نتایج جستجو برای: personal information managementpim

تعداد نتایج: 1268450  

2012
Tuan Anh Nguyen Marco Aiello

To have buildings that are able to adapt to the user needs and at the same time to operate efficiently, it is essential to know the activity the people are performing. Presence sensors, which are widely deployed in modern buildings, attempt to regulate lighting to the presence of people in indoor spaces. Though, much more in terms of comfort and energy efficiency can be achieved if more detaile...

2008
Oliviero Stock

2) as kind of a variation on the above theme I propose in partcualr MM IE for the benefit of a group of users. There are different cases: for example, a) same info to be presented to a group; b) info segmented so that different people can work on the material collaboratively at the same time; c) info to be intelligently fragmented for individuals in a group, for specific strategic goals, e.g. l...

2006
Antonio Badia

The concept of Personal Information Management (PIM) is currently a hot topic of research. Some of the ideas being discussed under this topic have a long history, and they are relevant to the work of intelligence analysts. Hence, the intelligence community should pay attention to the developments in this area. In this position paper we examine the concept of PIM, point out some issues that are ...

2013
Azrina Kamaruddin Novia Admodisastro Alan Dix

Personal Information Management (PIM) is an important discipline that evolves with the technology advancements in their operating systems. The understanding of its four main activities in PIM: organizing, retrieving, deleting and archiving are crucial because the information growth in our desktop increased overtime. The paper presents the study conducted to enhance understanding of one of the c...

2017
Bin Li Xinxin Li Hongju Liu

Understanding the degree of cannibalization and competition in online and offline markets is important to firms’ product line designs. However, few empirical studies have measured both effects simultaneously or have examined the factors that determine the extent of cannibalization and competition. In this study, we develop an empirical model to identify cannibalization and competition effects s...

Hashemzadeh, Mohammad Javad , Kiani, Mohammad Reza , Salehnejad, Zahra,

Background and Aim: Personal Information Management (PIM) process consists of four activities; acquisition, organization, maintenance and retrieval. Obviously this process is due to human limitations and expanding scope of personal space of information which has become an exhausting and difficult process. Use of technology and tools related to PIM could facilitate this procedure. This survey st...

Journal: :international journal of information science and management 0
m. mohammadi ph.d. student , department of library and information science islamic azad university qom branch a. r. isfandyari moghaddam ph.d. student , department of library and information science islamic azad university hamedan branch

information has numerous potentials and features by which it can be used in various aspects of society. this paper aims to examine some roles and unique characteristics of information and supports the theory that information can be treated as wealth or wealth creator due to its vital impacts. finally, it is shown that identifying information significance, the roles it plays and making better us...

ژورنال: طلوع بهداشت یزد 2015
رشیدی جهان, حجت, سنایی نسب, هرمز, صفاری, محسن,

Introduction: Personal hygiene is one of the most important preventive tools in the field of public health, and military forces may be exposed to threats due to non-adherence to principles of personal hygiene. The aim of this study was assessing the situation of personal hygiene among military forces and identifying its determinants and related potential barriers. Methods: This is a cross-sec...

2007
m.c. schraefel Paul André Max Van Kleek

INTRODUCTION Interacting with digital PIM tools like calendars, to-do lists, address books, bookmarks and so on, is a highly manual, often repetitive and frequently tedious process. Despite increases in memory and processor power over the past two decades of personal computing, not much has changed in the way we engage with such applications. We must still manually decompose frequently performe...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید