نتایج جستجو برای: messaging application
تعداد نتایج: 772426 فیلتر نتایج به سال:
The success of pervasive computing depends on the ability to compose a multitude of networked applications dynamically in order to achieve user goals. However, applications from different providers are not able to interoperate due to incompatible interaction protocols or disparate data models. Instant messaging is a representative example of the current situation, where various competing applic...
The Unified Theory of Acceptance and Use of Technology (UTAUT) model is used to study acceptance and usage of instant messaging among college students. This study validates the UTAUT model in a new environment which is not work related. The results show that functional capability (the presence of various functions in the application) has a direct effect on behavior intention as well as on perfo...
New network technology continues to improve both the latency and bandwidth of communication in computer clusters. The fastest high-speed networks approach or exceed the I/O bus bandwidths of “gigabitready” hosts. These advances introduce new considerations for the design of network interfaces and messaging systems for low-latency communication. This paper investigates cut-through delivery, a te...
Digital television offers significantly increased capacity, which can be used to provide digital Teletext service. The existing digital Teletext belongs to enhanced broadcast application profiles. It has only local interactivity and no return channel is needed. The digital Teletext with two-way interactivity is highly expected both from the growing market and the research area. This paper prese...
This chapter investigates whether and how micro-messaging technologies such as Twitter messages can be harnessed to obtain valuable information. The interesting characteristics of micro-blogging services, such as being user oriented, provide opportunities for different applications to use the content of these sites to their advantage. However, the same characteristics become the weakness of the...
We introduce the Anonymous Post-office Protocol (AnonPoP), a practical strongly-anonymous messaging system. AnonPoP offers anonymity against globally eavesdropping adversaries that control a majority of AnonPoP’s servers. AnonPoP design combines effectively known techniques such as (synchronous) mixcascade and constant sending rate, with several new techniques including request-pool, bad-server...
High-volume hydraulic fracturing, a drilling simulation technique commonly referred to as "fracking," is a contested technology. In this article, we explore discourse over hydraulic fracturing and the shale industry on the social media platform Twitter during a period of heightened public contention regarding the application of the technology. We study the relative prominence of negative messag...
Digital communities are often portrayed as operating entirely within the confines of a single technological domain, e.g. a group of people in a web-based chatroom. In this study an integrated approach to digital communities is explored. It is proposed that members of communities employ a range of digital technologies to support their activities and sense of community. This paper describes a stu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید