نتایج جستجو برای: email writing

تعداد نتایج: 151800  

2005
Tom M. Mitchell Sophie H. Wang Yifen Huang Adam Cheyer

One key to providing intelligent assistance to workstation users is to construct machine-understandable descriptions of the user’s ongoing projects, or activities, (e.g., their committee memberships, writing projects, conference organization activities), and indices describing which emails, meetings, and colleagues relate to which activity. This paper presents a program, ActivityExtractor, whic...

Journal: :International Journal of Computer Applications 2010

2014
Scott A. Crossley Rod Roscoe Danielle S. McNamara

This study identifies multiple profiles of successful essays via a cluster analysis approach using linguistic features reported by a variety of natural language processing tools. The findings from the study indicate that there are four profiles of successful writers for the samples analyzed. These four profiles are linguistically distinct from one another and demonstrate that expert human rater...

Journal: :CoRR 2018
Yongpeng Wu Ashish Khisti Chengshan Xiao Giuseppe Caire Kai-Kit Wong Xiqi Gao

Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physic...

2005
Ioannis Katakis Grigorios Tsoumakas Ioannis Vlahavas

Email has met tremendous popularity over the past few years. People are sending and receiving many messages per day, communicating with partners and friends, or exchanging files and information. Unfortunately, the phenomenon of email overload has grown over the past years becoming a personal headache for users and a financial issue for companies. In this chapter, we will discuss how disciplines...

Journal: :ACM Transactions on Computational Logic 2013

Journal: :Journal of Innovation in Health Informatics 2004

Journal: :IEEE Communications Magazine 2022

The first work on email security began in 1984, which resulted the Privacy Enhanced Mail (PEM) specifications. Two years later, was done as part of Secure Data Network System (SDNS) sponsored by U.S. Government, resulting Message Security Protocol (MSP). PEM and MSP both influenced development most popular Internet protocol, is MIME (S/MIME). This article provides insight into early history sec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات و علوم انسانی 1391

the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید