Cheriton

Results: 188



#Item
71

Semi-supervised Spam Filtering: Does it Work? Mona Mojdeh and Gordon V. Cormack Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, Canada

Add to Reading List

Source URL: plg.uwaterloo.ca

Language: English - Date: 2008-04-21 11:15:36
    72Spam filtering / Spamming / Email / Cross-platform software / Webmail / Anti-spam techniques / Mozilla Thunderbird / Email spam / SpamAssassin / Email filtering / Text Retrieval Conference / Outlook.com

    A Mail Client Plugin for Privacy-Preserving Spam Filter Evaluation Mona Mojdeh Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1

    Add to Reading List

    Source URL: www.ceas.cc

    Language: English - Date: 2009-11-09 01:34:13
    73Knowledge / Statistics / Statistical theory / Psychometrics / Natural language processing / Critical thinking / Statistical inference / Measurement / Sampling / Information retrieval / Text Retrieval Conference / Bias

    Power and Bias of Subset Pooling Strategies Gordon V. Cormack and Thomas R. Lynam David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada

    Add to Reading List

    Source URL: plg.uwaterloo.ca

    Language: English - Date: 2008-02-23 09:42:16
    74

    Deniable Key Exchanges for Secure Messaging Nik Unger Ian Goldberg Cheriton School of Computer Science

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2015-08-22 13:32:47
      75Spam filtering / Computing / Spamming / Cyberspace / Technology / Email / Anti-spam techniques / Bogofilter / Email spam / Information filtering system / Text Retrieval Conference / Conference on Email and Anti-Spam

      Spam Filter Evaluation with Imprecise Ground Truth Gordon V. Cormack Aleksander Kołcz Cheriton School of Computer Science

      Add to Reading List

      Source URL: plg.uwaterloo.ca

      Language: English - Date: 2009-05-19 18:23:05
      76

      Congestion-aware Path Selection for Tor⋆ Tao Wang, Kevin Bauer, Clara Forero, and Ian Goldberg Cheriton School of Computer Science University of Waterloo {t55wang,k4bauer,ciforero,iang}@cs.uwaterloo.ca

      Add to Reading List

      Source URL: fc12.ifca.ai

      Language: English - Date: 2012-02-18 14:34:42
        77Northeastern University / Northeastern University College of Computer and Information Science / David R. Cheriton School of Computer Science

        CS Self-Study Questionnaire

        Add to Reading List

        Source URL: cte.illinois.edu

        Language: English - Date: 2009-02-20 16:51:03
        78

        Domain Adaptation using Nearest Neighbors Ruth Urner, Shai Ben-David David R. Cheriton School of Computer Science University of Waterloo

        Add to Reading List

        Source URL: snowbird.djvuzone.org

        Language: English - Date: 2011-02-12 20:27:37
          79

          On Realistically Attacking Tor with Website Fingerprinting Tao Wang Ian Goldberg Cheriton School of Computer Science

          Add to Reading List

          Source URL: cacr.uwaterloo.ca

          Language: English - Date: 2015-06-27 17:31:22
            80

            A Simple and Unified Method of Proving Indistinguishability (Extended Abstract) Mridul Nandi David R. Cheriton School of Computer Science, University of Waterloo, Canada

            Add to Reading List

            Source URL: www.isical.ac.in

            Language: English - Date: 2011-12-28 03:46:39
              UPDATE