{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:33Z","timestamp":1750307193265,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0905406."],"award-info":[{"award-number":["CNS-0905406."]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1145\/2124436.2124457","type":"proceedings-article","created":{"date-parts":[[2012,1,31]],"date-time":"2012-01-31T14:49:33Z","timestamp":1328021373000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Using cross-media relations to identify important communication requests"],"prefix":"10.1145","author":[{"given":"Kumiko","family":"Ono","sequence":"first","affiliation":[{"name":"Columbia University, New York"}]},{"given":"Henning","family":"Schulzrinne","sequence":"additional","affiliation":[{"name":"Columbia University, New York"}]}],"member":"320","published-online":{"date-parts":[[2011,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IETF","author":"Andersson L.","year":"2007","unstructured":"L. Andersson , E. Davies , and L. Zhang . Report from the IAB workshop on Unwanted Traffic March 9--10, 2006. RFC 4948 , IETF , August 2007 . L. Andersson, E. Davies, and L. Zhang. Report from the IAB workshop on Unwanted Traffic March 9--10, 2006. RFC 4948, IETF, August 2007."},{"key":"e_1_3_2_1_2_1","unstructured":"3Com Corporation. 3Com V7000 IP Communications Platforms: Call restrictions.  3Com Corporation. 3Com V7000 IP Communications Platforms: Call restrictions."},{"key":"e_1_3_2_1_3_1","unstructured":"Skype Limited. Staying safe on Skype: Setting your Skype privacy levels. http:\/\/www.skype.com\/intl\/en-us\/security\/safety\/staying-safe.  Skype Limited. Staying safe on Skype: Setting your Skype privacy levels. http:\/\/www.skype.com\/intl\/en-us\/security\/safety\/staying-safe."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_3_2_1_5_1","volume-title":"The New York Times","author":"Paul P.","year":"2011","unstructured":"P. Paul . Cultural Studies : Don't Call Me, I Won't Call You . The New York Times , March 2011 . http:\/\/www.nytimes.com\/2011\/03\/20\/fashion\/20Cultural.html. P. Paul. Cultural Studies: Don't Call Me, I Won't Call You. The New York Times, March 2011. http:\/\/www.nytimes.com\/2011\/03\/20\/fashion\/20Cultural.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595637.1595641"},{"key":"e_1_3_2_1_7_1","unstructured":"MySQL. http:\/\/www.mysql.com\/.  MySQL. http:\/\/www.mysql.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"P. James. RESTful interface to MySQL using PHP. http:\/\/sourceforge.net\/projects\/phprestsql\/.  P. James. RESTful interface to MySQL using PHP. http:\/\/sourceforge.net\/projects\/phprestsql\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Add-ons for Firefox. http:\/\/addons.mozilla.org\/.  Add-ons for Firefox. http:\/\/addons.mozilla.org\/."},{"key":"e_1_3_2_1_10_1","volume-title":"IETF","author":"Crispin M.","year":"2003","unstructured":"M. Crispin . INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501 , IETF , March 2003 . M. Crispin. INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1. RFC 3501, IETF, March 2003."},{"key":"e_1_3_2_1_11_1","unstructured":"SIP Communicator. http:\/\/sip-communicator.org\/.  SIP Communicator. http:\/\/sip-communicator.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Kamailio (OpenSER) SIP Server. http:\/\/www.kamailio.org\/w\/.  Kamailio (OpenSER) SIP Server. http:\/\/www.kamailio.org\/w\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Apache HTTP Server Version 2.0. http:\/\/httpd.apache.org\/docs\/2.0\/.  Apache HTTP Server Version 2.0. http:\/\/httpd.apache.org\/docs\/2.0\/."},{"key":"e_1_3_2_1_14_1","volume-title":"IETF","author":"Shacham R.","year":"2007","unstructured":"R. Shacham and H. Schulzrinne . HTTP Header for Future Correspondence Addresses. Internet-draft , IETF , May 2007 . Work in Progress. R. Shacham and H. Schulzrinne. HTTP Header for Future Correspondence Addresses. Internet-draft, IETF, May 2007. Work in Progress."},{"key":"e_1_3_2_1_15_1","volume-title":"IETF","author":"Rescorla E.","year":"2000","unstructured":"E. Rescorla . HTTP Over TLS. RFC 2818 , IETF , May 2000 . E. Rescorla. HTTP Over TLS. RFC 2818, IETF, May 2000."},{"key":"e_1_3_2_1_16_1","volume-title":"HTML 4.01 Specification","author":"Raggett D.","year":"1999","unstructured":"D. Raggett , A. L. Hors , and I. Jacobs . HTML 4.01 Specification . December 1999 . D. Raggett, A. L. Hors, and I. Jacobs. HTML 4.01 Specification. December 1999."},{"key":"e_1_3_2_1_17_1","volume-title":"Federal Information Processing Standard (FIPS) 180-2","author":"Standard Secure Hash","year":"2002","unstructured":"Secure Hash Standard . Federal Information Processing Standard (FIPS) 180-2 , National Institute of Science and Technology , August 2002 . Secure Hash Standard. Federal Information Processing Standard (FIPS) 180-2, National Institute of Science and Technology, August 2002."},{"key":"e_1_3_2_1_18_1","volume-title":"IETF","author":"Ono K.","year":"2009","unstructured":"K. Ono and H. Schulzrinne . Referencing Earlier Communications in SIP Requests. Internet-Draft , IETF , October 2009 . Work in Progress. K. Ono and H. Schulzrinne. Referencing Earlier Communications in SIP Requests. Internet-Draft, IETF, October 2009. Work in Progress."},{"key":"e_1_3_2_1_19_1","volume-title":"IETF","author":"Dawson F.","year":"1998","unstructured":"F. Dawson and T. Howes . vCard MIME Directory Profile. RFC 2426 , IETF , September 1998 . F. Dawson and T. Howes. vCard MIME Directory Profile. RFC 2426, IETF, September 1998."},{"key":"e_1_3_2_1_20_1","unstructured":"Mozilla messaging: Thunderbird. http:\/\/www.mozillamessaging.com\/.  Mozilla messaging: Thunderbird. http:\/\/www.mozillamessaging.com\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. Gmail. http:\/\/mail.google.com\/.  Google. Gmail. http:\/\/mail.google.com\/."},{"key":"e_1_3_2_1_22_1","volume-title":"IETF","author":"Fielding R.","year":"1999","unstructured":"R. Fielding , J. Gettys , J. Mogul , H. Frystyk , L. Masinter , P. Leach , and T. Berners-Lee . Hypertext Transfer Protocol -- HTTP\/1.1. RFC 2616 , IETF , June 1999 . R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol -- HTTP\/1.1. RFC 2616, IETF, June 1999."},{"key":"e_1_3_2_1_23_1","volume-title":"IETF","author":"Murchison K.","year":"2008","unstructured":"K. Murchison . Sieve Email Filtering : Subaddress Extension. RFC 5233 , IETF , January 2008 . K. Murchison. Sieve Email Filtering: Subaddress Extension. RFC 5233, IETF, January 2008."},{"key":"e_1_3_2_1_24_1","volume-title":"IETF","author":"Schulzrinne H.","year":"2004","unstructured":"H. Schulzrinne . The tel URI for Telephone Numbers. RFC 3966 , IETF , December 2004 . H. Schulzrinne. The tel URI for Telephone Numbers. RFC 3966, IETF, December 2004."},{"key":"e_1_3_2_1_25_1","volume-title":"IETF","author":"Resnick P.","year":"2008","unstructured":"P. Resnick . Internet Message Format. RFC 5322 , IETF , October 2008 . P. Resnick. Internet Message Format. RFC 5322, IETF, October 2008."},{"key":"e_1_3_2_1_26_1","volume-title":"IETF","author":"Dierks T.","year":"2008","unstructured":"T. Dierks and E. Rescorla . The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 , IETF , August 2008 . T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, IETF, August 2008."},{"key":"e_1_3_2_1_27_1","volume-title":"IETF","author":"Peterson J.","year":"2006","unstructured":"J. Peterson and C. Jennings . Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 4474 , IETF , August 2006 . J. Peterson and C. Jennings. Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP). RFC 4474, IETF, August 2006."},{"key":"e_1_3_2_1_28_1","volume-title":"IETF","author":"Lennox J.","year":"2004","unstructured":"J. Lennox , X. Wu , and H. Schulzrinne . Call Processing Language (CPL): A Language for User Control of Internet Telephony Services. RFC 3880 , IETF , October 2004 . J. Lennox, X. Wu, and H. Schulzrinne. Call Processing Language (CPL): A Language for User Control of Internet Telephony Services. RFC 3880, IETF, October 2004."},{"key":"e_1_3_2_1_29_1","volume-title":"Extensible Markup Language (XML) 1.0","author":"Bray T.","year":"2004","unstructured":"T. Bray , J. Paoli , C. M. Sperberg-McQueen , E. Maler , and F. Yergeau . Extensible Markup Language (XML) 1.0 ( Third Edition). W3C Recommendation REC-xml- 2004 0204, World Wide Web Consortium (W 3C), February 2004. T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Maler, and F. Yergeau. Extensible Markup Language (XML) 1.0 (Third Edition). W3C Recommendation REC-xml-20040204, World Wide Web Consortium (W3C), February 2004."},{"key":"e_1_3_2_1_30_1","volume-title":"IETF","author":"Rosenberg J.","year":"2008","unstructured":"J. Rosenberg and C. Jennings . The Session Initiation Protocol (SIP) and Spam. RFC 5039 , IETF , January 2008 . J. Rosenberg and C. Jennings. The Session Initiation Protocol (SIP) and Spam. RFC 5039, IETF, January 2008."},{"key":"e_1_3_2_1_31_1","volume-title":"IETF","author":"Rosenberg J.","year":"2008","unstructured":"J. Rosenberg , G. Camarillo , and D. Willis . A Framework for Consent-Based Communications in the Session Initiation Protocol (SIP). RFC 5360 , IETF , October 2008 . J. Rosenberg, G. Camarillo, and D. Willis. A Framework for Consent-Based Communications in the Session Initiation Protocol (SIP). RFC 5360, IETF, October 2008."},{"key":"e_1_3_2_1_32_1","volume-title":"IETF","author":"Allman E.","year":"2007","unstructured":"E. Allman , J. Callas , M. Delany , M. Libbey , J. Fenton , and M. Thomas . DomainKeys Identified Mail (DKIM) Signatures. RFC 4871 , IETF , May 2007 . E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, and M. Thomas. DomainKeys Identified Mail (DKIM) Signatures. RFC 4871, IETF, May 2007."},{"key":"e_1_3_2_1_33_1","unstructured":"M. Ceglowski and J. Schachter. LOAF. http:\/\/loaf.cantbedone.org 2004.  M. Ceglowski and J. Schachter. LOAF. http:\/\/loaf.cantbedone.org 2004."},{"key":"e_1_3_2_1_34_1","volume-title":"IETF","author":"Ono K.","year":"2006","unstructured":"K. Ono and H. Schulzrinne . Trust Path Discovery. Internet-draft , IETF , June 2006 . Work in Progress. K. Ono and H. Schulzrinne. Trust Path Discovery. Internet-draft, IETF, June 2006. Work in Progress."},{"key":"e_1_3_2_1_35_1","volume-title":"Social Networks and Global Reputation. In CEAS 2007 - Fourth Conference on Email and Anti-Spam","author":"Balasubramaniyan V.","year":"2007","unstructured":"V. Balasubramaniyan , M. Ahamad , and H. Park . CallRank: Combating SPIT Using Call Duration , Social Networks and Global Reputation. In CEAS 2007 - Fourth Conference on Email and Anti-Spam , August 2007 . V. Balasubramaniyan, M. Ahamad, and H. Park. CallRank: Combating SPIT Using Call Duration, Social Networks and Global Reputation. In CEAS 2007 - Fourth Conference on Email and Anti-Spam, August 2007."},{"key":"e_1_3_2_1_36_1","unstructured":"Google. Google voice. http:\/\/www.google.com\/voice.  Google. Google voice. http:\/\/www.google.com\/voice."}],"event":{"name":"IPTcomm '11: Principles, Systems & Applications of IP Telecommunications","sponsor":["Illinois Institute of Technology","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Chicago Illinois","acronym":"IPTcomm '11"},"container-title":["Proceedings of the 5th International Conference on Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2124436.2124457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2124436.2124457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:00Z","timestamp":1750241160000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2124436.2124457"}},"subtitle":["testing the concept and implementation"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":36,"alternative-id":["10.1145\/2124436.2124457","10.1145\/2124436"],"URL":"https:\/\/doi.org\/10.1145\/2124436.2124457","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]},"assertion":[{"value":"2011-08-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}