Sample records for e-mail ascii text

  1. State Of The Art In Digital Steganography Focusing ASCII Text Documents

    E-print Network

    Rafat, Khan Farhan

    2010-01-01

    Digitization of analogue signals has opened up new avenues for information hiding and the recent advancements in the telecommunication field has taken up this desire even further. From copper wire to fiber optics, technology has evolved and so are ways of covert channel communication. By "Covert" we mean "anything not meant for the purpose for which it is being used". Investigation and detection of existence of such cover channel communication has always remained a serious concern of information security professionals which has now been evolved into a motivating source of an adversary to communicate secretly in "open" without being allegedly caught or noticed. This paper presents a survey report on steganographic techniques which have been evolved over the years to hide the existence of secret information inside some cover (Text) object. The introduction of the subject is followed by the discussion which is narrowed down to the area where digital ASCII Text documents are being used as cover. Finally, the conc...

  2. E-mail/Password Usage Advisory Whether information of a sensitive-nature is transported via e-mail, either as text

    E-print Network

    Qiu, Weigang

    to passwords, PIN, or any type of security or access code. 4. Private or sensitive information would be data would include, but are not limited to, social security number, drivers' license number, credit. Passwords, PIN or any type of security or access code should not be transmitted as part of an e-mail message

  3. Exploring potential use of internet, E-mail, and instant text messaging to promote breast health and mammogram use among immigrant Hispanic women in Los Angeles County.

    PubMed

    Dang, Catherine M; Estrada, Sylvia; Bresee, Catherine; Phillips, Edward H

    2013-10-01

    Breast cancer is now the leading cause of death in Hispanic women (HW). Internet, e-mail, and instant text messaging may be cost-effective in educating HW about breast health and in reducing breast cancer mortality. We surveyed 905 HW women attending a free health fair about their technology use, acculturation, insurance status, mammography use, and breast cancer knowledge. Data were analyzed by t test or ?(2) tests. Mean age was 51.9 ± 14.2 years (range, 18 to 88 years). Ninety-two per cent were foreign-born. Most had completed some high school (39%) or elementary (38%) education. Most (62%) were uninsured. The majority spoke (67%) and read (66%) only Spanish. Only 60 per cent of HW older than 40 years had a recent mammogram. HW older than 40 years who had not had a recent mammogram were younger (mean 54.9 ± 10.8 vs 58 ± 10.4 years) and less likely to have health insurance (25 vs 44%; P < 0.001). Most HW never use the Internet (58%) or e-mail (64%). However, 70 per cent have mobile phones (66% older than 40 years), and 65 per cent use text messaging daily (58% older than 40 years, P = 0.001). In fact, 45 per cent wish to receive a mammogram reminder by text. Text messaging may be an inexpensive way to promote breast health and screening mammography use among uninsured HW. PMID:24160786

  4. Hooked on E-Mail

    ERIC Educational Resources Information Center

    Espinoza, Kathy

    2011-01-01

    Information overload, and an expectation that e-mails, tweets, and text messages will be answered immediately, impact productivity. The younger, information-addicted workers have a greater capacity to process this open floodgate of information, as well as a better ability to multitask. Research suggests that there is a marked drop in worker…

  5. MISR Conversion to ASCII Routines

    Atmospheric Science Data Center

    2013-04-01

    ... ordered from Exelis VIS on CD at no cost. The site provides installation instructions. The software was developed and tested with IDL and ... the  Readme file  for additional information, including installation and program execution instructions. The ASCII conversion ...

  6. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    ERIC Educational Resources Information Center

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  7. E-Mail and Ethical Issues

    ERIC Educational Resources Information Center

    Bradley, Loretta J.; Hendricks, Bret

    2009-01-01

    The proliferation of the use of e-mail and texting has created some ethical dilemmas for family counselors. Although e-mail can expand and encourage communication, it is not problem free and, in fact, can pose problems. There are issues with privacy, confidentiality, and maintaining an appropriate professional relationship. Family counselors…

  8. Using Lexical tools to convert Unicode characters to ASCII.

    PubMed

    Lu, Chris J; Browne, Allen C; Divita, Guy

    2008-01-01

    Unicode is an industry standard allowing computers to consistently represent and manipulate text expressed in most of the worlds writing systems. It is widely used in multilingual NLP (natural language processing) projects. On the other hand, there are some NLP projects still only dealing with ASCII characters. This paper describes methods of utilizing lexical tools to convert Unicode characters (UTF-8) to ASCII (7-bit) characters. PMID:18998787

  9. Understanding e-mail addresses

    Microsoft Academic Search

    Carol Gedney

    1990-01-01

    Electronic mail, with its gamut of benefits and advantages, can still cause some share of tribulation, especially when one tries to get a message to someone on a seemingly far-out network, or when that someone tries to send mail in return. This is the first in a series of articles designed to help the typical UIUCnet user understand the e-mail

  10. E-Mail: Write Protection?

    ERIC Educational Resources Information Center

    Zirkel, Perry A.

    1998-01-01

    A complex case involving a disgruntled ex-employee's invasion of a college president's e-mail system resulted in a decision granting two plaintiffs' motions for summary judgment. This was the first recorded education-related collision on the electronic superhighway. Every educational institution should have a policy and procedure regarding what…

  11. iPhone E-mail

    Microsoft Academic Search

    Steve Sande; Erica Sadun

    \\u000a Unlike many other smartphones, your iPhone can send, receive, and browse e-mail without getting weighed down with compromise.\\u000a The iPhone doesn’t settle for cramped, odd presentations. Your e-mail looks the way it should—the way it would if you were\\u000a reading it on your home computer. That’s because the iPhone provides an HTML-compatible rich-text client. Mail looks better\\u000a because the client

  12. Trustnet Architecture for E-mail Communication

    Microsoft Academic Search

    David Pölz; Wilfried N. Gansterer

    2009-01-01

    In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that introduces two classes of messages-trusted e-mail and e-mail from untrusted sources. Trusted e-mail messages are signed with an S\\/MIME signature. To address usability problems that occurred previously with S\\/MIME signatures, outgoing e-mail messages are automatically signed on the e-mail server without

  13. Business E-mail: Guidelines for Users.

    ERIC Educational Resources Information Center

    Munter, Mary; Rogers, Priscilla S.; Rymer, Jone

    2003-01-01

    Presents guidelines to help businesspeople and business students become more effective and efficient in the use of e-mail. Includes the authors' experiences as instructors in diverse business schools and corporate settings. Notes that the guidelines cover: recognizing the nature of e-mail; composing e-mail; and processing and managing e-mail. (SG)

  14. Properties of evolving e-mail networks

    Microsoft Academic Search

    Juan Wang; Philippe de Wilde

    2004-01-01

    Computer viruses spread by attaching to an e-mail message and sending themselves to users whose addresses are in the e-mail address book of the recipients. Here we investigate a simple model of an evolving e-mail network, with nodes as e-mail address books of users and links as the records of e-mail addresses in the address books. Within specific periods, some

  15. Mining writeprints from anonymous e-mails for forensic investigation

    E-print Network

    Fung, Benjamin C. M.

    for such activities. Extracting knowledge and information from e-mail text has become an important step for cybercrime of cybercrimes. In spam- ming, for instance, a culprit may attempt to hide his true identity. Likewise

  16. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  17. Phone Number: E-mail Address

    E-print Network

    Mohaghegh, Shahab

    Phone Number: E-mail Address: Name of Spouse/Guest: If spouse/guest graduated from WVU or another/College: Last visit to campus: Address: City/State/Zip: (First, Last, Maiden) (First, Last, Maiden) (Please

  18. Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol

    Microsoft Academic Search

    Gaurav Gupta; Chandan Mazumdar; M. S. Rao

    2004-01-01

    E-mail has revolutionized business, academic, and personal communication The advantages of e-mail include speedy delivery, ease of communication, cost effectiveness, geographical independence, and the portability of mailboxes. The last two are the biggest advantages over snail mail. However, with e-mail comes the threat of a genuine user being compromised through key loggers, social engineering, shoulder surfing, password guessing and other

  19. NAME: (print!) Section: E-Mail address

    E-print Network

    Zeilberger, Doron

    of 10) 9. (out of 10) 10. (out of 10) Types: Number, Function of variable(s), 2D vector of numbers, 3D vector of numbers, 2D vector of functions, 3D vector of functions, equation of a plane, parametricNAME: (print!) Section: E-Mail address: MATH 251 (1-3,10 ), Dr. Z. , Exam 1, Thurs., Oct. 8, 2009

  20. Who Owns Your E-mail?

    ERIC Educational Resources Information Center

    Panepinto, Joe

    1995-01-01

    Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)

  1. eMailing Browsing Internet safety Internet applications Searching S

    E-print Network

    Iyer, Sridhar

    eMailing Browsing Internet safety Internet applications Searching S eMailing Browsing Internet sa Internet applications Searchi eMailing Browsing Intern Internet applications Sea eMailing Browsing Inter Internet applications Se eMailing Browsing Inter Internet applications Searching eMailing Browsing Internet

  2. Replication Strategies for Mobile E-Mail

    Microsoft Academic Search

    Bill Fitler; David Betz

    1994-01-01

    Mobile computer users may have multiple computers and various communicaton methods available to them. Thus, effective e-mail services in diverse mobile environments, including both wireless and wireline scenarios, can be significantly enhanced using replication services. In this paper we discuss our adaptations of R.A. Golding's weak-consistency group communication and membership protocols[1,2] for robustness in mobile environments.

  3. GOCEXML2ASCII an XML to ASCII converter for GOCE level EGG_NOM and SST_PSO data

    E-print Network

    Stuttgart, Universität

    GOCEXML2ASCII ­ an XML to ASCII converter for GOCE level EGG_NOM and SST_PSO data Ma hias Roth SST_PSO_2 file (a typical SST_PSO_2 file has a size of ~ MB). The advantage of this parser Institute (Arsov, ) is implemented in C++. According to Arsov, the GOCEPARSER needs ~ min to convert a SST_PSO

  4. UNC Technical Report TR-02-047 Coding Polygon Meshes as Compressable ASCII

    E-print Network

    North Carolina at Chapel Hill, University of

    compression schemes such as gzip. The coder is lossless when only the position and texture coordinate indices. In this paper we show how to incorporate compression of polygonal data into a purely text-based scene graph descrip- tion. Our scheme codes polygon meshes as ASCII strings that compress well with standard

  5. Policy for Protecting Outgoing Mason E-mail Introduction

    E-print Network

    -mail accounts were used maliciously to send out SPAM and Phishing e-mail attacks. These incidents hurt effectively. ITU e-mail engineers can limit the amount of Phishing e-mail sent out from the Mason network of a Phishing or SPAM e-mail) 5000 10 Connection attempts that exceed the threshold are blocked. Connection

  6. Language and Gender Author Cohort Analysis of E-mail for Computer Forensics

    Microsoft Academic Search

    Olivier de Vel; Malcolm Corney; Alison Anderson; George Mohay

    2002-01-01

    We describe an investigation of authorship gender and lan- guage background cohort attribution mining from e-mail text documents. We used an extended set of predominantly topic content-free e-mail document features such as style markers, structural characteristics and gender-preferential language features together with a Support Vector Machine learning algorithm. Experiments using a corpus of e-mail doc- uments generated by a large

  7. E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)

    Microsoft Academic Search

    Syed Rahman Mashwani; Shah Khusro; A. Min Tjoa

    2009-01-01

    Doing business electronically is a major tendency among customers and businesses but there is always a threat about personal information privacy. E-mail address is one thing about which customers expect that e-businesses will not misuse it. Most e-businesses have privacy policy but that usually changes with time. And in case of violating privacy it is difficult to find the original

  8. Towards an integrated e-mail forensic analysis framework

    Microsoft Academic Search

    Rachid Hadjidj; Mourad Debbabi; Hakim Lounis; Farkhund Iqbal; Adam Szporer; Djamel Benredjem

    2009-01-01

    Due to its simple and inherently vulnerable nature, e-mail communication is abused for numerous illegitimate purposes. E-mail spamming, phishing, drug trafficking, cyber bullying, racial vilification, child pornography, and sexual harassment are some common e-mail mediated cyber crimes. Presently, there is no adequate proactive mechanism for securing e-mail systems. In this context, forensic analysis plays a major role by examining suspected

  9. Um modelo de confianca entre servidores de e-mail

    Microsoft Academic Search

    Leonardo B. de Oliveira

    E-mail services are essential in the internet. However, the standard e-mail architecture presents problems that opens it to several threats. Alternatives have been proposed to solve some problems related with e- mail services, offering reliability and escalability to such systems. This work presents a distributed trust model, allowing to create dynamic and decentralized trusted server lists, through the temporary exclusion

  10. Prevent Spam Filters from Blocking Legitimate E-Mail

    ERIC Educational Resources Information Center

    Goldsborough, Reid

    2004-01-01

    There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…

  11. E-mail and psychiatry: some psychotherapeutic and psychoanalytic perspectives.

    PubMed

    Bhuvaneswar, C G; Gutheil, T G

    2008-01-01

    In this paper, we consider the use of e-mail in psychotherapy and its impact on the experience of therapy for both patient and clinician. We discuss in detail the potential for boundary compromise by e-mail use and consider how e-mail may undermine the therapeutic alliance and the cultivation of empathy. Case studies illustrate the possible positive aspects of e-mail and elucidate several fundamental problems with any use of e-mail in psychodynamic treatment. PMID:18846971

  12. IntegraTUM Teilprojekt E-Mail: Rezentralisierung von E-Mail-Services

    NASA Astrophysics Data System (ADS)

    Diehn, Max; Haarer, Ado; Schreiner, Alexander; Storz, Michael

    Das Teilprojekt E-Mail hatte ursprünglich die Aufgabe einen zentralen Mailservice mit verteilter Administration der Mailadressen für die TUM aufzubauen und diesen durch Anti-Spam- und Anti-Viren-Maßnahmen zu schützen. Auf diesen Mailservice sollten sowohl die am LRZ gehosteten Maildomains als auch die vielen lokal betriebenen Mailserver - soweit von deren Betreibern gewünscht - migriert werden. Neben einigen Rückschlägen und Hindernissen kam es im Laufe des Projektes auch zu einer Änderung der Anforderungen, sodass zum Ende des Projektes statt eines reinen Mailsystems ein Doppelsystem mit "shared SMTP address space" bestehend aus einem klassischen Message-Store mit POP/IMAP-Zugriff auf Basis von Postfix + Dovecot und einem Groupware-System auf Basis von Microsoft Exchange in Produktion ging, wobei jeder Mitarbeiter und Student der TUM wählen kann, auf welchem der beiden Systeme sich seine Mailbox befindet.

  13. eMail-Learning: a new way of distance learning

    Microsoft Academic Search

    O. Di Giuseppe; L. Seta

    2005-01-01

    In this paper, we suggest a new way of designing and delivering distance learning courseware that we call eMail-Learning. In the our proposal we want to suggest the use of e-mail architecture as the basic compo- nent for creating a Learning Management System. We analyze the possibilities offered by the current e-mail architectures compared with the web-based en- vironments in

  14. ifile: An Application of Machine Learning to E­Mail Filtering É

    Microsoft Academic Search

    Jason D. M. Rennie

    2000-01-01

    The rise of the World Wide Web and the ever-increasing amounts of machine-readable text has caused text classiÞca- tion to become a important aspect of machine learning. One speciÞc application that has the potential to aect almost every user of the Internet is e-mail Þltering. The WorldTalk Corporation estimates that over 60 million business people use e-mail (6). Many more

  15. The USA PATRIOT Act: Implications for Private E-Mail

    Microsoft Academic Search

    Tina Ebenger

    2008-01-01

    In the aftermath of the terrorist attacks of September 11, 2001, the USA PATRIOT Act was enacted to “enhance domestic security.” One of the means to accomplish this was to give law enforcement increased authority for the surveillance, interception, and disclosure of private e-mails. The USA PATRIOT Act negated several of the privacy protections afforded private e-mail under the Electronic

  16. Characteristics of Parent-Teacher E-Mail Communication

    ERIC Educational Resources Information Center

    Thompson, Blair

    2008-01-01

    In the past decade, the use of computer-mediated communication such as e-mail has reportedly increased the level of parental involvement and parent-teacher communication at the elementary and secondary level. However, research has not yet examined the characteristics of parent-teacher e-mail communication. Thirty parent and 30 teacher interviews…

  17. A Discourse Analysis of School Counseling Supervisory E-Mail

    ERIC Educational Resources Information Center

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  18. Universal Access to E-Mail: Feasibility and Societal Implications.

    ERIC Educational Resources Information Center

    Anderson, Robert H.; And Others

    E-mail has swept the communications and information world, providing instantaneous global information and data exchange. However, an information elite still exists, made up of those with access to and knowledge about computers and e-mail. The diverging trends in access based on income and education are placing significant groups of current and…

  19. Teacher Talk on E-Mail. Current Conversations.

    ERIC Educational Resources Information Center

    Whitaker, Elaine; Hill, Elaine

    1996-01-01

    A high school and a university teacher converse via e-mail concerning their cooperative project in electronic literacy. The conversation highlights the frustrations of system crashes, student successes and failures, and the beginning of one teacher's dissertation. References to technology include experiences with e-mail, an LCD panel, and closed…

  20. File-Format Program For Transferable Output ASCII Data

    NASA Technical Reports Server (NTRS)

    Bingle, Bradford

    1988-01-01

    TOAD utilities machine-independent and require minimal central memory. Transferable Output ASCII Data (TOAD) file-format computer program facilitates transfer of data files from one computer installation to another. TOAD files preferred type and record length, easy to edit, read, and write on magnetic tape or transfer across communications networks. Applications programs write TOAD files directly and conform to all ANSI FORTRAN 77 standards.

  1. E-mail et Web : pour une navigation sans risque

    ScienceCinema

    None

    2011-10-06

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l?utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  2. e-mail address www.sciencedirect.com

    E-print Network

    Aksay, Ilhan A.

    e-mail address www.sciencedirect.com Chemistry Electrochemistry Communications Current: April - June 2009 go to ScienceDirect contact sitemap Chemistry > Electrochemistry Communications April - June on functionalized graphene sheets for electrocatalytic oxygen reduction · Short communication Electrochemistry

  3. What a difference your e-mail makes: effects of informal e-mail addresses in online résumé screening.

    PubMed

    van Toorenburg, Marlies; Oostrom, Janneke K; Pollet, Thomas V

    2015-03-01

    Résumés are screened rapidly, with some reports stating that recruiters form their impressions within 10 seconds. Certain résumé characteristics can have a significant impact on the snap judgments these recruiters make. The main goal of the present study was to examine the effect of the e-mail address (formal vs. informal) used in a résumé on the hirability perceptions formed by professional recruiters (N=73). In addition, the effect of the e-mail address on hirability perceptions was compared to the effects of spelling errors and typeface. Participants assessed the cognitive ability, personality, and the hirability of six fictitious applicants for the job of an HR specialist. The hirability ratings for the résumés with informal e-mail addresses were significantly lower than the hirability ratings for résumés that featured a formal e-mail address. The effect of e-mail address was as strong as the effect of spelling errors and stronger than that of typeface. The effect of e-mail address on hirability was mediated by perceptions of conscientiousness and honesty-humility. This study among actual recruiters shows for the first time that the choice of the e-mail address used on a résumé might make a real difference. PMID:25751044

  4. Learning to Improve E-mail Classification with numéro interactive

    NASA Astrophysics Data System (ADS)

    Jones, Dean M.

    This paper describes some of the ways in which we use artificial intelligence technologies in numéro interactive, a Customer Interaction Management system. In particular, we focus on the classification of e-mail messages into one of multiple business categories. We describe different features that are extracted from e-mail messages to help in this classification, and the improvement in the overall classification accuracy that results from the use of each kind of feature.

  5. An intelligent method to block e-mail bombs

    Microsoft Academic Search

    Fengming M. Chang

    2007-01-01

    It is hard to block e-mail bombs because they are usually sent by normal SMTP (Simple Mail Transfer Protocol) applications\\u000a with fake mail sender addresses and IP addresses. Fortunately, original network packets contain real IP address information\\u000a anyway. Collecting and analyzing these packet contents can help an administrator to realize where the e-mail bombs are coming\\u000a from and block them.

  6. Transferable Output ASCII Data (TOAD) file format description

    NASA Technical Reports Server (NTRS)

    Bingel, Bradford; Hammond, Dana

    1987-01-01

    Described is a format for writing ASCII data on a file to facilitate its transfer from one computer system to another. The TOAD format conforms to all ANSI FORTRAN 77 standards. There are two advantages in using the TOAD format. First, TOAD files are of the preferred type and record length to make them easy to edit, read from and write on magnetic tape, or transfer across communications networks. Secondly, application programs, using the TOAD format to write computational results, are more portable and the answer files easier to postprocess. TOAD utility software is listed in an appendix.

  7. Successful Practices in the Use of Secure E-mail

    PubMed Central

    Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt

    2014-01-01

    Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149

  8. Texting

    ERIC Educational Resources Information Center

    Tilley, Carol L.

    2009-01-01

    With the increasing ranks of cell phone ownership is an increase in text messaging, or texting. During 2008, more than 2.5 trillion text messages were sent worldwide--that's an average of more than 400 messages for every person on the planet. Although many of the messages teenagers text each day are perhaps nothing more than "how r u?" or "c u…

  9. Fostering E-Mail Security Awareness: The West Point Carronade

    ERIC Educational Resources Information Center

    Ferguson, Aaron J.

    2005-01-01

    The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…

  10. Argumentation Analysis of the Content of E-Mail Studies.

    ERIC Educational Resources Information Center

    Marttunen, Miika

    Although there are earlier experiences from computer mediated communication (CMC) applications in which e-mail has been used as a forum for argumentation and debate, the literature lacks systematic analyses on the use of CMC for this purpose. This kind of analysis would produce knowledge on the relevance of CMC for practicing argumentation that is…

  11. E-Mail karger@karger.com Experimental Chemotherapy

    E-print Network

    Terasaki, Mark

    E-Mail karger@karger.com Experimental Chemotherapy Chemotherapy 2013;59:14­23 DOI: 10 Center, Farmington, Conn., USA Introduction The goal of present-day chemotherapy is to kill cancer cells in a patient [5, 6]. However, neither broad- based chemotherapy nor more specific drug targeting has proved

  12. College Students' Gender Differences regarding E-Mail

    ERIC Educational Resources Information Center

    Punyanunt-Carter, Narissra M.; Hemby, Charles O.

    2006-01-01

    One hundred and forty-five undergraduate students at a large southwestern university completed a questionnaire designed to assess college students' computer-mediated communication behaviors. Findings revealed that males and females have different perceptions and usages concerning their computer-mediated communication behaviors when e-mailing and…

  13. May 09,1999 PHONE BASED E-MAIL SERVER

    E-print Network

    Chiueh, Tzi-cker

    handsets to dial to your home machine ­supposedly up, and your voice modem monitoring incoming phone calls to send e-mail. Assuming that our Software is running on your machine, your voice modem will handle to read from or write to data. Hardware : We used a Simultaneous Voice and Data modem. The whole

  14. Official Student E-mail Policy A. Introduction

    E-print Network

    Papautsky, Ian

    of communicating official University information to students, is convenient, rapid, environmentally aware, and cost space (for e-mail storage) to all students, at no cost to the student. The University also distributes e. There are situations, however, in which the University has a legitimate need to do so: to protect the integrity

  15. E-Mail from Professor Enhances Student Motivation and Attitudes

    ERIC Educational Resources Information Center

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  16. Andrew Kusiak e-mail: andrew-kusiak@uiowa.edu

    E-print Network

    Kusiak, Andrew

    Andrew Kusiak e-mail: andrew-kusiak@uiowa.edu Zijun Zhang Department of Mechanical and Industrial importance of measurable turbine parameters on the vibrations of the drive train and the tower are discussed on the vibrations of the drive train and the tower, the analysis is performed on data sets with narrow speed ranges

  17. E-Mail: Instructional Potentials and Learning Opportunities.

    ERIC Educational Resources Information Center

    Boulware, Beverly

    2002-01-01

    Examines second-graders' use of email to share with the researchers favorite parts of books they read, or any other aspect of stories they read. Finds appropriate use of e-mail communication offers teachers opportunities to identify instructional focus and take advantage of instructional moments to fit the developmental needs of their students in…

  18. E-Mail karger@karger.com Research Article

    E-print Network

    Nizet, Victor

    of Physiological Chemistry, University of Veterinary Medicine Hannover, Hannover, Germany; b Medical Microbiology., and g Department of Pediatrics and Skaggs School of Pharmacy and Pharmaceutical Sciences, University of Veterinary Medicine Hannover Bünteweg 17, DE­30559 Hannover (Germany) E-Mail mkoeckbl @ tiho

  19. Postdoctorate e-mail: zxu@blwtl.uwo.ca

    E-print Network

    Yu, Pei

    Research Director e-mail: hmh@blwtl.uwo.ca The Boundary Layer Wind Tunnel Laboratory, University of Western solutions superimposed with experimentally fitted boundary layer models. Improved (more robust winds. The mathematical modeling of the flow field has therefore both fundamental and practical impor

  20. E-mail marketing at the crossroads: A stakeholder analysis of unsolicited commercial e-mail (spam)

    Microsoft Academic Search

    Evangelos Moustakas; C. Ranganathan; Penny Duquenoy

    2006-01-01

    Purpose – The purpose of this paper is to provide a conceptual overview of the process of unsolicited commercial e-mail (UCE), propose a typology of UCE, and delineate key stakeholders of UCE, their roles and potential responses through a stakeholder analysis. Design\\/methodology\\/approach – Based on the extant literature, this paper provides a conceptualization of the UCE process, delineating specific types

  1. Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int

    E-print Network

    Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int For further information call 32 2. A The documents whose references are given in the text are available on the Council's Internet site http by an asterisk; these statements are available on the above mentioned Council Internet site or may be obtained

  2. Internet: http://ue.eu.int E-mail: press.office@consilium.eu.int

    E-print Network

    Internet: http://ue.eu.int E-mail: press.office@consilium.eu.int For further information call 32 2 references are given in the text are available on the Council's Internet site http://ue.eu.int. Acts adopted; these statements are available on the above mentioned Council Internet site or may be obtained from the Press

  3. Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int

    E-print Network

    Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int For further information call 32 2 marks. The documents whose references are given in the text are available on the Council's Internet Internet site or may be obtained from the Press Office. #12;PROVISIONAL VERSION 11.III.2004 6648/04 (Presse

  4. Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int

    E-print Network

    Internet: http://ue.eu.int/ E-mail: press.office@consilium.eu.int For further information call 32 2. The documents whose references are given in the text are available on the Council's Internet site http by an asterisk; these statements are available on the above mentioned Council Internet site or may be #12;22.IX

  5. Cut as a Querying Unit for WWW, Netnews, and E-mail

    Microsoft Academic Search

    Keishi Tajima; Yoshiaki Mizuuchiy; Masatsugu Kitagaway; Katsumi Tanaka

    In this paper, we propose a query framework for hyper- text data in general, and for WWW pages, Netnews ar- ticles, and e-mails in particular. In existing query tools for hypertext data, such as search engines for WWW or intelligent news\\/mail readers, data units in query are typically individual nodes. In actual hypertext data, however, one topic is often described

  6. Testing for telepathy in connection with e-mails.

    PubMed

    Sheldrake, Rupert; Smart, Pamela

    2005-12-01

    This study investigated possible telepathic communication in connection with e-mails. On each trial, there were four potential e-mailers, one of whom was selected at random by the experimenter. One minute before a prearranged time at which the e-mail was to be sent, the participant guessed who would send it. 50 participants (29 women and 21 men) were recruited through an employment web site. Of 552 trials, 235 (43%) guesses were hits, significantly above the chance expectation of 25%. Further tests with 5 participants (4 women, 1 man, ages 16 to 29) were videotaped continuously. On the filmed trials, the 64 hits of 137 (47%) were significantly above chance. PMID:16491679

  7. Editor's Roundtable: Stop avoiding your e-mails!

    NSDL National Science Digital Library

    Robert A. Liftig, EdD -- Writing Fellow

    2007-03-01

    Don't expect the online "innovation" to go away--email communication is here to stay, and it is your responsibility as an educational professional to respond to them, and even use them to your advantage. This month's Editor's Roundtable column discusses the upsides to the effective use of e-mail to communicate with parents, students, and administrators. In additon, it provides some helpful guidelines for you to follow.

  8. Report on Climate Change E-mails Exonerates Scientists

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2010-07-01

    A new report commissioned by the University of East Anglia (UEA) has largely exonerated climate scientists from the university's Climatic Research Unit (CRU) who wrote a number of controversial e-mail messages that were made public without authorization in November 2009. Critics have argued that the e-mails indicate that scientists had tampered with scientific data—including data related to land station temperatures and temperature reconstructions from tree ring analysis—subverted the peer review process, misused the Intergovernmental Panel on Climate Change (IPCC) process, and withheld data from critics. At a 7 July news conference to release the “Independent climate change e-mails review,” report chair Muir Russell said, “Climate science is a matter of such global importance that the highest standards of honesty, rigor, and openness are needed in its conduct. On the specific allegations made against the behavior of CRU scientists, we find that their rigor and honesty as scientists are not in doubt.” He continued, “In addition, we do not find that their behavior has prejudiced the balance of advice given to policy makers. In particular, we did not find any evidence of behavior that might undermine the conclusions of the IPCC assessments.” Russell is chair of the Judicial Appointments Board for Scotland and formerly was principal and vice-chancellor of the University of Glasgow, in Scotland.

  9. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    ERIC Educational Resources Information Center

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  10. Subpoena of scientists' e-mails raises concerns

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2012-07-01

    A recent court order that required the Woods Hole Oceanographic Institution (WHOI) to hand over more than 3000 confidential e-mails to the energy company BP in May has led to concerns about the need to protect academic freedom, the deliberative scientific process, and intellectual property. Lawyers representing BP filed the subpoena in December 2011 to seek information from WHOI in relation to a lawsuit brought against BP by the U.S. government and others about damages from the 2010 Deepwater Horizon oil spill in the Gulf of Mexico. WHOI is not a party to the lawsuit.

  11. There are two ways to register an e-mail address: send a blank e-mail, or enter it into the system directly. Send a blank e-mail to

    E-print Network

    Tachizawa, Kazuya

    There are two ways to register an e-mail address: send a blank e-mail, or enter it into the system-mail address register@anpi.general.hokudai.ac.jp. Or Use this QR code: register@anpi.general .hokudai for Students (1) E-mail address registration procedure (Common to cell phones, PCs and smartphones) E

  12. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems

    Microsoft Academic Search

    Thomas Morris; Rayford Vaughn; Yoginder Dandass

    2012-01-01

    MODBUS RTU\\/ASCII Snort is software to retrofit serial based industrial control systems to add Snort intrusion detection and intrusion prevention capabilities. This article discusses the need for such a system by describing 4 classes of intrusion vulnerabilities (denial of service, command injection, response injection, and system reconnaissance) which can be exploited on MODBUS RTU\\/ASCII industrial control systems. The article provides

  13. ASCII Phonetic Symbols for the World's Languages: Worldbet James L. Hieronymus

    E-print Network

    Hosom, John-Paul

    ASCII Phonetic Symbols for the World's Languages: Worldbet James L. Hieronymus AT&T Bell Laboratories, Murray Hill, NJ 07974, USA Abstract A new ASCII encoding of the International Phonetic Alphabet a large number of languages with phonemic and phonetic symbols, these were found to be inadequate

  14. ASCII Phonetic Symbols for the World's Languages: Worldbet James L. Hieronymus

    E-print Network

    Penn, Gerald

    ASCII Phonetic Symbols for the World's Languages: Worldbet James L. Hieronymus AT&T Bell Laboratories, Murray Hill, NJ 07974, USA Abstract A new ASCII encoding of the International Phonetic Alphabet. When an attempt was made to label a large number of languages with phonemic and phonetic symbols

  15. Teledentistry: Distant Diagnosis of Oral Disease Using E-Mails

    PubMed Central

    Morosini, Imara de Almeida Castro; Possebon, Renata Seleme; Giovanini, Allan Fernando; Bortoluzzi, Marcelo Carlos; Leão, Jair Carneiro; Piazzetta, Cleto Mariosvaldo

    2013-01-01

    Abstract Objective The purpose of this study was to evaluate the applicability of telediagnosis in oral medicine, through the transmission of clinical digital images by e-mail. Subjects and Methods: The sample included 60 consecutive patients who sought oral medicine services at the Federal University of Paraná, in the state of Paraná, located in southern Brazil. The clinical history and oral lesion images were recorded using clinical electronic charts and a digital camera, respectively, and sent by e-mail to two oral medicine consultants. The consultants provided a maximum of two clinical hypotheses for each case, which were compared with biopsy results that served as the gold standard. Results: In 31 of the 60 cases (51.7%), both consultants made the correct diagnosis; in 17 cases (28.3%), only one consultant made the correct diagnosis; and in 12 cases (20%), neither consultant made the correct diagnosis. Therefore, in 80% of cases, at least one consultant provided the correct diagnosis. The agreement between the first consultant and the gold standard was substantial (?=0.669), and the agreement between the second consultant and the gold standard was fair (?=0.574). Conclusions: The use of information technology can increase the accuracy of consultations in oral medicine. As expected, the participation of two remote experts increased the possibility of correct diagnosis. PMID:23356381

  16. Prohibition of Unauthorized Collection of E-mail Addresses Please note that e-mail addresses published on this Website must not be collected by anyone

    E-print Network

    to collect e-mail addresses on the Websites by using an e-mail auto-collecting program or other technical them; Send information for marketing purposes in violation of Article 50-8; or Fail to report changes

  17. A novel approach of mining write-prints for authorship attribution in e-mail forensics

    E-print Network

    Fung, Benjamin C. M.

    ). Phishing, spamming, e-mail bombing, threaten- ing, cyber bullying, racial vilification, child pornography, and sexual harassments are common examples of e-mail abuses. Terrorist groups and criminal gangs are using e-mail systems as a safe channel for their communication. E-mail is also abused for committing infrastructure

  18. Finding text in images

    Microsoft Academic Search

    Victor Wu; R. Manmatha; Edward M. Riseman

    1997-01-01

    There are many applications in which the automatic detection and recognition of text embedded in images isuseful. These applications include multimedia systems, digital libraries, and Geographical Information Systems.When machine generated text is printed against clean backgrounds, it can be converted to a computer readbleform (ASCII) using current Optical Character Recognition (OCR) technology. However, text is often printedagainst shaded or textured

  19. E-Mail Molecules—Individualizing the Large Lecture Class

    NASA Astrophysics Data System (ADS)

    Wamser, Carl C.

