{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:42Z","timestamp":1750308822503,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,12,27]],"date-time":"2010-12-27T00:00:00Z","timestamp":1293408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,12,27]]},"DOI":"10.1145\/1963564.1963611","type":"proceedings-article","created":{"date-parts":[[2011,3,29]],"date-time":"2011-03-29T12:02:18Z","timestamp":1301400138000},"page":"266-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Demand based approach to control data load on email servers"],"prefix":"10.1145","author":[{"given":"Gaurav Kumar","family":"Tak","sequence":"first","affiliation":[{"name":"ABV-Indian Institute of Information Technology and Management, Gwalior"}]},{"given":"Anubhav","family":"Kakkar","sequence":"additional","affiliation":[{"name":"ABV-Indian Institute of Information Technology and Management, Gwalior"}]}],"member":"320","published-online":{"date-parts":[[2010,12,27]]},"reference":[{"volume-title":"Data Communications and Networking","author":"Forouzan B. A.","key":"e_1_3_2_1_1_1","unstructured":"Forouzan , B. A. , 2006 , Data Communications and Networking . McGraw-Hill . Forouzan, B. A., 2006, Data Communications and Networking. McGraw-Hill."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Postel J. B. August 1982 The Internet Society Simple Mail Transfer Protocol.  Postel J. B. August 1982 The Internet Society Simple Mail Transfer Protocol.","DOI":"10.17487\/rfc0821"},{"key":"e_1_3_2_1_3_1","unstructured":"PHP AJAX MySql TCP\/IP Protocol and JavaScript Tutorials http:\/\/www.w3schools.com\/  PHP AJAX MySql TCP\/IP Protocol and JavaScript Tutorials http:\/\/www.w3schools.com\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/859670.859703"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/I-SPAN.2009.138"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2009.52"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBNMT.2009.5348490"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2010.61"},{"volume-title":"Communications in Computer and Information Science","author":"Tak G. K.","key":"e_1_3_2_1_9_1","unstructured":"Tak , G. K. , Shashikala , T. , 2010,\" Knowledge Base Compound Approach towards Spam Detection,\" Recent Trends in Network Security and Applications , Communications in Computer and Information Science ,, Springer Berlin Heidelberg , Volume 89, Part 2, 490--499, DOI: 10.1007\/978-3-642-14478-3_49 URL: http:\/\/dx.doi.org\/10.1007\/978-3-642-14478-3_49. 10.1007\/978-3-642-14478-3_49 Tak, G. K., Shashikala, T., 2010,\" Knowledge Base Compound Approach towards Spam Detection,\" Recent Trends in Network Security and Applications, Communications in Computer and Information Science,, Springer Berlin Heidelberg, Volume 89, Part 2, 490--499, DOI: 10.1007\/978-3-642-14478-3_49 URL: http:\/\/dx.doi.org\/10.1007\/978-3-642-14478-3_49."},{"key":"e_1_3_2_1_10_1","unstructured":"http:\/\/www.zimbra.com\/products\/zimbra-collaboration-suite.html.  http:\/\/www.zimbra.com\/products\/zimbra-collaboration-suite.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Sun Microsystems Enterprise JavaBeansTM Specification http:\/\/java.sun.com\/products\/ejb\/.  Sun Microsystems Enterprise JavaBeansTM Specification http:\/\/java.sun.com\/products\/ejb\/."}],"event":{"name":"IITM '10: First International Conference on Intelligent Interactive Technologies and Multimedia","acronym":"IITM '10","location":"Allahabad India"},"container-title":["Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963564.1963611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1963564.1963611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:46Z","timestamp":1750278406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1963564.1963611"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,27]]},"references-count":11,"alternative-id":["10.1145\/1963564.1963611","10.1145\/1963564"],"URL":"https:\/\/doi.org\/10.1145\/1963564.1963611","relation":{},"subject":[],"published":{"date-parts":[[2010,12,27]]},"assertion":[{"value":"2010-12-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}