Managing gigabytes (2nd ed.): compressing and indexing documents and images
Managing gigabytes (2nd ed.): compressing and indexing documents and images
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Distributed object location in a dynamic network
Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Finding similar files in a large file system
WTEC'94 Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference
Spam attacks: p2p to the rescue
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Collision Module Integration in a Specific Graphic Engine for Terrain Visualization
IV '04 Proceedings of the Information Visualisation, Eighth International Conference
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Secure distributed human computation
Proceedings of the 6th ACM conference on Electronic commerce
G2-P2P: a fully decentralised fault-tolerant cycle-stealing framework
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Workload models of spam and legitimate e-mails
Performance Evaluation
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Wildcard Search in Structured Peer-to-Peer Networks
IEEE Transactions on Knowledge and Data Engineering
Thwarting E-mail Spam Laundering
ACM Transactions on Information and System Security (TISSEC)
A novel email abstraction scheme for spam detection
Proceedings of the 17th ACM conference on Information and knowledge management
A survey of learning-based techniques of email spam filtering
Artificial Intelligence Review
On intelligent interface agents for human based computation
IDEAL'07 Proceedings of the 8th international conference on Intelligent data engineering and automated learning
Detecting and characterizing social spam campaigns
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
Detecting and filtering instant messaging spam: a global and personalized approach
NPSEC'05 Proceedings of the First international conference on Secure network protocols
SocialFilter: introducing social trust to collaborative spam mitigation
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Exploiting similarity for multi-source downloads using file handprints
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Anti-spam grid: a dynamically organized spam filtering infrastructure
SMO'05 Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization
TRAP: open decentralized distributed spam filtering
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Secure distributed human computation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Security in p2p networks: survey and research directions
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Immune-Based peer-to-peer model for anti-spam
ICIC'06 Proceedings of the 2006 international conference on Computational Intelligence and Bioinformatics - Volume Part III
Dependable peer-to-peer systems withstanding dynamic adversarial churn
Dependable Systems
Hi-index | 0.00 |
Recent work in P2P overlay networks allow for decentralized object location and routing (DOLR) across networks based on unique IDs. In this paper, we propose an extension to DOLR systems to publish objects using generic feature vectors instead of content-hashed GUIDs, which enables the systems to locate similar objects. We discuss the design of a distributed text similarity engine, named Approximate Text Addressing (ATA), built on top of this extension that locates objects by their text descriptions. We then outline the design and implementation of a motivating application on ATA, a decentralized spam-"ltering service. We evaluate this system with 30,000 real spam email messages and 10,000 non-spam messages, and "nd a spam identi" cation ratio of over 97% with zero false positives.