نتایج جستجو برای: reactive mail

تعداد نتایج: 239414  

Journal: :Law, Probability and Risk 2003

Journal: :Digital Investigation 2018

2015
Hari Priya

Currently, visually challenged people are not able to use computers on their own mainly because keyboards are not user-friendly to them. With advancement in technology, these people find themselves technologically more challenged. This is true especially in the case of social networking, which these people cannot do without external help. Voice-Mail architecture helps blind people to access e-m...

Journal: :The Gerontologist 2001
D B Raziano R Jayadevappa D Valenzula M Weiner R Lavizzo-Mourey

PURPOSE This study compared the response time, response rate, and cost of two types of survey administration techniques: e-mail/web-based versus conventional postal mail. The main aim of the survey was to collect descriptive information on the existence of Acute Care for Elders units and their characteristics by surveying geriatric division chiefs. DESIGN AND METHODS Two randomized cohorts of...

2005
Daniel A. Keim Florian Mansmann Christian Panse Jörn Schneidewind Mike Sips

In today’s world, e-mail has become one of the most important means of communication in business and private lives due to its efficiency. However, the problems start as soon as mail volumes go beyond the scope of human information processing capabilities. Firstly, time does not allow for leaving certain messages unanswered for a long time, and in certain cases, for reading all messages. Secondl...

Journal: :گام های توسعه در آموزش پزشکی 0
حمید صالحی نیا hamid salehiniya

0

1999
Wael R. Elwasif James S. Plank Micah Beck Rich Wolski

IBP-Mail is an improvement to the current state of the art in mailing large files over the Internet. It arises from the addition of writable storage to the pool of available Internet resources. With IBP-Mail, a sender registers a large file with an IBP-Mail agent, and stores it into a network storage depot. The sender then mails a pointer to the file to the recipient using the standard SMTP mai...

2004
Boldizsár Bencsáth István Vajda

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید