نتایج جستجو برای: e mail messages

تعداد نتایج: 1062643  

This paper investigated the ways Iranian B.A and M.A students of English language and their professors represent themselves linguistically in their e-mails in general, and the ways they construct and negotiate power with regard to social and cultural norms in particular. It examined 84 e-mail messages students and professors exchanged in 2012-2013 academic year through Halliday`s Systemic Funct...

Journal: :Datenschutz und Datensicherheit - DuD 2016

Journal: :IJBDCN 2005
Kevin Curran John Stephen Honan

This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for future growth are jeopardized by the rising tide of unwanted e-mail, both SPAM and viruses. This threatens to wipe out the advantages and benefits of e-mail. An important flaw in current e-mail standards (most notably SMT...

Journal: :Respiratory care 2009
Timothy B Op't Holt

In this issue of RESPIRATORY CARE, Polosa et al report on their investigation of e-mail counseling as a part of a smoking-cessation program.1 Their pilot study examines the feasibility of integrating e-mail consultation messages in a program to patients willing to quit smoking and who have Internet access. The smoking-cessation program specialists and patients communicated with each other to di...

2009
Steffen Bickel

E-mail has become one of the most important communication media for business and private purposes. Large amounts of past e-mail records reside on corporate servers and desktop clients. There is a huge potential for mining this data. E-mail filing and spam filtering are wellestablished e-mail mining tasks. E-mail filing addresses the assignment of incoming e-mails to predefined categories to sup...

1997
Aviel D. Rubin Dan Boneh Kevin Fu

We present protocols for enhancing e-mail systems to allow for secure revocation of messages. This paper identiies the security requirements for e-mail revocation and then shows how our protocols adhere to these requirements. Three diierent levels of security and threat models are described. We discuss our implementation of the level 1 protocol , which assumes no security infrastructure. The pr...

Journal: :JAMIA 2003
Eric M. Liederman Catrina S. Morefield

Design: Eight providers and their staff and patients were surveyed on use of this web messaging system, and physician productivity was measured with Relative Value Unit (RVU) and office visit data. Results: 36.9% (238/645) of registered users responded to the survey. The web messaging system was preferred over phone calls by both providers and patients for the communication of non-urgent proble...

2005
Doug Herbers

Acknowledgements I would like to thank my advisor, Dr. Susan Gauch, for guidance throughout my undergraduate and graduate years at the University of Kansas. Also, thanks to my thesis committee: Dr. Victor Frost, to whom I also owe my many opportunities at ITTC, and Dr. Perry Alexander, who served on my committee on short notice. I would like to thank my family: Ralph, Charlene, Jeff, and Denise...

2000
Olivier de Vel

In this paper we report an investigation into the learning of authorship identification or categorisation for the case of e-mail documents. We use various e-mail document features such as structural characteristics and linguistic evidence together with the Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents give promising results with some e-mail docume...

Journal: :Journal of Agricultural Meteorology 1993

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید