{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:07Z","timestamp":1750308007347,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141360","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"354-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SF-HME system"],"prefix":"10.1145","author":[{"given":"Petros","family":"Belsis","sequence":"first","affiliation":[{"name":"University of the Aegean, Karlovasi, Samos, Greece"}]},{"given":"Kostas","family":"Fragos","sequence":"additional","affiliation":[{"name":"University of Athens, Zografou, Athens, Greece"}]},{"given":"Stefanos","family":"Gritzalis","sequence":"additional","affiliation":[{"name":"University of the Aegean, Karlovasi, Samos, Greece"}]},{"given":"Christos","family":"Skourlas","sequence":"additional","affiliation":[{"name":"Institute of Athens, Aigaleo, Athens, Greece"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"volume-title":"Proceedings of the 1996 AAAI Spring Symposium on Machine Learning in Information Access, California.]]","author":"Cohen W. W.","key":"e_1_3_2_1_1_1","unstructured":"Cohen , W. W. Learning Rules that Classify E-mail . In Proceedings of the 1996 AAAI Spring Symposium on Machine Learning in Information Access, California.]] Cohen, W. W. Learning Rules that Classify E-mail. In Proceedings of the 1996 AAAI Spring Symposium on Machine Learning in Information Access, California.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the workshop on Machine Learning in the New Information Age","author":"Androutsopoulos J.","year":"2000","unstructured":"I. Androutsopoulos , J. Koutsias , K. V. Chandrinos , G. Paliouras , and C. D. Spyropoulos . An Evaluation of Na\u00efve Bayesian Anti-Spam Filtering . In Proc. of the workshop on Machine Learning in the New Information Age , 2000 .]] I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos. An Evaluation of Na\u00efve Bayesian Anti-Spam Filtering. In Proc. of the workshop on Machine Learning in the New Information Age, 2000.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/141975.142034"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015352"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1991.3.1.79"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1994.6.2.181"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NNSP.1994.366050"},{"key":"e_1_3_2_1_9_1","volume-title":"Neural Computation3(1), 79--87","author":"Jacobs R. A.","year":"1991","unstructured":"Jacobs , R. A. , Jordan , M. I. , Nowlan , S. J. and Hinton , G. E . ' Adaptive mixtures of local experts ', Neural Computation3(1), 79--87 , 1991 .]] Jacobs, R. A., Jordan, M. I., Nowlan, S. J. and Hinton, G. E. 'Adaptive mixtures of local experts', Neural Computation3(1), 79--87, 1991.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.788645"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065795000251"},{"key":"e_1_3_2_1_12_1","first-page":"227","volume-title":"F. Fogelman Souli'e and J. H'erault","author":"Bridle","year":"1990","unstructured":"J. S. Bridle . Probabilistic interpretation of feed forward classification network outputs with relationships to statistical pattern recognition . In F. Fogelman Souli'e and J. H'erault , editors, Neurocomputing : Algorithms, Architectures, and Applications, pages 227 -- 236 . Springer Verlag , New York, 1990 .]] J. S. Bridle. Probabilistic interpretation of feed forward classification network outputs with relationships to statistical pattern recognition. In F. Fogelman Souli'e and J. H'erault, editors, Neurocomputing: Algorithms, Architectures, and Applications, pages 227--236. Springer Verlag, New York, 1990.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of ICASSP-97","author":"Jurgen Fritsch","year":"1997","unstructured":"Jurgen Fritsch , Michael Finke, and Alex Waibel . Context-dependent hybrid HME\/HMM speech recognition using polyphone clustering decision trees . In Proceedings of ICASSP-97 , 1997 .]] Jurgen Fritsch, Michael Finke, and Alex Waibel. Context-dependent hybrid HME\/HMM speech recognition using polyphone clustering decision trees. In Proceedings of ICASSP-97, 1997.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"e_1_3_2_1_15_1","first-page":"103","volume-title":"Proc. of the 17th International Conference on Machine Learning","author":"Jake D.","year":"2000","unstructured":"Jake D. Brutlag and Christopher Meek. Challenges of the Email Domain for Text Classification . In Proc. of the 17th International Conference on Machine Learning , pages 103 -- 110 , Stanford University, USA , 2000 .]] Jake D. Brutlag and Christopher Meek. Challenges of the Email Domain for Text Classification. In Proc. of the 17th International Conference on Machine Learning, pages 103--110, Stanford University, USA, 2000.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/280324.280336"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/967030.967031"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)01104-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508911"},{"key":"e_1_3_2_1_21_1","volume-title":"A performance comparison between genetic programming & na&iuml;\u00efve Bayes. Available: http:\/\/members.rogers.com\/hoomank\/papers\/katirai99filtering.pdf","author":"Katirai","year":"1999","unstructured":"H. Katirai . Filtering junk e-mail : A performance comparison between genetic programming & na&iuml;\u00efve Bayes. Available: http:\/\/members.rogers.com\/hoomank\/papers\/katirai99filtering.pdf , 1999 .]] H. Katirai. Filtering junk e-mail: A performance comparison between genetic programming & na&iuml;\u00efve Bayes. Available: http:\/\/members.rogers.com\/hoomank\/papers\/katirai99filtering.pdf, 1999.]]"