Semantic Scholar uses AI to extract papers important to this topic.
This paper presents a failure diagnosis algorithm for summarizing and generalizing patterns that lead to instances of anomalous… Expand Internet mail suffers from the fact that much unwanted mail is sent
using spoofed addresses -- "spoofed" in this case means that… Expand This document defines an algorithm by which, given an e-mail message,
one can extract the identity of the party that appears to… Expand Acknowledgments The author acknowledges sponsorship from the U.S. Department of Homeland Security, Science and Technology… Expand Anonymity in peer-to-peer network means that it is difficult to associate a particular communication with a sender or a recipient… Expand We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to… Expand A desired attribute in safety-critical embedded real-time systems is a system time and event synchronization capability on which… Expand IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes… Expand A desired attribute in safety critical embedded real-time systems is a system time/event synchronization capability on which… Expand An open architecture for distributed form management is described. The model employs object-orientation in describing… Expand