نتایج جستجو برای: mail handling

تعداد نتایج: 155007  

2009
F. Anguita G. Benito J. W. Rice

s in this volume may be cited as Author A. B. (1998) Title of abstract. In First International Conference on Mars Polar Science and Exploration, p. xx. LPI Contribution No. 953, Lunar and Planetary Institute, Houston. This report is distributed by ORDER DEPARTMENT Lunar and Planetary Institute 3600 Bay Area Boulevard Houston TX 77058-1 113 Mail order requestors will be invoiced for the cost of ...

2015
Jasmine Malinao Florian Judex Tim Selke Gerhard Zucker Walter Kropatsch

In this paper, we propose methods of handling, analyzing, and profiling monitoring data of energy systems using their thermal coefficient of performance seen in uneven segmentations in their time series databases. Aside from assessing the performance of chillers using this parameter, we dealt with pinpointing different trends that this parameter undergoes through while the systems operate. From...

Journal: :Organization Science 2011
Stephen R. Barley Debra E. Meyerson Stine Grodal

The increasing volume of e-mail and other technologically enabled communications are widely regarded as a growing source of stress in people’s lives. Yet research also suggests that new media afford people additional flexibility and control by enabling them to communicate from anywhere at any time. Using a combination of quantitative and qualitative data, this paper builds theory that unravels ...

1999
Wael R. Elwasif James S. Plank Micah Beck Rich Wolski

IBP-Mail is an improvement to the current state of the art in mailing large files over the Internet. It arises from the addition of writable storage to the pool of available Internet resources. With IBP-Mail, a sender registers a large file with an IBP-Mail agent, and stores it into a network storage depot. The sender then mails a pointer to the file to the recipient using the standard SMTP mai...

2004
Boldizsár Bencsáth István Vajda

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

Journal: :Scientific American 1903

Journal: :The Iowa Review 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید