參考文獻
壹、中文部分
1.吳文峰, 「中文郵件分類器之設計及實作」, 逢甲大學 資訊工程學系碩士班碩士論文, 民國九十一年六月。2.吳仁和、林信惠, 「系統分析與設計 理論與實務應用」, 智勝文化出版, 2002。
3.吳弘凱、鄧文淵, 「首頁製作百寶箱使用技巧」, 松崗出版, 2000。
4.林長毅 譯, 「Java網路程式設計」, 歐萊禮出版, 2002。
5.麥可 斐瑞, 戈登 林若夫, 「資料採礦-顧客關係管理暨電子行銷之應用」, 2001。
6.陳建勳 譯, 「Eclipse 整合開發工具」, 歐萊禮出版, 2004。
7.陳建勳 譯, 「JDBC與Java資料庫程式設計」, 歐萊禮出版, 2003。
8.曾龍, 「資料探礦-概念與技術」, 維科出版, 2004。
9.PC Home, 「PC Home Online網路家庭TM會員服務使用條款, Available:http://isp.pchome.com.tw/reg-bin/law.html. (Accessed on March 2005) 。
1.Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C.,and Stamatopoulos, P., "Learning to filter spam e-mail: A comparison of a naiveBayesian and a memory-based approach," In Proceedings of the Workshop onMachine Learning and Textual Information Access, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000),Lyon, France, 2000, pp. 1- 3.
2.Cunningham, P., Nowlan, N., Delany, S., and Haahr, M., "A Case-Based Approach to Spam Filtering that Can Track Concept Drift," In Proceedings of ICCBR-03 Workshop on Long-Lived CBR Systems, 13 May 2003, Available:http://www.cs.tcd.ie/publications/tech-reports/reports.03/TCD-CS-2003-16.pdf. (Accessed on March 2004).
3.Elliotte Rusty Harold, "Java Network Programing", O`REILLY, 2002.
4.Fawcett, T., "In vivo spam filtering: A challenge problem for data mining," KDD Explorations, 5(2), December 2003,Available:http://www.hpl.hp.com/personal/Tom_Fawcett/papers/spam-KDDexp.pdf (Accessed on March 2005).
5.George Reese, "JDBC And Java Database Designing", O`REILLY, 2003.
6.I. Androutsopoulos, J. Koutsias, K. V. Chandrinos,and C. D. Spyropoulos. “An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages”. In Proceedings of SIGIR-2000, ACM, pp. 160-167, 2000.
7.Ian H. Witten, Eibe Frank, "Data Mining-Practical machine learning tools and techniques with java implementations ", Morgon kaufmann ,2003.
8.Jiawei, H. And Micheline, K., “Data Mining Concepts and Techniques.”, Morgan Kaufmann Publishers, 2001.
9.Kirkby, R., “WEKA Explorer User Guide for Version 3-3-4”, Waikato University, July 3,2002,Available:http://prdownloads.sourceforge.net/weka/ExplorerGuide.pdf(Accessed on March 2005).
10.Michael J.A. Berry, Gordon Linoff, "Data MiningTechniques:for marketing, and sales, and customer support", John Wiley & Sons, Inc., 2001.
11.Manco, G., Masciari1, E., Ruffolo, M., and Tagarelli, A., "Towards An AdaptiveMail Classifier," In Italian Association for Artificial Intelligence Workshop Su Apprendimento Automatico: Metodi Ed Applicazioni, 2002,Available:http://www-dii.ing.unisi.it/aiia2002/paper/APAUT/Abstract/manco-aiia02.pdf .(Accessed on March 2005).
12.Myllymaki, P., Tirri, H., "Bayesian Case-Based Reasoning with NeuralNetworks," Neural Networks, IEEE International Conference, 1(28), pp.422-427, 1993,.
13.Sakkis, G., Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Spyropoulos, C.,and Stamatopoulos, P., "A memory-based approach to anti-spam ltering," TechReport DEMO 2001, National Centre for Scientic Research \Demokritos", 2001.
14.Sun Microsystems, "JavaMail API Design Specification Version 1.2", Available:http://java.sun.com/products/javamail/reference/api/index.html (Accessed on March 2004).
15.Sun Microsystems, "JavaMail guide for service providers", Available:http://java.sun.com/products/javamail/reference/api/index.html (Accessed on March 2004).
16.Steve Holzner, "Eclipse IDE", O`REILLY, 2004.