R
Robert L. Rounthwaite
Researcher at Microsoft
Publications - 112
Citations - 5708
Robert L. Rounthwaite is an academic researcher from Microsoft. The author has contributed to research in topics: Web search query & Spamming. The author has an hindex of 42, co-authored 112 publications receiving 5670 citations.
Papers
More filters
Journal ArticleDOI
Dependency networks for inference, collaborative filtering, and data visualization
David Heckerman,David Maxwell Chickering,Christopher Meek,Robert L. Rounthwaite,Carl M. Kadie +4 more
TL;DR: This work describes a graphical model for probabilistic relationships--an alternative to the Bayesian network--called a dependency network and identifies several basic properties of this representation and describes a computationally efficient procedure for learning the graph and probability components from data.
Patent
Feedback loop for spam prevention
Robert L. Rounthwaite,David Heckerman,John D. Mehr,Nathan D. Howell,Rupersburg Micah C,Dean A. Slawson,Joshua T. Goodman +6 more
TL;DR: In this paper, a machine learning approach is applied to spam filters, and examples of both legitimate and junk/spam mail are obtained to generate sets of training data to classify items in connection with spam prevention in server or client-based architectures.
Patent
Origination/destination features and lists for spam prevention
Joshua T. Goodman,Robert L. Rounthwaite,Daniel Gwozdz,Mehr John D,Nathan D. Howell,Rupersburg Micah C,Starbuck Bryan T +6 more
TL;DR: In this paper, a system and method that facilitate extracting data from messages for spam filtering is presented, where the extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters.
Patent
Phishing Detection, Prevention, and Notification
Joshua T. Goodman,Paul S Rehfuss,Robert L. Rounthwaite,Manav Mishra,Geoffrey J. Hulten,Kenneth G Richards,Aaron H. Averbuch,Anthony P. Penta,Roderict C. Deyo +8 more
Abstract: Phishing detection, prevention, and notification is described. In an embodiment, a messaging application facilitates communication via a messaging user interface, and receives a communication, such as an email message, from a domain. A phishing detection module detects a phishing attack in the communication by determining that the domain is similar to a known phishing domain, or by detecting suspicious network properties of the domain. In another embodiment, a Web browsing application receives content, such as data for a Web page, from a network-based resource, such as a Web site or domain. The Web browsing application initiates a display of the content, and a phishing detection module detects a phishing attack in the content by determining that a domain of the network-based resource is similar to a known phishing domain, or that an address of the network-based resource from which the content is received has suspicious network properties.
Patent
Methods and apparatus for automatically synchronizing electronic audio files with electronic text files
David Heckerman,Fileno A. Alleva,Robert L. Rounthwaite,Daniel Rosen,Mei-Yuh Hwang,Yoram Yaacovi,John L. Manferdelli +6 more
TL;DR: In this paper, a statistical language model is generated from the text data and a speech recognition operation is performed on the audio data using the generated language model and a speaker independent acoustic model.