skip to main content
article

Computing relationships: transactional algorithms yield to social networks

Published:01 June 2007Publication History
Skip Abstract Section

Abstract

I had a bad email day on October 10 last year. First, a colleague in the States copied me on a response to an email he had just received for a meeting scheduled in New Zealand over a month earlier. The email seemed to have been filtered out by his university's email filter somehow, even though he and my local colleague who originated the email had been in regular contact for some time. The accompanying message read "The sender is not authorized to send to the destination. This can be the result of per host or per recipient filtering". Then I received notification that an email I had sent to Finland some five days earlier had not been received, with the message "Recipient address rejected: Greylisted for 60 seconds (see http:www.joensuu.fi/atteskus/ohjeet/postgrey.html)"...Mes sage could not be delivered for 5 days Message will be deleted from queue". Next came a warning on a message I had sent to Sweden "recipient address rejected: Greylisting in action, please try later... Warning message still undelivered after 4 hours. Will keep trying until message is 5 days old". Well I know that New Zealand is small and far from many other countries, but the thought that we had been globally blacklisted began to enter my mind. Paranoia was setting in...

References

  1. Chirita, P., Diederich, J. and Nejdl, W., Mailrank: Using Ranking for Spam Detection. in Proceedings of the 14th ACM international conference on Information and knowledge management (CIKM'05), (Bremen, Germany, 2005), ACM, 373--380. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Boykin, P. and Roychowdhury, V. Leveraging Social Networks to Fight Spam. IEEE Computer, 38(4), (2005), 61--68. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Denning, P. and McGettrick, A. Recentering Computer Science. Communications of the ACM, 48(11). 15--19. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Computing relationships: transactional algorithms yield to social networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGCSE Bulletin
        ACM SIGCSE Bulletin  Volume 39, Issue 2
        June 2007
        158 pages
        ISSN:0097-8418
        DOI:10.1145/1272848
        Issue’s Table of Contents

        Copyright © 2007 Author

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 2007

        Check for updates

        Qualifiers

        • article
      • Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader