نتایج جستجو برای: internet relay chats

تعداد نتایج: 191305  

2016
Ahmed Abdelgawad Kumar Yelamarthi Ahmed Khattab

The Internet of Things (IoT) has been widely used to interconnect the available medical resources and offer smart, reliable, and effective healthcare service to the elderly people. Health monitoring for active and assisted living is one of the paradigms that can use the IoT advantages to improve the elderly lifestyle. In this paper, we present an IoT architecture customized for healthcare appli...

1997
Robert van Kralingen

In this paper, the conceptual frame-based ontology as introduced in Van Kralingen (1995) is described. The backbone of the ontology is constituted by three frame structures. The structures have been coined the norm frame, the act frame and the concept-description frame. A legal-theoretical analysis has determined the form of the structures. In addition to the three frame structures, the ontolog...

Journal: :CoRR 2014
Christine Estreguil Giovanni Caudullo Daniele de Rigo

Background/Purpose: In the context of the European Biodiversity policy, the Green Infrastructure Strategy is one supporting tool to mitigate fragmentation, inter-alia to increase the spatial and functional connectivity between protected and unprotected areas. The Joint Research Centre has developed an integrated model to provide a macro-scale set of indices to evaluate the connectivity of the N...

2003
Kanayo Ogura Takeshi Masuda Masato Ishizaki

Chat system has gained popularity as a tool for real-time conversation. However, standard chat systems have problems due to lack of timing information. To tackle this problem, we have built a system which has the following functions: 1) function of making typing state visible; 2) floor holding function at the start of typing. The evaluation results show that the sys-tem with each new function s...

2001
Mark Rouncefield Keith Cheverst Adrian Friday Stewart Kember Kieth Mitchell Peter Phillips

This paper is primarily about design and some of the difficulties of “appropriate” design in care settings. This is hardly a novel concern but this particular focus arises as a consequence of digital technologies maturing and transferring to the everyday domain. Domestic environments are becoming key sites for the consumption of information and communication technologies, embracing in the “care...

2008
W. Timothy Strayer David E. Lapsley Robert Walsh Carl Livadas

Current techniques for detecting botnets examine traffic content for IRC commands, monitor DNS for strange usage, or set up honeynets to capture live bots. Our botnet detection approach is to examine flow characteristics such as bandwidth, packet timing, and burst duration for evidence of botnet command and control activity. We have constructed an architecture that first eliminates traffic that...

2002
Brenda Danet

one of the world's most popular online chat modes. 1 Usually, IRC participants communicate via typed words. In contrast, this group communicates in real time mainly via the display of brilliantly colored visual images created from letters and other typographic symbols on the computer keyboard. Participants gather in a channel (chat room) called #mirc_rainbow, or " rainbow " for short. 2 While a...

1991
Elizabeth M. Reid

Despite the recent innovations of radio and telecommunications, communication and language theorists make a sharp distinction between the spoken and the written word. That distinction is based on a perception of temporal and spatial proximity in the case of spoken communication, and distance in the case of written communication. "Most analyses of linguistic interaction," as Naomi Baron notes, "...

2011
E. Sean Rintel Jeffery Pittam Joan Mulholland

The design of Internet Relay Chat (IRC) affords for, and itself produces, non-response situations that are not possible in FTF or telephone interaction. These system-occasioned non-responses produce almost isomorphic stimuli to participant non-responses. Situations thus arise in which nonresponses are interpersonally accountable despite agentive ambiguity. This study explores four intersections...

1997
Robert Harker

With the growing popularity of the Internet, unsolicited electronic mail (spam) has become a major concern. It fills up user’s mailboxes, clogs mail relays, wastes postmaster time, and creates ill will for sites that have been used as a relay. Most sites want to filter spam before they receive it but filtering spam is hard to do without filtering legitimate mail messages. This paper discusses w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید