Dec 2003 | A1 |
20030231207 | Huang | Dec 2003 | A1 |
20030233418 | Goldman | Dec 2003 | A1 |
20030236847 | Benowitz et al. | Dec 2003 | A1 |
20040029087 | White | Feb 2004 | A1 |
20040039912 | Borrowman et al. | Feb 2004 | A1 |
20040044996 | Atallah | Mar 2004 | A1 |
20040111478 | Gross et al. | Jun 2004 | A1 |
20040128355 | Chao et al. | Jul 2004 | A1 |
20040139327 | Brown et al. | Jul 2004 | A1 |
20040176072 | Gellens | Sep 2004 | A1 |
20040181462 | Bauer et al. | Sep 2004 | A1 |
20040255120 | Botti et al. | Dec 2004 | A1 |
20060027648 | Chea | Feb 2006 | A1 |
20060036701 | Bulfer et al. | Feb 2006 | A1 |
20060095527 | Malik | May 2006 | A1 |
20060190481 | Alspector et al. | Aug 2006 | A1 |
20090006842 | Ross et al. | Jan 2009 | A1 |
20090006860 | Ross | Jan 2009 | A1 |
20110106894 | Hodge et al. | May 2011 | A1 |
Number | Date | Country |
---|---|---|
0276424 | Aug 1988 | EP |
0276425 | Aug 1988 | EP |
0276426 | Aug 1988 | EP |
0276428 | Aug 1988 | EP |
0276429 | Aug 1988 | EP |
0323703 | Jul 1989 | EP |
0326778 | Aug 1989 | EP |
0851355 | Jul 1998 | EP |
0942374 | Sep 1999 | EP |
0982927 | Mar 2000 | EP |
1122672 | Aug 2001 | EP |
1168167 | Jan 2002 | EP |
1168167 | Jan 2002 | EP |
2364474 | Jan 2002 | EP |
2364474 | Sep 2011 | EP |
2364474 | Jan 2002 | GB |
411187235 | Jul 1999 | JP |
2000-261493 | Sep 2000 | JP |
2001-125851 | May 2001 | JP |
2001-167158 | Jun 2001 | JP |
2001-190133 | Jul 2001 | JP |
2002-163341 | Jun 2002 | JP |
7-200343 | Aug 2007 | JP |
WO 9910817 | Mar 1999 | WO |
WO 0127873 | Apr 2001 | WO |
Entry |
---|
US 5,749,074, 05/1998, Kasso et al. (withdrawn) |
“Novelty Search Results 2003”. |
“Microsoft Office 2003—Microsoft TechNet”, Apr. 1, 2003. |
Hu, , “Yahoo Adds Spam filter to Email, But Will it Work?”, Jan. 2, 2002, pp. 1-2. |
Padwick, , “Special Edition Using Microsoft Outlook 2000”, published May 12, 1999, pp. 1-3. |
Plaxo, , “Company Overview”, www.plaxo.com, 2002-2004. |
Plaxo, , “Make it Easy to Keep Contact Information”, www.plaxo.com, Nov. 12, 2002. |
Plaxo, , “Management Team”, www.plaxo.com, 2002-2004. |
Plaxo, , “Product Overview”, www.plaxo.com, 2002-2004. |
Plaxo, , “Update Your Address Book”, www.plaxo.com, 2002-2004. |
Slipstick, , “To Add Addresses Automatically”, published Jun. 7, 2002, pp. 1-2. |
“Cloudmark,”, home products support company, www.cloudmark.com, Jun. 24, 2002, 17 pgs. |
A Way to Stop Spam Messages, groups.google.com/groups?q=%B%22sender%22+%2Bspam&start=10&hl=en&lr . . . , Apr. 25, 2003, 4 pgs. |
Admediation: New Horizons in Effecrtive Email Advertising, Communications of the ACM archive, ISSN 0001-0782, vol. 44, iss. 12, Dec. 2001, pp. 91-96. |
Agung, A Three-Party HTTP Proxy to Support Internet Content Regulation, Australasian Conference on Information Security and Privacy, 2000, pp. 1-7. |
Alspector, Final Office Action, U.S. Appl. No. 11/380,375, Jan. 20, 2010, 16 pgs. |
Alspector, Office Action, U.S. Appl. No. 10/740,821, Feb. 24, 2005, 21 pgs. |
Alspector, Office Action, U.S. Appl. No. 10/740,821, Jul. 28, 2005, 24 pgs. |
Alspector, Office Action, U.S. Appl. No. 11/380,375, Jun. 15, 2009, 21 pgs. |
Alspector, Office Action, U.S. Appl. No. 11/380,375, Oct. 29, 2008, 19 pgs. |
Alspector, Office Action, U.S. Appl. No. 11/380,375, Mar. 31, 2008, 17 pgs. |
America Online Inc., International Preliminary Report on Patentability, PCT/US2004/001784, Jul. 29, 2005, 7 pgs. |
America Online Inc., International Preliminary Report on Patentability, PCT/US2004/001788, Jul. 29, 2005, 9 pgs. |
America Online Inc., International Preliminary Report on Patentability, PCT/US2004/043643, Jul. 3, 2006, 6 pgs. |
America Online Inc., International Search Report and Written Opinion, PCT/US2004/001784, Jan. 13, 2005, 9 pgs. |
America Online Inc., International Search Report and Written Opinion, PCT/US2004/001788, Mar. 10, 2005, 10 pgs. |
America Online Inc., International Search Report and Written Opinion, PCT/US2004/043643, May 26, 2005, 5 pgs. |
America Online Inc., International Search Report, PCT/US01/18556, May 6, 2002, 3 pgs. |
An Analysis of Spam Filters, A Mayor Qualifying Project Report, Worcester Polytechnic Institute, Apr. 2003. |
Androutsopoulos, A Comparison of a Naïve Bayesian and a Memory-Based Approach, KDD'2000, 2000, pp. 01-13. |
Androutsopoulos, An Evaluation of Naïve Bayesian Anti-Spam Filtering, ECML-2000, 2000, pp. 09-17. |
Androutsopoulos, An Experimental Comparison of Naïve Bayesian and Keyword-Based Anti-Spam Filtering with Encrypted Personal E-mail Messages, SIGIR-2000, 2000, pp. 160-167. |
Anti-spam service battles bugs, msnbc-cnet.com.com/2100-1023-938103.html?type=pt&part=msnbc&tag=alert&form=f, Jun. 20, 2002, 3 pgs. |
AOL Instant Messenger Windows Beta Features, AOL Instant Messenger All New Version 2.0, What is AOL Instant Messenger, Quick Tips for Getting Started; Frequently Asked Questions About AOL Instant Messenger, Jun. 24, 1999, 18 pgs. |
AOL Technology: turning complicated things into engaging services, 1996 Annual Report, 22 pgs. |
Bee Staff Reports, Governor wants to meet with refugee leaders, Modesto Bee, Mar. 5, 1989, p. 2B. |
Bennett, Assessing the calibration of naïve bayes' posterior estimates, Dept. of Comp. Sci., Carnegie Mellon University, 2000, 10 pgs. |
Better Bayesian Filtering, www.paulgraham.com/better.html, Jan. 2003, pp. 1-11. |
Bott, Special Edition using Microsoft Office 2000, Que Publishing, 1999, p. 772-78. |
Bradley, The use of the area under the ROC curve in the evaluation of machine learining algorithms, Patter Recognition, vol. 30, No. 7, 1997, pp. 1145-1159. |
Breiman, Bagging predictors, Machine Learning, vol. 24, 1996, pp. 123-140. |
Breiman, Out-of-bag estimation, Tech. Report, Dept. of Statistics, UC Berkeley, CA, 1996. |
Brin, Copy detection mechanisms for digital documents, SIGMOD, 1995, pp. 398-409. |
Broder, On the resemblance and containment of documents, SEQS: Sequences '91, 1998. |
Broder, Syntactic clustering of the web, www.hpl.hp.com/techreports/Compaq-DEC/SRC-TN-1997-015.pdf, 1997. |
Brown, Email with Netscape, Using Netscape 2, Chapter 13, Que Corporation, Jan. 1996, pp. 327-352. |
Brown, Support Vector Machine Classification of Microarray Gene Expression Data, Tech. Report, UCSC-CRL-99-09, UC Santa Cruz, 1999. |
Buckley, The smart/empire tipster IR system, TIPSTER Phase III Proceedings, 2000. |
Chowdhury, Collection statistics for fast duplicate document detection, ACM Transactions on Information Systems, vol. 20, No. 2, 2002, pp. 171-191. |
Cobb, International Search Report, PCT/US98/17677, Dec. 29, 1998, 2 pgs. |
Cohen, Fast effective rule induction, 12th Int'l Conf. on Machine Learning, 1995. |
Cohen, Instant Messaging, PC Magazine, PC Labs, Apr. 13, 1999, 2 pgs. |
Cohen, Learning Rules that Classify E-mail, AAAI Spring Symposium on Machine Learning in Information Access, 1996. |
Controlling E-Mail Spam, spam.abuse.net/adminhelp/mail.shtml, Mar. 28, 2003, 5 pgs. |
Cranor, Spam!, Communications of the ACM, vol. 41, No. 8, Aug. 1999, pp. 74-83. |
Cybozu Office 4 Support, www.share360.com/support/office4/manuals/updates—-—Linux.all.html, Mar. 13, 2002. |
Diederich, Authorship Attibution with Support Vector Machines, Proc. of the Learning Workshop, Snowbird, Utah, 2000. |
Domingos, A general method for making classifiers cost-sensitive, KDD'99, ACM Press, 1999, pp. 155-164. |
Drucker, Support Vector Machines for Spam Categorization, IEEE Transactions on Neural Networks, vol. 10, No. 5, 1999, pp. 1048-1054. |
Drucker, Support Vector Machines for Spam Categorization, IEEE Transactions on Neural Networks, vol. 10, No. 5, Sep. 1999. |
Dudley, Telstra targets Net spammers, www.news.com.au/common, Dec. 2, 2003, pp. 1-2. |
Dumais, Inductive Learning Algorithms and Representaions for Text Categorization, 7th Int'l Conf. on Information and Knowledge Management, 1998, pp. 229-237. |
Dwork, Pricing bia Processing or Combatting Junk Mail, IBM Research Division and Department of Applied Mathematics and Computer Science, Weizmann Institute of Science, 12 pgs. |
Ephrati, A Non-Manipulable Meeting Scheduling System. |
Eyheramendy, On the Naïve Bayes model for text categorization, 9th Int'l Workshop on Artificial Intelligence and Statistics, 2003. |
Fawcett, ROC graphs: notes and practical considerations, Tech. Report HPL-2003-4, HP Lbs, 2003. |
Foiling Spam with an Email Password System, www.uwasa.fi/˜ts/info/spamfoil.html, Jun. 28, 2004, 10 pgs. |
FTC prepares to bust spammers, msnbc-cnet.com.com/2100-1023-834044.html?tag=bp1st, Feb. 11, 2002, 2 pgs. |
Garrido, Cognitive Modeling and Group Adaptation in Intelligent Multi-Agent Meeting Scheduling. |
Garrido, Multi-Agent Meeting Scheduling: Preliminary Experimental Results. |
Gavin, How to Advertise Responsibly Using E-Mail and Newsgroups or—how NOT to Make Enemies Fast!, ftp.rfc-editor.org/in-notes/fyi/fyi28.txt, Nov. 7, 2002, pp. 1-27. |
Habeas, Habeas Frequently Asked Questions, Oct. 3, 2002. |
Hall, A Countermeasure to Duplicate-detecting Antipspam Techniques, Tech. Report 99.9.1, AT&T Labs, 1999. |
Hammami, WebGuard: Web based Adult Content Detection and Filtering System, IEEE 0-7695-1932, WI'03, Jun. 2003, pp. 1-5. |
Hearst, Support Vector Machines, IEEE Intelligent Systems, Jul./Aug. 1998. |
Heintze, Scalable document fingerprinting, USENIX Workshop on Electronic Commerce, Nov. 1996. |
Hidalgo, Combining Text and heuristics for Cost-Sensitive Spam Filtering, CoNLL-2000, Lisbon, Portugal, 2000. |
Hird, Technical Solutions for Controlling Spam, Proc. Aug. 2002, Melbourne, Australia, Sep. 4-6, 2002. |
Hoad, Methods for identifying versioned and plagiarized documents, J. American Society for Information Science and Technology, 2002. |
Hoffman, Unsolicited Bulk Email: Mechanisms for Control, Internet Mail Consortium Report UBE-SOL, IMCR'005, Oct. 13, 1997, 31 pgs. |
Hoffman, Unsolicited Bulk Email: Mechanisms for Control, Internet Mail Consortium Report UBE-SOL, IMCR'008, May 4, 1998, 16 pgs. |
How to Make SURE a Human is Sending You Email, groups.google.com/group/news.admini.net-abuse.usenet/msg/e601783e8f40c545?d . . . , 2 pgs. |
International Search Report, PCT/US04/01784, Jan. 13, 2004. |
Internet is Losing Ground in the Battle Against Spam, The New York Times, NyTimes.com, Apr. 2003, pp. 1-4. |
Joachims, Text Categorization with Support Vector Machines: Learning with Many Relevant Features, ECML'98, 1998, pp. 137-142. |
Joachims, Text Categorization with Support Vector Machines: Learning with Many Relevant Features, LS-8 Report, Computer Science Dept., U. of Dortmund, 1998. |
Kaitarai, Filtering Junk E-mail: A performance comparison between genetic programming and naïve Bayes, Tech. Report presented at Fall 1999 Mtng of the CMU Text Learning Group, Dept. of Elect/Computer Engineering U. of Waterloo, Nov. 1999. |
Kangasharju, Secure and Resilient Peer-to-Peer Email: Design and Implementation, IEEE 0-7695-203, P2P'03, May 2003, pp. 1-8. |
Kleinberg, Bursty and hierarchical structure in streams, KDD-2002, 2002. |
Klensin, IMAP/POP Authorize Extension for Simple Challenge / Response, Sep. 1997, 5 pgs. |
Kolcz, SVM-based Filtering of E-mail Spam with Content-specific Misclassification Costs, TextDM'2001, San Jose, CA, 2001. |
Lewis, Naïve (Bayes) at forty, the independence assumption in information retrieval, ECML-1998, 1998, pp. 4-15. |
Lin, Formulations of support vector machines: A note from an optimization point of view, Neural Computation, vol. 13, 2001, pp. 307-317. |
Margineantu, Bootstrap methods for the cost-sensitive evaluation of classifiers, ICML-2000, 2000. |
Marvin, Announce: Implementation of E-mail Spam Proposal, News.admin.net-abuse.misc, Aug. 2, 1996. |
Massey, Learning Spam: Simple Techniques for Freely-Available Software, Computer Sci. Dept, Portland, Oregon, 2003, pp. 1-14. |
Massey, Learning Spam: Simple Techniques for Freely-Available Software, USENIX'2003, 2003, pp. 63-76. |
McCallum, A comparision of event models for Naïve Bayes text classification, AAAI-98, Madison, WI, 1998. |
McCallum, Efficient clustering of high-dimensional data sets with application to reference matching, KDD-2000, 2000. |
McLain, Office Monitor, CHI 1996 Conference on Human Factors in Computing Systems, Apr. 14-18, 1996. |
Morik, Knowledge discovery and knowledge validation in intensive care, Artificial Intelligence in Medicine, vol. 19, 2000, pp. 225-249. |
Moseley, The Basics of Outlook, Mastering Office 97 Professional Ed., Chapter 33, Microsoft, ISBN 0-7821-1925-5, 1997, pp. 753-763. |
Muna, Message to mailing list[lmc-richmond] coordinating schedules = meetings, lists.indymedia.org, Sep. 2001. |
My Spamblock, Was: Thwarting UCE address culling program, www.google.com/groups?hl=en&lr=lie=UTF-8&oe-UTG&selm+32E1A4FD.41C . . . , 28APR2033, 2 pgs. |
NAGS Spam Filter, www.nags.org/spamfilter.html, Oct. 30, 1997, 11 pgs. |
Naor, Verification of a Human in the Loop or Identification Via the Turing Test, Dept. of Applied Mathematics and Computer Science, Weizmann Institute of Science, Sep. 13, 1996, 6 pgs. |
Net surfers set out to squelch spam, CNET News.com, msnbc-cnet.com.com/2100-1023-829399.html@tag=rn, Feb. 5, 2002, 4 pgs. |
Nguyen, PHEmail: Designing a Privacy Honoring Email System, ACM 1-58113-637, CHI'2003, Apr. 2003, pp. 922-928. |
O'Grady, A Groupware Environment for Complete Meetings: U. of Calgary. |
Padwick, Using Microsoft Outlook 2000, Que Publishing, May 12, 1999, p. 1-93. |
Pantel, A Spam Classification & Organization Program, AAAI-98, Madison, WI, 1998. |
Platt, Fast training of support vector machines using sequential minimal optimization, Advances in Kernel Methods—Support Vector Learning, MIT Press, 1999. |
Privacy Recovery with Disposable Email Addresses, IEEE Security Privacy, ISBN 1540-7993/03, 2003, pp. 35-39. |
Provost, Naïve-Bayes vs. Rule-Learning in Classification of Email, Tech. Report, Dept of Computer Sciences, U. of Texas, Austin, TX, 1999. |
Provost, Robust Classification for Imprecise Environments, Machine Learning, vol. 42, 2001, pp. 203-231. |
Redmond, AlterEgo E-Mail Filtering Agent—Using CBR as a Service, AAAI-98, Workshop on Case-Based Reasoning Integrations, Madison, WI, 1998. |
Rennie, An Application of Machine Learning to E-mail Filtering, KDD-2000, Workshop on Text Mining, 2000. |
Rennie, Improving Multi-Class Text Classification with Naïve Bayes, Tech. Report ATTR-2001-004, MIT, 2001. |
Resnick, Internet Message Format, RFC 2822, Apr. 2001. |
Rudd, Winning the PC Shell Game, Today's Office, Jan. 1989. |
Sahami, A Bayesian Approach to Filtering Junk E-mail, AAAI-98, Workshop on Learning for Text Categorization, Madison, WI, 1998. |
Sakkis, Stacking Classifiers for Anti-Spam Filtering of E-Mail, EMNLP-2001, Carnegie Mellon University, 2001, pp. 44-50. |
Salton, A vector-space model for automatic indexing, Communications of the ACM, vol. 18, 1975. |
Sanderson, Duplicate detection in the Reuters collection, Tech. Report TR-1997-5, Dept. of Computing Science, U. of Glasgow, 1997. |
Sarawagi, Interactive deduplication using active learning, KDD-2002, 2002. |
Schohn, Active Learning with Support Vector Machines, ICML-2000, San Francisco, CA, 2000, pp. 839,846. |
Segal, An Intelligent Asisstant for Organizing E-Mail, 3rd Int'l Cong. on Autonomous Agents, 1999. |
Segal, Incremental Learning in SwiftFile, ICML-2000, 2000. |
Sen, A Formal Study of Distributed Meeting Scheduling. |
Sen, An Automated Distributed Meeting Scheduler; Dept. of Mathematical & Computer Sciences, U. of Tulsa. |
Sen, Satisfying User Preferences While Negotiating Meetings; Dept. of Mathematics & Computer Sciences, U. of Tulsa. |
Shivakumar, A Copy Detection Mechanism for Digital Documents, DL'95, Austin, TX, 1995. |
Start-up wants your held to fight spam, CNET News.com Review-700XL, msnbc-cnet.com.com/2100-1023-937300.html?tag=rn, Jun. 19, 2002, 3 pgs. |
Syroid, Outlook 2000 in a Nutshell, O'Reilly Media Inc., May 2, 2000, p. 1-28. |
Take a Number Systems, Turn-O-Matic, Oct. 25, 2001. |
Tarpitting with qmail-smtpd, www.palimine.net/qmail/tarpit.html, 1 pg. |
The Big Picture, CNET Neews.com Review—700XL, msnbc-cnet.com.com/2104-10230938103.html, Jun. 24, 2002, 2 pgs. |
The Penny Black Project, research.microsoft.com/research/sv/PennyBlack, May 8, 2006, 2 pgs. |
Vapnik, Statistical Learning Theory, Chapter 10, John Wiley, NY, 1998. |
Vipul's Razor, razor.sourceforge.net, Jun. 24, 2002, 23 pgs. |
Wahba, Support vector machines, reproducing kernel Hilbert spaces and the randomized GACV, Advances in Kernel Methods: Support Vector Learning, MIT Press, 1999, pp. 69-88. |
Weiss, The Effect of Class Distribution on Classifier Learning: An Empirical Study, Tech. Report ML-TR-44, Dept. of Computer Science, Rutgers U., 2002. |
Winkler, The State of Record Linkage and Current Research Problems, Tech. Report, Statistical Research Division, U.S. Bureau of Census, Washington, DC 1999. |
Woolridge, Qmail-spamthrottle(5)—the spam throttle mechanism, spamthrottle.qmail.ca/man/qmail-spamthrottle.5.html, pp. 1-4. |
Yahoo! Messenger Makes the World a Little Smaller, More Informed, Jun. 21, 1999, pp. 1-2. |
Yang, A Comparative Study on Feature Selection in Text Categorization, ICML'97, 1997, pp. 412-420. |
Zadrozny, Learning and making decisions when costs and probabilities are both unknkown, Tech. Report CS2001-0664, U. of California San Diego, 2001. |
Zaragoza, Learning to Filter Spam E-Mail: Comparison of a Naïve Bayesian and a Memory-Based Approach, 4th European Conf. on Principles and Practice of Knowledge Discovery in Databases, Lyon, France, Sep. 2000, pp. 1-12. |
Zaragoza, Machine Learning and Textual Information Access, KDD'2000, Lyon, France, Sep. 2000, pp. 1-13. |
Zaragoza, The perception algorithm with uneven margins, ICML 2002, 2002, pp. 379-386. |
Number | Date | Country | |
---|---|---|---|
20120324364 A1 | Dec 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12784737 | May 2010 | US |
Child | 13598379 | US | |
Parent | 10606021 | Jun 2003 | US |
Child | 12784737 | US |