Search alternatives:
"spam" » "span"

361
by Johnson, Robert
Published 2003
Macmillan Education UK
Table of Contents: ... Capitalism': Did the Flag Follow Trade? -- What were the Motives and Effects of Colonization and Migration...

362
Published 2001
Springer Netherlands
Table of Contents: ... -- Applications of Flag Contact Singularities -- On Stokes Sets -- Resolutions of discriminants and topology...

363
by Kaufmann, Michael
Published 2022
Packt Publishing, Limited
Table of Contents: ... Using GitHub Packages Deploying to Any Platform Feature Flags and the Feature Lifecycle Trunk-Based...

364
Published 2013
Springer Berlin Heidelberg
... in biometrics, computational stylistics, multi-agent systems, spam classification including an extremely well...

365
Published 2012
Springer Berlin Heidelberg
..., and effort; recommender systems (including topics such as matrix factorization, critiquing, noise and spam...

366
Published 2009
Springer Berlin Heidelberg
... applications are spam filtering and web search, but a large number of everyday uses exist (intelligent web...

367
Published 2015
Springer International Publishing
... and spam filtering; computer-aided translation; corpora and language resources; data mining and semantic...

368
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... Microscopy (SPAM) -- Combining Micromanipulation, Kerr Magnetometry and Magnetic Force Microscopy...

369
by Perry, Greg M.
Published 2005
Sams
... viruses, spam and spyware. Updated to include information relating to the Windows XP Server Pack 2, Sams...

370
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Security Analysis of “A Novel Elliptic Curve Dynamic Access Control System” -- VoIP SPAM Response...

371
by Rheingold, Howard
Published 2011
O'Reilly Media
... the beginning, Rheingold will show you how to detect urban legends, spam email, criminal hoaxes, and phishing...

372
Published 2021
Humana
Table of Contents: ... -- Sequence Comparison without Alignment: The SpaM Approaches -- Lamassemble: Multiple Alignment and Consensus...

373
by Thomas, Orin
Published 2018
Dpunkt.verlag
... Exchange Online und Skype for Business Online, mit Advanced Threat Protection, benutzerdefiniertem Spam...

374
by Kearns, Michael, Roth, Aaron
Published 2020
Tantor Media, Inc.
.... Meanwhile, users manipulate algorithms to "game" search engines, spam filters, online reviewing services...

375
Published 2024
Packt Publishing
... are well-prepared from the start. The course delves into spam detection, beginning with a problem...

376
Published 2024
Packt Publishing
... and tips needed for success. Delve into the core of text analytics with dedicated sections on spam...

377
by Miller, Michael
Published 2013
Que
... your family and your computer from viruses, spam, and spyware -- Set up a wireless home network...

378
by Desmond, Brian
Published 2008
O'Reilly Media
Table of Contents: ...Category 1 objectsSchema FlagsEx; Search Flags; Ambiguous Name Resolution; Preserve attribute...

379
by Heuss, Adrian, Süßbier, Siegfried
Published 2015
Springer Berlin Heidelberg
Table of Contents: .... Poetry Spam...

380
Published 2023
Springer Nature Singapore
Table of Contents: ... Analysis for Email Spam Detection Using Machine Learning Algorithms -- Post Quantum Cryptography: A...