|
[1]About Bayesian Belief Networks, Charles River Analytics, Inc. 2004
[2]Aron Culotta, Ron Bekkerman, and Andrew McCallum, Extracting social networks and contact information from email and the Web, MIT Spam Conference, 2004
[3]Barry Leiba, Nathaniel Borenstein, A Multifaceted Approach to Spam Reduction, MIT Spam Conference, 2004
[4]Brett Watson, Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification. MIT Spam Conference, 2004
[5]Bryan Klimt, Yiming Yang, Introducing the Enron Corpus, MIT Spam Conference, 2004
[6]Cnet. http://taiwan.cnet.tw
[7]Eirinaios Michelakis, Ion Androutsopoulos, Georgios Paliouras, George Sakkis, and Panagiotis Stamatopoulos, Filtron: A Learning-Based Anti-Spam Filter, MIT Spam Conference, 2004
[8]Geoff Hulten, Anthony Penta, Gopalakrishnan Seshadrinathan, Manav Mishra, Trends in Spam Products and Methods, MIT Spam Conference, 2004
[9]Gregory L. Wittel and S. Felix Wu, On Attacking Statistical Spam Filters, MIT Spam Conference, 2004
[10]Hiromitsu FUJIKAWA, Katsuyuki YAMAZAKI, Fuminori ADACHI, Takashi WASHIO, Hiroshi MOTODA, Density-Based Spam Detector, Industry/Government Track Paper, 2004
[11]Jason Rennie. Ifile: Anapplication of Machine Learning to E-Mail Filtering: KDD-2000 Text Mining Workshop Boston, MA USA
[12]Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Intelligent Database Systems Research Lab, School of Computing Science, Simon Fraser University, Canada
[13]John Graham-Cumming, The Spammer’s Compendium, popfile.sourceforge.net, 2003
[14]Joshua Goodman, IP Addresses in Email Clients, MIT Spam Conference, 2004
[15]Marek J. Druzdzel, Qualitative verbal explanations in Bayesian Belief Network, Artificial, Intelligence and Simulation of Behaviour Quarterly, Specail issue on Baysian belief networks, 94:43-54, 1996
[16]Pedro Domingos.When and how to sub sample: SIGKDD Exploratioins,3(2),2002
[17]P.E.M. Huygen, Use of Bayesian Belief Networks in legal reasoning, 17th BILETA Annual Conference, 2002
[18]Prasad, & E. K. Park, ”AI-based Classification and Retrieval of Reusable Software Components,” IEEE Software, 1993, pp. 519-523.
[19]Richard Clayton, Stopping Spam by Extrusion Detection, MIT Spam Conference, 2004
[20]Richard Segal, Jason Crawford, Jeff Kephart, Barry Leiba, SpamGuru: An Enterprise Anti-Spam Filtering System, MIT Spam Conference, 2004
[21]Shabbir Ahmed and Farzana Mithun, Word Stemming to Enhance Spam Filtering, MIT Spam Conference, 2004
[22]Shlomo Hershkop. Behavior based Spam Detection . MIT Spam Conference, 2004.
[23]Spam Conference 2003. http://spamconference.org/
[24]Susan Dumais, John Platt, David Heckerman and Mehran sahami. Inductive learning algorithms and representations for text classification: Seventh International Conference on Information and Knowledge Management
[25]Thorsten Joachims. Aprobabililistic analysis of the rocchio algorithm with tfidf for text categorization: Proceedingsof the Fourteenth International Conference on Machine Learning,1997
[26]T.A Meyer and B Whateley, SpamBayes: Effective open-source, Bayesian based, email classification System, MIT Spam Conference, 2004
[27]William Yerazunis. Sparse Binary Polynomial Hashing and the CRM114 Discriminator : Spam Conference 2003 ,MIT
[28]Yiming Yang and Xin Liu. A re-examination of text categorization methods. Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval, 1999
[29]王稔志 & 張俊盛, ”適應性文件分類系統”,第十四屆計算語言學研討會, 2001
[30]柯淑津、陳振南, 階層式文件自動分類之特徵選取研究, 第十二屆計算語言學研討會,p.137-150頁, 1999
[31]沈健誠 & 張俊盛,”多篇文件自動摘要系統”, 第十四屆計算語言學研討會, 2001
[32]卓忠毅 & 盧祈安, Bayesian Network, Department of Computer and Information Science, Soochow University, 2003
[33]楊允言, 陳淑美, 陳克健, 中文文件自動分類之研究, 第六屆計算語言學研討會論文集, p.217-233, 1993
[34]顏國偉, 譚慧敏 基於知網的常識知識標注: 中文計算語言學期刊,第四卷第二期, 39~86頁,1999 [35]中研院CKIP 小組. http://godel.iis.sinica.edu.tw/CKIP/
|