نتایج جستجو برای: mail hemadzadeh26gmailcom2

تعداد نتایج: 84447  

1999
Tomoko Imai Andrew E. Johnson Jason Leigh David E. Pape Thomas A. DeFanti

Companies conduct world-wide collaborations which often involve asynchronous work with group members in di erent time-zones. In asynchronous work, the participants can easily waste days just clarifying questions because feedback is slow. For e cient collaborations, accurate \handing-o " of work between participants is crucial. Therefore, messages exchanged between collaborators should not conta...

2010
Charles Stewart

INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 R I. THE VOTING PIPELINE AND LOST VOTES, 2000 TO 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 R II. THE VOTE-BY-MAIL PIPELINE . . . . . . . . . . . . . . . . . . . . . . . . 579 R III. THE RISE OF VOTE-BY-MAIL SINCE 1972 . . . . ...

1997
Jamie Zawinski

This document defines the format of Uniform Resource Locators (URL) for designating electronic mail addresses. It is one of a suite of documents which replace RFC 1738, ’’Uniform Resource Locators’’, and RFC 1808, ’’Relative Uniform Resource Locators’’. The syntax of ’’mailto’’ URLs from RFC 1738 is extended to allow creation of more RFC 822 messages by allowing the URL to express additional he...

1989
Matt Bishop

The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based k...

2008
Pini Gurfil Valéry Lainey Michael Efroimsky

Construction of an accurate theory of orbits about a precessing and nutating oblate planet, in terms of osculating elements defined in a frame associated with the equator of date, was started in Efroimsky & Goldreich (2004) and Efroimsky (2004b, 2005, 2006). Here we continue this line of research by combining that analytical machinery with numerical tools. Our model includes three factors: the ...

2000
Birgit Pfitzmann Matthias Schunter Michael Waidner

With a certified-mail protocol, one fairly exchanges a message for a receipt. No satisfactory protocols without any third party are possible, hence optimistic protocols are the best one can hope for. Here a third party is only involved if one party tries to cheat. Certified-mail protocols are known in the literature, but there was no rigorous definition yet, in particular for the optimistic cas...

2002
Jussi Kangasharju Keith W. Ross David A. Turner

E-mail is a mission-critical communication function for virtually all institutions, including corporations, universities, militaries, and families. Given the paramount importance of e-mail in modern society, it is disturbing how vulnerable the e-mail user can be to attacks and failures. Indeed, modern e-mail employs a server-centric design, in the user is critically dependent on its mail server...

Journal: :Software: Practice and Experience 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید