參考文獻 |
[1] T. J. Coan and A. M. Ostrander, “E-Mail Life Cycle Management: Keeping Watch Over the Rising Tide,” International Legal Technology Association, White Paper, Jul. 2009.
[2] J. Vandermeer, “Seven Highly Successful Habits of Enterprise Email Managers: Ensuring that your employees' email usage is not putting your company at risk,” Information Systems Security, 2006, pp.64-75.
[3] J. P. Kesan, “Cyber-Working or Cyber-Shirking?: A First Principles Examination on Electronic Privacy in the Workspace,” Florida Law Review, vol. 54, 2002, pp. 289-332.
[4] AMA Press Room, “2007 Electronic Monitoring & Surveillance Survey,” American Management Association and The ePolicy Institute, Feb. 2008.
[5] J. R. Tyler, D. M. Wilkinson, and B. A. Huberman, “Email as spectroscopy: Automated discovery of community structure within organizations, “ The Information Society, 21, pp. 133-141, 2005.
[6] K.. Yelupula, and S. Ramaswamy, “Social network analysis for email classification,” Proceedings of the 46th Annual Southeast Regional Conference, pp. 469-474, 2008.
[7] J. Shetty, and J. Adibi, The Enron Dataset Database Schema and Brief Statistical Report. http://www.isi.edu/~adibi/Enron/Enron_Dataset_Report.pdf.
[8] R. D. Twining, M. M. Williamson, and M. Mowbray, “Email prioritization: Reducing delays on legitimate mail caused by junk mail,” Proceedings of the USENIX Annual Technical Conference, pp. 45-58, 2004.
[9] P-A Chirita, J. Diederich, and W. Nejdl, “MailRank: Using ranking for spam detection,” Proceedings of the ACM CIKM Conference on Information and Knowledge Management, pp. 373-380, 2005.
[10] C-Y Tseng, J-W Huang, and M-S Chen, “ProMail: Using progressive email social network for spam detection,” Proceedings of the Pan-Asia Conference on Knowledge Discovery and Data Mining, pp. 833-840, 2007.
[11] C-Y Tseng, and M-S Chen, “Incremental SVM model for spam detection on dynamic email social networks,” Proceedings of the IEEE International Conference on Computational Science and Engineering, 2009.
[12] C. Neustaedter, A. J. Brush, M. Smith, and D. Fisher, “The social network and relationship finder: Social sorting for email triage,” Proceedings of the Second Conference on Email and Anti-Spam, 2005.
[13] C. Neustaedter, A. J. Brush, and M. Smith,”Beyond “From” and “Received”: Exploring the dynamics of email triage,” Proceedings of the 2005 Conference on Human Factors in Computing Systems, pp. 1977-1980, 2005.
[14] D. Fisher, A. J. Brush, B. Hogan, M. Smith, and A. Jacobs, “Using social metadata in email triage: Lessons from the field,” Proceedings of the 2007 Conference on Human-Computer Interaction, pp. 13-22, 2007.
[15] S. Yoo, Y. Yang, F. Lin, and I-C Moon, “Mining social networks for personalized email prioritization,” Proceedings of the 15th Conference on Knowledge Discovery and Data Mining, pp. 967-976, 2009.
[16] W-Y Ma, K-J Chen, “Introduction to CKIP Chinese word segmentation system for the first international Chinese word segmentation bakeoff,” Proceedings of the second SIGHAN workshop on Chinese language processing, pp. 168-171, 2003.
[17] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor. Newsl.,11, pp. 10-18, 2009.
[18] Y. EL-Manzalawy and V. Honavar, “Integrating Libsvm into Weka environment,” 2005. Software available at: http://www.cs.iastate.edu/~yasser/wlsvm.
[19] Cross-validation (statistics), http://en.wikipedia.org/wiki/Cross-validation_(statistics).
[20] J. Han, and M. Kamber, Data Mining: Concepts and Techniques, Elsevier, San Francisco, 2006.
[21] 林昕潔, 「以SVM與詮釋資料設計書籍分類系統」,國立交通大學資訊科學與工程研究所,碩士論文,2006。
[22] G. Salton and M. J. McGill, Introduction to Modern Information Retrieval. McGraw-Hill, Inc. New York, NY, USA, 1986.
[23] G. Salton and C. Buckley, “Term-weighting approaches in automatic text retrieval,” Inf. Process. Manage., vol. 24, pp. 513-523, 1988.
[24] G. Salton, E. A. Fox and H. Wu, “Extended Boolean Information Retrieval,” 1982
[25] V. Vapnik, “The Nature of Statistical Learning Theory. 1995,” NY Springer
[26] R. O. Duda and P. E. Hart, Pattern Classification and Scene Analysis. Wiley New York, 1973.
[27] M.James, Classification algorithms. John Wiley & Sons, Inc. 1985.
[28] C. Apte, F. Damerau, and S.M. Weiss, “Text Mining with Decision Trees and Decision Rules”, in Conference on Automated Learning and Discovery, Carnegie-Mellon University, June 1998.
[29] C. Apte, F. Damerau, and S.M. Weiss, “Automated Learning of Decision Rules for Text Categorization”, in ACM Transactions on Information Systems, 1994.
[30] P. Domingos and M. Pazzani, “Beyond independence: Conditions for the optimality of the simple bayesian classifier, ”in 13th International Conference on Machine Learning(ICML'96), 1996, pp. 105-112.
[31] Frawley, W. J., S. G. Paitetsky and C. J. Matheus, “Knowledge Discovery in Databases: An Overview,” Communications of the ACM, Vol. 39, 1996, pp.1-34.
[32] Fayyad, U., G. P. Shapiro and P. Smyth, “From Data Mining to Knowledge Discovery in Database”, AI Magazine, Vol. 17, 1996, pp.37-54.
|