- rule-based filtering
- Вычислительная техника: фильтрация, основанная на правилах
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
MagicSpam — Developer(s) LinuxMagic [1] Stable release 1.0.5 3[1] / February 17, 2011; 7 months ago (2011 02 17) … Wikipedia
Internet Information Services — Screenshot of IIS Manager console of Internet Information Services 7 Developer(s) Microsoft Stable release … Wikipedia
Neural network — For other uses, see Neural network (disambiguation). Simplified view of a feedforward artificial neural network The term neural network was traditionally used to refer to a network or circuit of biological neurons.[1] The modern usage of the term … Wikipedia
Applications of artificial intelligence — Artificial intelligence has been used in a wide range of fields including medical diagnosis, stock trading, robot control, law, scientific discovery and toys. However, many AI applications are not perceived as AI: A lot of cutting edge AI has… … Wikipedia
Semantic Sensor Web — Sensors are distributed across the globe leading to an avalanche of data about our environment. The rapid development and deployment of sensor technology involves many different types of sensors, both remote and in situ, with such diverse… … Wikipedia
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
Government of Burma — The government of Burma (also known as Myanmar) is an authoritarian dictatorial regime which is controlled by the military (Tatmadaw) in the form of the State Peace and Development Council (SPDC). A parliamentary government was elected in 1990,… … Wikipedia
Politics of Burma — Burma (Myanmar) This article is part of the series: Politics and government of Burma … Wikipedia
DNSBL — A DNSBL (DNS based Blackhole List, Block List, or Blacklist; see below) is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that… … Wikipedia