},{"key":"e_1_3_2_1_22_1","unstructured":"Nicholas T. 2003. \"Using AdaBoost and Decision Stumps to Identify Spam E-mail\" Available: http:\/\/nlp.stanford.edu\/courses\/cs224n\/2003\/fp\/tyronen\/report.pdf]]  Nicholas T. 2003. \"Using AdaBoost and Decision Stumps to Identify Spam E-mail\" Available: http:\/\/nlp.stanford.edu\/courses\/cs224n\/2003\/fp\/tyronen\/report.pdf]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/1075527.1075574"},{"key":"e_1_3_2_1_24_1","first-page":"170","volume-title":"International Conference on Machine Learning (ICML)","author":"Roller D.","year":"1997","unstructured":"Roller , D. and Sahami , M ., Hierarchically classifying documents using very few words , in International Conference on Machine Learning (ICML) , pp. 170 -- 178 , 1997 .]] Roller, D. and Sahami, M., Hierarchically classifying documents using very few words, in International Conference on Machine Learning (ICML), pp. 170--178, 1997.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/645326.649731"},{"key":"e_1_3_2_1_26_1","volume-title":"Annual IBM Centers for Advanced Studies Conference (CASCON","author":"Kiritchenko S.","year":"2001","unstructured":"S. Kiritchenko and S. Matwin , \" Email Classification with Co-Training,\" in Proc . Annual IBM Centers for Advanced Studies Conference (CASCON 2001 ).]] S. Kiritchenko and S. Matwin, \"Email Classification with Co-Training,\" in Proc. Annual IBM Centers for Advanced Studies Conference (CASCON 2001).]]"},{"key":"e_1_3_2_1_27_1","volume-title":"International Symposium on Information and Communication Technologies, September 24--26","author":"O'Brien","year":"2003","unstructured":"O'Brien and Carl Vogel Spam Filters : Bayes vs. Chi-squared; Letters vs. Words . Presented at the International Symposium on Information and Communication Technologies, September 24--26 , 2003 ]] O'Brien and Carl Vogel Spam Filters: Bayes vs. Chi-squared; Letters vs. Words. Presented at the International Symposium on Information and Communication Technologies, September 24--26, 2003]]"},{"volume-title":"Proceedings of RANLP-01 International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG","author":"Carreras L.","key":"e_1_3_2_1_28_1","unstructured":"X. Carreras and L. Marquez . Boosting trees for anti-spam email filtering . In Proceedings of RANLP-01 International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG , 2001]] X. Carreras and L. Marquez. Boosting trees for anti-spam email filtering. In Proceedings of RANLP-01 International Conference on Recent Advances in Natural Language Processing, Tzigov Chark, BG, 2001]]"},{"key":"e_1_3_2_1_29_1","volume-title":"The ICCBR'03 Workshop on Long-Lived CBR Systems","author":"Cunningham P.","year":"2003","unstructured":"Cunningham P. , Nowlan N. , Delany S. J. , Haahr J. \"A Case-Based Approach to Spam Filtering that Can Track Concept Drift\" In The ICCBR'03 Workshop on Long-Lived CBR Systems , Trondheim, Norway , June 2003 ]] Cunningham P., Nowlan N., Delany S. J., Haahr J. \"A Case-Based Approach to Spam Filtering that Can Track Concept Drift\" In The ICCBR'03 Workshop on Long-Lived CBR Systems, Trondheim, Norway, June 2003]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952623"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007614523901"},{"key":"e_1_3_2_1_32_1","unstructured":"Drewes R. An artificial neural network spam classifier available at project homepage: www.interstice.com\/drewes\/cs676\/spam-nn]]  Drewes R. An artificial neural network spam classifier available at project homepage: www.interstice.com\/drewes\/cs676\/spam-nn]]"},{"volume-title":"proc. of the 2003 symposium on applications and Internet]]","author":"Woitaszek M.","key":"e_1_3_2_1_33_1","unstructured":"Woitaszek M. , Shaaban M. , \" Identifying Junk Electronic Mail in Microsoft Outlook with a support vector machine \", proc. of the 2003 symposium on applications and Internet]] Woitaszek M., Shaaban M., \"Identifying Junk Electronic Mail in Microsoft Outlook with a support vector machine\", proc. of the 2003 symposium on applications and Internet]]"},{"key":"e_1_3_2_1_34_1","volume-title":"Conference on email and Anti-Spam","author":"Kolsz A.","year":"2004","unstructured":"Kolsz A. , Chowdhury A. , Alspector J. \" The impact of feature selection on signature-driven spam detection \". Conference on email and Anti-Spam 2004 , CA, USA]] Kolsz A., Chowdhury A., Alspector J. \"The impact of feature selection on signature-driven spam detection\". Conference on email and Anti-Spam 2004, CA, USA]]"},{"key":"e_1_3_2_1_35_1","unstructured":"http:\/\/spamassassin.org\/publiccorpus]]  http:\/\/spamassassin.org\/publiccorpus]]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/980972.980990"}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Dijon France","acronym":"SAC06"},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:31Z","timestamp":1750259191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141360"}},"subtitle":["a hierarchical mixtures-of-experts classification system for spam filtering"],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":34,"alternative-id":["10.1145\/1141277.1141360","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141360","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}