| 8065370 |
Proofs to filter spam |
Geoffrey J. Hulten, Gopalakrishnan Seshadrinathan, Manav Mishra, Robert Pengelly, Robert L. Rounthwaite +1 more |
2011-11-22 |
| 8046832 |
Spam detector with challenges |
Robert L. Rounthwaite |
2011-10-25 |
| 7997485 |
Content presentation based on user preferences |
Gary W. Flake, Eric J. Horvitz, Eric D. Brill, Bradly A. Brunell, Susan T. Dumais +4 more |
2011-08-16 |
| 7984169 |
Anonymous and secure network-based interaction |
Bradly A. Brunell, Susan T. Dumais, Eric J. Horvitz, Gary W. Flake, Anoop Gupta +3 more |
2011-07-19 |
| 7930353 |
Trees of classifiers for detecting email spam |
David M. Chickering, Geoffrey J. Hulten, Robert L. Rounthwaite, Christopher A. Meek, David E. Heckerman |
2011-04-19 |
| 7921173 |
Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles |
Robert G. Atkinson, James M. Lyon, Roy Williams, Khaja E. Ahmed, Harry S. Katz +3 more |
2011-04-05 |
| 7917514 |
Visual and multi-dimensional search |
Stephen L. Lawler, Eric J. Horvitz, Anoop Gupta, Christopher A. Meek, Eric D. Brill +4 more |
2011-03-29 |
| 7908328 |
Identification of email forwarders |
Geoffrey J. Hulten, Anthony Penta, David M. Chickering, Eliot C. Gillum, Gopalakrishnan Seshadrinathan +4 more |
2011-03-15 |
| 7904517 |
Challenge response systems |
Nina Kang, Robert L. Rounthwaite, Josh Benaloh, Elissa E. S. Murphy, Manav Mishra +3 more |
2011-03-08 |
| 7899866 |
Using message features and sender identity for email spam filtering |
Jay T. Buckingham, Geoffrey J. Hulten, Robert L. Rounthwaite |
2011-03-01 |
| 7873620 |
Desktop search from mobile device |
Raymond E. Ozzie, Eric J. Horvitz, William H. Gates, III, Susan T. Dumais, Gary W. Flake +4 more |
2011-01-18 |