Jennifer Edmond
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Digital Humanities Pedagogy: Practices, Principles and Politics
To access digital resources including: blog posts videos online appendices and to purchase copies of this book in: hardback paperback ebook editions Go to: https://www.openbookpublishers.com/product/161 Open Book Publishers is a non-profit independent initiative. We rely on sales and donations to continue publishing high-quality academic works. Digital Humanities Pedagogy: Practices, Principles and Politics Edited by Brett D. Hirsch http://www.openbookpublishers.com © 2012 Brett D. Hirsch et al. (contributors retain copyright of their work). Some rights are reserved. The articles of this book are licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported Licence. This license allows for copying any part of the work for personal and non-commercial use, providing author attribution is clearly stated. Details of allowances and restrictions are available at: http://creativecommons.org/licenses/by-nc-nd/3.0/ As with all Open Book Publishers titles, digital material and resources associated with this volume are available from our website at: http://www.openbookpublishers.com/product/161 ISBN Hardback: 978-1-909254-26-8 ISBN Paperback: 978-1-909254-25-1 ISBN Digital (pdf): 978-1-909254-27-5 ISBN Digital ebook (epub): 978-1-909254-28-2 ISBN Digital ebook (mobi): 978-1-909254-29-9 Typesetting by www.bookgenie.in Cover image: © Daniel Rohr, ‘Brain and Microchip’, product designs first exhibited as prototypes in January 2009. Image used with kind permission of the designer. For more information about Daniel and his work, see http://www.danielrohr.com/ All paper used by Open Book Publishers is SFI (Sustainable Forestry Initiative), and PEFC (Programme for the Endorsement of Forest Certification Schemes) Certified. -
Example Grant Materials
Example Grant Materials Do not redistribute except under terms noted within. Citation: Brown, Travis, Jennifer Guiliano, and Trevor Muñoz. "Active OCR: Tightening the Loop in Human Computing for OCR Correction" National Endowment for the Humanities, Grant Submission, University of Maryland, College Park, MD, 2011. Licensing: This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Collaborating Sites: University of Maryland Maryland Institute for Technology in the Humanities Team members: Maryland Institute for Technology in the Humanities Travis Brown Paul Evans Jennifer Guiliano Trevor Muñoz Kirsten Keister Acknowledgments Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the collaborating institutions or the National Endowment for the Humanities. Active OCR: A Level II Start Up Grant Enhancing the humanities through innovation: Over the past several years, many large archives (such as the National Library of Australia and the National Library of Finland) have attempted to improve the quality of their digitized text collections by inviting website visitors to assist with the correction of transcription errors. In the case of print collections, an optical character recognition (OCR) system is typically used to create an initial transcription of the text from scanned page images. While the accuracy of OCR engines such as Tesseract and ABBYY FineReader is constantly improving, these systems often perform poorly when confronted with historical typefaces and orthographic conventions. Traditional forms of manual correction are expensive even at a small scale. Engaging web volunteers—a process often called crowdsourcing—is one way for archives to correct their texts at a lower cost and on a larger scale, while also developing a user community. -
Matthew James Driscoll and Elena Pierazzo
ONLINE SURVEY In collaboration with Unglue.it we have set up a survey (only ten questions!) to learn more about how open access ebooks are discovered and used. We really value your participation, please take part! CLICK HERE Digital Scholarly Editing Theories and Practices EDITED BY MATTHEW JAMES DRISCOLL AND ELENA PIERAZZO DIGITAL SCHOLARLY EDITING Digital Scholarly Editing Theories and Practices Edited by Matthew James Driscoll and Elena Pierazzo https://www.openbookpublishers.com © 2016 Matthew James Driscoll and Elena Pierazzo. Copyright of each individual chapter is maintained by the authors. This work is licensed under a Creative Commons Attribution 4.0 International license (CC BY 4.0). This license allows you to share, copy, distribute and transmit the text; to adapt the text and to make commercial use of the text providing attribution is made to the authors (but not in any way that suggests that they endorse you or your use of the work). Attribution should include the following information: Matthew James Driscoll and Elena Pierazzo (eds.), Digital Scholarly Editing: Theories and Practices. Cambridge, UK: Open Book Publishers, 2016. http://dx.doi.org/10.11647/ OBP.0095 In order to access detailed and updated information on the license, please visit https:// www.openbookpublishers.com/isbn/9781783742387#copyright Further details about CC BY licenses are available at https://creativecommons.org/ licenses/by/4.0/ All external links were active on 26/7/2016 unless otherwise stated and have been archived via the Internet Archive Wayback Machine at https://archive.org/web Updated digital material and resources associated with this volume are available at https://www.openbookpublishers.com/isbn/9781783742387#resources Every effort has been made to identify and contact copyright holders and any omission or error will be corrected if notification is made to the publisher. -
A Rule Based Approach for Spam Detection
A RULE BASED APPROACH FOR SPAM DETECTION Thesis submitted in partial fulfillment of the requirements for the award of degree of Master of Engineering In Computer Science & Engineering By: Ravinder Kamboj (Roll No. 800832030) Under the supervision of: Dr. V.P Singh Mrs. Sanmeet Bhatia Assistant Professor Assistant Professor Computer Science & Engineering Department of SMCA COMPUTER SCIENCE AND ENGINEERING DEPARTMENT THAPAR UNIVERSITY PATIALA – 147004 JULY- 2010 i ii Abstract Spam is defined as a junk Email or unsolicited Email. Spam has increased tremendously in the last few years. Today more than 85% of e-mails that are received by e-mail users are spam. The cost of spam can be measured in lost human time, lost server time and loss of valuable mail. Spammers use various techniques like spam via botnet, localization of spam and image spam. According to the mail delivery process anti-spam measures for Email Spam can be divided in to two parts, based on Emails envelop and Email data. Black listing, grey listing and white listing techniques can be applied on the Email envelop to detect spam. Techniques based on the data part of Email like heuristic techniques and Statistical techniques can be used to combat spam. Bayesian filters as part of statistical technique divides the income message in to words called tokens and checks their probability of occurrence in spam e-mails and ham e-mails. Two types of approaches can be followed for the detection of spam e-mails one is learning approach other is rule based approach. Learning approach required a large dataset of spam e-mails and ham e-mails is required for the training of spam filter; this approach has good time characteristics filter can be retrained quickly for new Spam. -
Review on Email Spam Filtering Techniques
International Journal of Scientific Engineering and Applied Science (IJSEAS) – Volume-2, Issue-3, March 2016 ISSN: 2395-3470 www.ijseas.com Review on Email Spam Filtering Techniques Shiva Sharma1, U. Dutta 2 Computer Science and Engineering Department, Maharana Pratap College of technology Putli Ghar Road, Near Collectorate, Gwalior-474006, Madhya Pradesh, India ABSTRACT- In this paper we present email online messages, blogs, forums, whatsapp and spam filtering and email authorship instant messaging services. Among all CMC, identification. Electronic mail is used by email has remained a key source of written millions of people to communicate around the communication, especially in the last few years. world daily and is a mission-critical Due to its salient features, it is the preferred application for many businesses. Over the last source of written communication for almost 10 years, unsolicited bulk email has become a every population (a part from illiterate) major problem for email users called senders connected to the Internet. It is a very quick, and receivers. And the recent years spam asynchronous written communication channel became as a big problem of internet and that is used for various purposes ranging from electronic communication known as users. formal to informal communication. Email There is developed lot of techniques to fight messages can be sent to a single receiver or them. We presents the overview of existing e- broadcasted to groups known as users. An email mail spam filtering methods is given. The message can reach to a number of receivers classification, valuation and juxtaposition of simultaneously and instantly at singe time. traditional and learning based methods are These days, the majority of individuals even provided. -
The History of Digital Spam
The History of Digital Spam Emilio Ferrara University of Southern California Information Sciences Institute Marina Del Rey, CA [email protected] ACM Reference Format: This broad definition will allow me to track, in an inclusive Emilio Ferrara. 2019. The History of Digital Spam. In Communications of manner, the evolution of digital spam across its most popular appli- the ACM, August 2019, Vol. 62 No. 8, Pages 82-91. ACM, New York, NY, USA, cations, starting from spam emails to modern-days spam. For each 9 pages. https://doi.org/10.1145/3299768 highlighted application domain, I will dive deep to understand the nuances of different digital spam strategies, including their intents Spam!: that’s what Lorrie Faith Cranor and Brian LaMacchia ex- and catalysts and, from a technical standpoint, how they are carried claimed in the title of a popular call-to-action article that appeared out and how they can be detected. twenty years ago on Communications of the ACM [10]. And yet, Wikipedia provides an extensive list of domains of application: despite the tremendous efforts of the research community over the last two decades to mitigate this problem, the sense of urgency ``While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant remains unchanged, as emerging technologies have brought new messaging spam, Usenet newsgroup spam, Web search engine spam, dangerous forms of digital spam under the spotlight. Furthermore, spam in blogs, wiki spam, online classified ads spam, mobile when spam is carried out with the intent to deceive or influence phone messaging spam, Internet forum spam, junk fax at scale, it can alter the very fabric of society and our behavior. -
Thea Sommerschield @ Theasommerschield.It | Academia | Github | Scholar | Orcid
theasommerschield.it | Curriculum Vitae Born 1993, Monza (Italy), Italian-British nationality D * [email protected] * [email protected] Thea Sommerschield @ theasommerschield.it | Academia | GitHub | Scholar | Orcid 1 Education 2021 – 2016 : DPhil in Ancient History, University of Oxford Awarded Dissertation: “Breaking Boundaries: a study of socio-cultural identities in Archaic and Classical western Sicily” Supervisors: Prof. Jonathan Prag; Prof. Josephine Quinn | Examiners: Prof. Nino Luraghi; Dr Matthew Fitzjohn 2016 – 2015 : MSt in Greek History, University of Oxford Distinction 2016 – 2012 : MA in Humanities, School of Advanced Study of Pavia IUSS First Class Honours 2015 – 2012 : BA in Classics, University of Pavia - Ghislieri College 110/110 summa cum laude 2 Academic Positions 2021 – 2023 : Marie Skłodowska-Curie Fellow, Università Ca’ Foscari di Venezia PythiaPlus - Grant agreement ID: 101026185. 2021 – 2022 : CHS Fellow in Hellenic Studies, Harvard University – current position – CHS - Center for Hellenic Studies. 2021 : A. G. Woodhead Fellow, Ohio State University Center for Epigraphical and Palaeographical Studies (declined). 2020 : Visiting Fellow on the Study of Ancient Writing Systems, University of Cambridge CREWS - Contexts of and Relations between Early Writing Systems ERC Project (declined). 2020 : CACHE Post-Doctoral Visiting Research Fellow, Macquarie University CACHE - Centre for Ancient Cultural Heritage and Environment (declined). 2020 : Ralegh Radford Rome Awardee, The British School at Rome The British School at Rome, January – March 2020. 2017 - 2019 : Craven University Fellow, University of Oxford Faculty of Classics – Funding research fieldwork abroad (Rome, Sicily). 3 Research Projects and Collaborations 2021 - 2020 : Project co-lead: Deep Learning for Greek epigraphy University of Oxford, DeepMind, Athens University of Economics and Business collaboration. -
Digital Scholarly Editing Theories and Practices
Digital Scholarly Editing Theories and Practices EDITED BY MATTHEW JAMES DRISCOLL AND ELENA PIERAZZO To access digital resources including: blog posts videos online appendices and to purchase copies of this book in: hardback paperback ebook editions Go to: https://www.openbookpublishers.com/product/483 Open Book Publishers is a non-profit independent initiative. We rely on sales and donations to continue publishing high-quality academic works. Digital Scholarly Editing Theories and Practices Edited by Matthew James Driscoll and Elena Pierazzo https://www.openbookpublishers.com © 2016 Matthew James Driscoll and Elena Pierazzo. Copyright of each individual chapter is maintained by the authors. This work is licensed under a Creative Commons Attribution 4.0 International license (CC BY 4.0). This license allows you to share, copy, distribute and transmit the text; to adapt the text and to make commercial use of the text providing attribution is made to the authors (but not in any way that suggests that they endorse you or your use of the work). Attribution should include the following information: Matthew James Driscoll and Elena Pierazzo (eds.), Digital Scholarly Editing: Theories and Practices. Cambridge, UK: Open Book Publishers, 2016. http://dx.doi.org/10.11647/ OBP.0095 In order to access detailed and updated information on the license, please visit https:// www.openbookpublishers.com/isbn/9781783742387#copyright Further details about CC BY licenses are available at https://creativecommons.org/ licenses/by/4.0/ All external links were active on 26/7/2016 unless otherwise stated and have been archived via the Internet Archive Wayback Machine at https://archive.org/web Updated digital material and resources associated with this volume are available at https://www.openbookpublishers.com/isbn/9781783742387#resources Every effort has been made to identify and contact copyright holders and any omission or error will be corrected if notification is made to the publisher. -
Cotsen Digital Archaeology Series
UCLA Cotsen Digital Archaeology series Title Archaeology 2.0: New Approaches to Communication and Collaboration Permalink https://escholarship.org/uc/item/1r6137tb Authors Kansa, Eric C. Kansa, Sarah Whitcher Watrall, Ethan Publication Date 2011 Supplemental Material https://escholarship.org/uc/item/1r6137tb#supplemental Peer reviewed eScholarship.org Powered by the California Digital Library University of California ARCHAEOLOGY 2.0 new approaches to communication & collaboration edited by Eric C. Kansa, Sarah Whitcher Kansa, & Ethan Watrall ARCHAEOLOGY 2.0: NEW APPROACHES TO COMMUNICATION AND COLLABORATION Cotsen Digital Archaeology Series Volume 1. Archaeology 2.0: New Approaches to Communication and Collabora- tion, Eric C. Kansa, Sarah Whitcher Kansa, and Ethan Watrall (Editors) ARCHAEOLOGY 2.0: NEW APPROACHES TO COMMUNICATION AND COLLABORATION EDITED BY ERIC C. KANSA, SARAH WHITCHER KANSA, AND ETHAN WATRALL COTSEN DIGITAL ARCHAEOLOGY 1 THE COTSEN INSTITUTE OF ARCHAEOLOGY PRESS is the publishing unit of the Cotsen Institute of Archaeology at UCLA. The Cot- sen Institute is a premier research organization dedicated to the creation, dissemination, and conservation of archaeological knowledge and heritage. It is home to both the Interdepartmental Archaeology Graduate Program and the UCLA/Getty Master’s Program in the Conservation of Archaeological and Ethnographic Materials. The Cotsen Institute provides a forum for innovative faculty research, graduate education, and public programs at UCLA in an effort to positively impact the academic, local and global communities. Established in 1973, the Cotsen Institute is at the forefront of archaeological research, education, conserva- tion and publication and is an active contributor to interdisciplinary research at UCLA. The Cotsen Institute Press specializes in producing high-quality academic volumes in several different series, including Mono- graphs, World Heritage and Monuments, Cotsen Advanced Seminars, and Ideas, Debates and Perspectives. -
Digital Approaches to Teaching the Ancient Mediterranean
DATAM Digital Approaches to Teaching the Ancient Mediterranean 01000100 01000001 01010100 01000001 01001101 00111010 00100000 01000100 01101001 01100111 01101001 01110100 01100001 01101100 00100000 01000001 01110000 01110000 01110010 01101111 01100001 01100011 01101000 01100101 01110011 00100000 01110100 01101111 00100000 01010100 01100101 01100001 01100011 01101000 01101001 01101110 01100111 00100000 01110100 01101000 01100101 00100000 01000001 01101110 01100011 01101001 01100101 01101110 01110100 00100000 01001101 01100101 01100100 01101001 01110100 01100101 01100101 EDITED BY SEBASTIAN HEATH DATAM: Digital Approaches to Teaching the Ancient Mediterranean Edited by Sebastian Heath The Digital Press at the University of North Dakota Grand Forks, ND 2020. The Digital Press at the University of North Dakota Unless otherwise indicated, all contributions to this volume appear under a Creative Commons Attribution 4.0 License: https://creativecommons.org/licenses/by/4.0/legalcode Library of Congress Control Number: 2020935190 ISBN-13: 978-1-7345068-1-5 (ebook) ISBN-13: 978-1-7345068-2-2 (Paperback) Download a full color version of this book from: http://thedigitalpress.org/datam/ DATAM: Digital Approaches to Teaching the Ancient Mediterranean Table of Contents Editor’s Preface Sebastian Heath................................................................................................1 Preface Helen Cullyer ......................................................................................................5 Foreword Shawn Graham ..................................................................................................9 -
Methnet Newsletter 3 8/11/06 11:12 Am Page 1
Methnet Newsletter 3 8/11/06 11:12 am Page 1 venue and subject between arts and works in progress, or The Methods Network staff technology and systems. The final, and perhaps the most challenging activity of the Lorna Hughes - Manager conference was a video conference with Professor Stelarc in email: [email protected] which he discussed his most recent project. The concept is that the bodily construct is an accident of design and can therefore, Hazel Gardiner - Senior Project Officer be reconstructed—in this case an ear implanted and grown on Activities and Publications Co-ordinator the forearm. Professor Stelarc talked us through the processes email: [email protected] of his attempt to ‘grow’ this working ear, a process which has been halted (temporarily) because of an infected arm. This Neil Grindley - Senior Project Officer presentation divided the audience by raising such issues as, ‘Is Activities and Publications Co-ordinator this art or self-mutilation?’ and the ethical value of such ‘works’. email: [email protected] These questions, and the idea of the ‘malleability’ of the human body, brought the conference full circle from Professor Lydia Horstman - Publications and Administrative Officer Beacham’s earlier discussion about ethics, art, and technology Autumn 2006 - Issue 3 email: [email protected] based on Appia’s theories—that we must ‘guard against technology getting the upper hand’. We must be vigilant in our Stuart Dunn - Research Associate in e-Science Methods pursuit of ‘ethical values and judgement’, and always strive for email: [email protected] an ‘aesthetic truth’. -
Subject Line Labeling As a Weapon Against Spam
Subject Line Labeling As a Weapon Against Spam A CAN-SPAM Act Report to Congress June 2005 Federal Trade Commission Deborah Platt Majoras, Chairman Orson Swindle, Commissioner Thomas B. Leary, Commissioner Pamela Jones Harbour, Commissioner Jon Leibowitz, Commissioner Table of Contents Executive Summary . i I. Introduction and Overview . 1 II. Subject Line Labeling Laws in the States and in Other Countries . 3 A. State Subject Line Labeling Laws . 3 1. Objectives of State Subject Line Labeling Requirements . 5 2. Enforcement of State Subject Line Labeling Requirements . 5 3. Effectiveness of State Subject Line Labeling Requirements . 6 B. Subject Line Labeling Laws in Other Countries . 7 III. The Commission Recommends Against Mandatory Subject Line Labeling . 9 A. Mandatory Subject Line Labeling Is Likely Not an Effective Tool For ISPs To Block and Filter Spam . 10 1. Mandatory subject line labeling will not enhance ISPs’ current techniques for combating spam . 10 2. Mandatory subject line labeling is an ineffective tool for ISPs because spammers will not comply with a labeling requirement . 13 B. Practical and Technological Concerns with Subject Line Labeling Requirements . 15 C. Mandatory Subject Line Labeling Would Not Strengthen Anti-Spam Law Enforcement . 17 IV. Conclusion . 18 Appendix 1: List of Interviews Appendix 2: Part III of the Commission’s National Do Not Email Registry Report Concurring Statement of Commissioner Pamela Jones Harbour Dissenting Statement of Commissioner Jon Leibowitz Executive Summary Executive Summary The Federal Trade Commission (the “FTC” or “Commission”) submits this Report pursuant to Section 11(2) of the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (the “CAN-SPAM Act”), 15 U.S.C.