    2003-11-01

    All students in the organic chemistry class are assigned a unique set of nine molecules to report on as optional extra credit assignments. The molecules are taken from a list containing over 200 molecules on the class Web site; they represent an assortment of biologically relevant compounds, from acetaminophen to yohimbine. Once a week, students may submit information about one of the molecules for two points extra credit (where the course includes a total of over 600 points from traditional quizzes and exams). The information requested about the molecules varies slightly each term as student expertise grows, for example, molecular formula, hybridizations, functional groups, or number of stereocenters, but always includes biological relevance and sources of information. Initially students submitted data directly to the instructor by e-mail, but submissions now are handled by a Web-based course management system (WebCT). The goal is to give students individualized assignments that are relatively realistic in light of their future careers in health sciences. Nearly all of the students do some of the molecules, and many students do all of them. About 30 40% of the students who do the assignments regularly gain a grade benefit. Student responses to the exercise have been positive.

  20. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...2012-01-01 false Requirements for Web site registration or alternative e-mail...PRODUCTS § 1130.8 Requirements for Web site registration or alternative e-mail...registration page. The manufacturer's Web site, or other Web site established...

  1. 16 CFR 1130.7 - Requirements for Web site registration or alternative e-mail registration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...2014-01-01 false Requirements for Web site registration or alternative e-mail...PRODUCTS § 1130.7 Requirements for Web site registration or alternative e-mail...registration page. The manufacturer's Web site, or other Web site established...

  2. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...2010-01-01 false Requirements for Web site registration or alternative e-mail...2010) § 1130.8 Requirements for Web site registration or alternative e-mail...registration page. The manufacturer's Web site, or other Web site established...

  3. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...2013-01-01 false Requirements for Web site registration or alternative e-mail...PRODUCTS § 1130.8 Requirements for Web site registration or alternative e-mail...registration page. The manufacturer's Web site, or other Web site established...

  4. 16 CFR 1130.8 - Requirements for Web site registration or alternative e-mail registration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...2011-01-01 false Requirements for Web site registration or alternative e-mail...PRODUCTS § 1130.8 Requirements for Web site registration or alternative e-mail...registration page. The manufacturer's Web site, or other Web site established...

  5. Text File Display Program

    NASA Technical Reports Server (NTRS)

    Vavrus, J. L.

    1986-01-01

    LOOK program permits user to examine text file in pseudorandom access manner. Program provides user with way of rapidly examining contents of ASCII text file. LOOK opens text file for input only and accesses it in blockwise fashion. Handles text formatting and displays text lines on screen. User moves forward or backward in file by any number of lines or blocks. Provides ability to "scroll" text at various speeds in forward or backward directions.

  6. Unsolicited Commercial E-Mail: Empirical Analysis of a Digital Commons

    Microsoft Academic Search

    Nigel Melville; Aaron Stevens; Robert K. Plice; Oleg V. Pavlov

    2006-01-01

    Unsolicited commercial e-mail (UCE) is a significant problem of the digital commons, but there has been little empirical analysis of proposed solutions and underly- ing mechanisms. This study, based on an analysis of 47 million inbound e-mail messages drawn from a cross-section of e-mail inbox owners over a one-year period, characterizes resource overuse in the e-mail commons. The absence of

  7. The Development of E-Mail Literacy: From Writing to Peers to Writing to Authority Figures

    ERIC Educational Resources Information Center

    Chen, Chi-Fen Emily

    2006-01-01

    Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power…

  8. Comparing Response Rates in E-Mail and Paper Surveys: A Meta-Analysis

    ERIC Educational Resources Information Center

    Shih, Tse-Hua; Fan, Xitao

    2009-01-01

    This meta-analysis examined 35 study results within last 10 years that directly compared the response rates of e-mail versus mail surveys. Individual studies reported inconsistent findings concerning the response rate difference between e-mail and mail surveys, but e-mail surveys generally have lower response rate (about 20% lower on the average)…

  9. You've Got Mail!: Understanding How E-Mail Works

    ERIC Educational Resources Information Center

    Roman, Harry T.

    2007-01-01

    Conceptually, e-mail is not a whole lot different from regular postal mail ("snail mail"), except that it is much faster. E-mail requires three things: (1) a personal computer; (2) a telephone or communication line; and (3) an Internet provider (e-mail service account). This article provides details on how it works--plus some research activities…

  10. Improving Instructor Response to Student E-Mails Using Template and Reminder Interventions

    ERIC Educational Resources Information Center

    Elbeck, Matthew; Song, Minjung

    2011-01-01

    Student e-mails without the student's name, message, file attachment, and other identifying information may impede a timely and thorough instructor response. To help resolve this issue, we apply template and reminder interventions to improve student e-mail format defined as the degree of agreement between a student's e-mail format and an…

  11. Deaf and Hard of Hearing Americans' Instant Messaging and E-mail Use: A National Survey.

    ERIC Educational Resources Information Center

    Bowe, Frank G.

    2002-01-01

    A survey of 884 adults with hearing impairments found they were using e-mail and instant messaging (IM) more than TTY and telecommunications relay services. Virtually all participants had e-mail and IM at home. While the vast majority also had and used e-mail at work, just 1 in 3 had IM. (Contains 2 references.) (Author/CR)

  12. |Result List Refine Search Print E-mail Save Formats: Citation HTML Full Text PDF Full Text

    E-print Network

    Loope, David B.

    ventured into the remote reaches of the Gobi of Mongolia in search of fossils. The land, which appears so twelve-foot remains of the armored dinosaurs known as ankylosaurs, with almost every piece of bony plate. Dinosaur nests, eggs, and embryos have also been preserved. Some of the animals have been captured

  13. Doctors Who Are Using E-mail With Their Patients: a Qualitative Exploration

    PubMed Central

    Patt, Madhavi R; Jenckes, Mollie W; Sands, Daniel Z; Ford, Daniel E

    2003-01-01

    Background Despite the potential for rapid, asynchronous, documentable communication, the use of e-mail for physician-patient communication has not been widely adopted. Objective To survey physicians currently using e-mail with their patients daily to understand their experiences. Methods In-depth phone interviews of 45 physicians currently using e-mail with patients were audio taped and transcribed verbatim. Two investigators independently qualitatively coded comments. Differences were adjudicated by group consensus. Results Almost all of the 642 comments from these physicians who currently use e-mail with patients daily could be grouped into 1 of 4 broad domains: (1) e-mail access and content, (2) effects of e-mail on the doctor-patient relationship, (3) managing clinical issues by e-mail, and (4) integrating e-mail into office processes. The most consistent theme was that e-mail communication enhances chronic-disease management. Many physicians also reported improved continuity of care and increased flexibility in responding to nonurgent issues. Integration of e-mail into daily workflow, such as utilization of office personnel, appears to be a significant area of concern for many of the physicians. For other issues, such as content, efficiency of e-mail, and confidentiality, there were diverging experiences and opinions. Physicians appear to be selective in choosing which patients they will communicate with via e-mail, but the criteria for selection is unclear. Conclusions These physician respondents did perceive benefits to e-mail with a select group of patients. Several areas, such as identifying clinical situations where e-mail communication is effective, incorporating e-mail into office flow, and being reimbursed for online medical care/communication, need to be addressed before this mode of communication diffuses into most practices. PMID:12857665

  14. Professional e-mail communication among health care providers: proposing evidence-based guidelines.

    PubMed

    Malka, S Terez; Kessler, Chad S; Abraham, John; Emmet, Thomas W; Wilbur, Lee

    2015-01-01

    E-mail is now a primary method of correspondence in health care, and proficiency with professional e-mail use is a vital skill for physicians. Fundamentals of e-mail courtesy can be derived from lay literature, but there is a dearth of scientific literature that addresses the use of e-mail between physicians. E-mail communication between providers is generally more familiar and casual than other professional interactions, which can promote unprofessional behavior or misunderstanding. Not only e-mail content but also wording, format, and tone may influence clinical recommendations and perceptions of the e-mail sender. In addition, there are serious legal and ethical implications when unprofessional or unsecured e-mails related to patient-identifying information are exchanged or included within an electronic medical record. The authors believe that the appropriate use of e-mail is a vital skill for physicians, with serious legal and ethical ramifications and the potential to affect professional development and patient care. In this article, the authors analyze a comprehensive literature search, explore several facets of e-mail use between physicians, and offer specific recommendations for professional e-mail use. PMID:25162617

  15. A survey of patient-provider e-mail communication: what do patients think?

    PubMed

    Sittig, D F; King, S; Hazlehurst, B L

    2001-04-01

    Communication between patients and providers forms the backbone of the patient-provider relationship. Often such communication is strained due to time and space limitations on the part of both patients and providers. Many healthcare organizations are developing secure e-mail communication facilities to allow patients to exchange e-mail messages with their providers. Providers are worried that opening such lines of communication will inundate them with vast quantities of e-mail from their patients. Patients are worried that their messages will be intercepted and read by unauthorized people. In an attempt to determine how a group of internet-active, e-mail-ready patients currently use, or potentially view, the ability to exchange e-mail messages with their health care providers, we distributed a survey via e-mail to over 9500 patients. After determining each patient's e-mail activity level (based on the number of messages sent each day), we asked questions such as: "Have you ever sent e-mail to your provider?" "What issues or concerns have prevented you from sending e-mail messages to your provider?" "If your provider were to tell you that someone in his/her office may screen, read or perhaps reply to your message before he/she sees it, to what extent would you be concerned about this?" and "How would you rate your overall satisfaction with the use of e-mail to communicate with your provider?" Results from the survey indicate that nearly 85% of the patients surveyed send at least one e-mail message per day, but that very few (i.e. 6%) of the patients have actually sent an e-mail message to their provider. Interestingly, over half of the patients indicated that they would like to send their providers e-mail, but that they do not know their provider's e-mail address. PMID:11248604

  16. Accessing the Internet by E-mail FAQ

    NSDL National Science Digital Library

    Boyd, Gerald E.

    Gerald Boyd has spent much time learning the internal syntax of web search engines. He has made the fruits of his labor available at an ftp site. Interested Internauts can download FAQs on how to query fifteen generic and eight specialty search engines by email. Included are Alta Vista, Excite, Inktomi, Yahoo, Infoseek, OKRA, Open Text, SwitchBoard, TheList, and others. Also included is a FAQ on how to use an Agora Server to use the web by email. See the Scout Report for March 8, 1996 for more on Agora. The FAQs are of greatest use to those without a web connection, but are also interesting to anyone who is intrigued by the intricacies of search engines. Users should download wsintro.faq (table of contents of FAQs), wscrack.faq (basic strategy for figuring out how to query search indexes via email) and wshelp.faq (Agora help file) before any others. For those who would like to download everything at once, wssearch.zip contains all of the files. Note that while these files are fairly technical, they are very useful for those who need such Internet access.

  17. Fax: +81 (0)48 462-1220 E-mail: bscs-jimu@riken.jp

    E-print Network

    Fukai, Tomoki

    * Company/Institute Department Title * Office address Telephone FAX E-mail address Please place a check mark the form below and send it as an e-mail attachement to bscs-jimu@riken.jp, or by fax to +81 (0)48 462Fax: +81 (0)48 462-1220 E-mail: bscs-jimu@riken.jp Symposium (free admission): 10:00-18:00 March 18

  18. Coming down the e-mail mountain, blazing a trail to gmail

    Microsoft Academic Search

    Cynthia A. Sanders

    2008-01-01

    Knowing our e-mail server at Oberlin College was heading toward the end of its life, we began to investigate our potential alternatives. We considered: (1) upgrading our existing system, Sun UNIX, to new hardware and software with updated versions of the same product lines, (2) purchasing a new and completely different e-mail system, or (3) outsourcing e-mail to an external

  19. The selection of instant messaging or e-mail: College students' perspective for computer communication

    Microsoft Academic Search

    Sean Lancaster; David C. Yen; Albert H. Huang; Shin-yuan Hung

    2007-01-01

    Purpose – Instant messaging and e-mail are popular communication methods on college campuses. However, students' perceptions of the two technologies vary greatly. This study seeks to investigate the differences between instant messaging and e-mail. Design\\/methodology\\/approach – A survey was given to 545 college students. Findings – Instant messaging is perceived as offering many advantages over e-mail including conveying emotions, building

  20. E-mail authorship mining based on SVM for computer forensic

    Microsoft Academic Search

    Gui-Fa Teng; Mao-Sheng Lai; Jian-Bin Ma; Ying Li

    2004-01-01

    We describe our work which attempts to mine e-mail authorship for the purpose of computer forensic. We extract various e-mail document features including linguistic features, header features and structural characteristics. These features together are used with the support vector machine learning algorithm to classify or attribute authorship of e-mail messages to an author. The primary experiments on a number of

  1. IntegraTUM Teilprojekt E-Mail: Aufbau eines mandantenfähigen Groupware-Services und seine Integration in Identity Management und E-Mail Infrastruktur der Technischen Universität München

    NASA Astrophysics Data System (ADS)

    Diehn, Max

    Die E-Mail-Infrastruktur an der Technischen Universität München (TUM) ist historisch bedingt sehr heterogen und komplex. Viele Einrichtungen müssen wertvolle Arbeitskraft auf die Administration eigener Mailserver verwenden. Auf der anderen Seite wird bei einigen Einrichtungen der Ruf nach Groupware-Funktionalitäten wie z.B. gemeinsame Kalender immer lauter. Das Teilprojekt E-Mail stellt einen zentralen Mail- und Groupware-Service bereit, der den Einrichtungen ermöglichen soll, den Betrieb eigener Server und zugehöriger Systeme (etwa lokaler Benutzerverwaltungen) für diesen Zweck aufzugeben und diese Dienste an das Teilprojekt E-Mail zu migrieren, ohne ihre Verwaltungshoheit oder ihre Maildomains aufgeben zu müssen. Dieser Service versteht sich als eine Ergänzung zur bestehenden Grundversorgung der TUM mit den Maildiensten des myTUM-Mailers, ist mandantenfähig aufgebaut und kann daher künftig neben der TUM auch weiteren Organisationen im Münchner Wissenschaftsnetz zur Verfügung gestellt werden.

  2. Discourse Strategies in Professional E-Mail Negotiation: A Case Study

    ERIC Educational Resources Information Center

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e-mail communication which covers a period of three months,…

  3. Race on the Superhighway: How E-Mail Affects African American Student Writers.

    ERIC Educational Resources Information Center

    Redd, Teresa M.; Massey, Victoria W.

    1997-01-01

    Examines three claims about -mail and its implications for African-American students: e-mail (1) blends elements of oral and written language; (2) fosters a sense of community; and (3) leads to the enfranchisement of marginalized writers. Explores these claims through an extended e-mail exchange between African-American students at Howard…

  4. Changing Cultural Stereotypes through E-Mail Assisted Foreign Language Learning

    ERIC Educational Resources Information Center

    Itakura, Hiroko

    2004-01-01

    This paper explores the question of how cultural stereotypes are formed, modified, dismissed or reinforced, drawing on findings from a collaborative intercultural e-mail project between Hong Kong learners of Japanese at The Hong Kong Polytechnic University and native Japanese speakers at Kagoshima University. It also evaluates role of e-mail

  5. NinjaMail: The Design of a High-Performance Clustered, Distributed E-Mail System

    Microsoft Academic Search

    J. Robert Von Behren; Steven E. Czerwinski; Anthony D. Joseph; Eric A. Brewer; John Kubiatowicz

    2000-01-01

    In today's Internet era, electronic mail is replacing tele- phony and postal mail as the primary means of commu- nication for hundreds of millions of individuals. Free e- mail services, such as Microsoft's Hotmail and Yahoo's Ya- hoo! Mail, each have tens of millions of subscribers. How- ever, these and other current e-mail systems unfortunately are not capable of handling

  6. E-mail marketing grows up: a primer for the managed care industry.

    PubMed

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs. PMID:11067390

  7. Chris Pierce and the Yankee Donut Company: An E-Mail-Based Management Simulation

    ERIC Educational Resources Information Center

    Greenberg, Danna N.; Rollag, Keith

    2005-01-01

    In this article, the authors describe an e-mail-based simulation that helps students experience the fast-paced, complex world of the middle manager. In this electronic in-basket exercise, students assume the role of a district manager in a doughnut company as they respond to a rapid series of high- and low-priority e-mails ostensibly sent from…

  8. Ars Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre

    ERIC Educational Resources Information Center

    Ross, Derek G.

    2009-01-01

    Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…

  9. MedlinePlus E-mail Updates | NIH MedlinePlus the Magazine

    MedlinePLUS

    ... of this page please turn Javascript on. MedlinePlus E-mail Updates Past Issues / Spring - Summer 2010 Table ... in health and medicine? Sign up for MedlinePlus e-mail updates, and you'll receive alerts whenever ...

  10. Alumni Relationships in the Electronic Age: An Assessment of a Permission Based E-Mail Campaign

    ERIC Educational Resources Information Center

    Moore, Robert S.; McLaughlin, Caragh E.

    2007-01-01

    E-mail is seen as an inexpensive, fast way to communicate with university constituencies, especially alumni. The next logical stage for the use of this Internet technology is the development and evaluation of permission based e-mail (PBE) campaigns. In this paper, we directly examine recipient evaluation of PBE in the context of a university…

  11. Social Work Practice in the Digital Age: Therapeutic E-Mail as a Direct Practice Methodology

    ERIC Educational Resources Information Center

    Mattison, Marian

    2012-01-01

    The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include…

  12. "My Heart Want to Say Something": Exploring ELL Vocabulary Use through E-Mail

    ERIC Educational Resources Information Center

    Hwang, Sung-on; Piazza, Carolyn L.; Pierce, Michael J.; Bryce, Sara M.

    2011-01-01

    Purpose: The purpose of this paper is to report on one high school English-language-learner's (ELL) breadth and depth of vocabulary as he communicated with his teacher through e-mail across geographic boundaries for over 18 months. Design/methodology/approach: The authors began by separating 358 e-mails into three time periods (first beginning,…

  13. An IT Manager's View on E-Mail and Internet Policies and Procedures

    ERIC Educational Resources Information Center

    Desai, Mayur S.; Hart, Jeff; Richards, Thomas C.

    2009-01-01

    E-mail is mandatory tool of communications any business to survive in the 21st century. It is imperative that Information technology (IT) managers monitor and make sure that the e-mail systems are used properly. In order to organize a systematic process for proper use of email an administrator must have an input into the development of appropriate…

  14. The Most Preferred Free E-mail Service Used by Students

    ERIC Educational Resources Information Center

    Cavus, Nadire; Bicen, Huseyin

    2009-01-01

    The aim of this study is to investigate the most preferred free web based e-mail used by students in the technology departments of the Near East University (Departments CIS, CEIT and COM.ENG), and also to find out which technical characteristics affect the participants when making a decision for the choice of an e-mail service. The volunteer…

  15. Outcomes of an Intercultural E-Mail Based University Discussion Project

    ERIC Educational Resources Information Center

    Furcsa, Laura

    2009-01-01

    This article investigates the development of intercultural awareness in an electronic mail (e-mail) discussion project between Hungarian learners of English and American speakers. Students discussed topics relating to cultures, languages, and pedagogical issues. The e-mails were analyzed in terms of language skill improvement, apprehensiveness…

  16. Reducing the Damage Done by E-Mail in Our Schools

    ERIC Educational Resources Information Center

    Glendinning, Matt

    2007-01-01

    E-mail is a tool that can vastly increase the efficiency and productivity of school leaders. It can enable them to better orchestrate school operations and so improve student learning. But administrators must remain wary of the effect that extensive e-mail communication can have on the school community, and they need to work to promote a healthy…

  17. Districts Weigh Benefits and Drawbacks of Setting Up Student E-Mail Accounts

    ERIC Educational Resources Information Center

    Ash, Katie

    2008-01-01

    Some school districts hoping to improve communication and student engagement in learning are taking a step many educators still view warily: providing students with their own e-mail accounts. However, making e-mail a regular part of students' school lives raises a host of concerns about inappropriate use. In addition, many teachers doubt that the…

  18. Location Is Everything: The Use and Marketing of Reference E-Mail

    ERIC Educational Resources Information Center

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  19. The E's of E-Mail: Tips for Effective and Efficient Use in School Administration.

    ERIC Educational Resources Information Center

    Logan, Joyce E.

    1999-01-01

    Clearly established procedures for sending, receiving, and responding to e-mail begin with planning and scheduling its use. Administrators should make appropriate choices of communication methods; use the address-book feature for individual and group e-mail addresses; use word-processing software to prepare lengthy documents and the attachment…

  20. E-Mail Usage by Technical Education Students in Nigerian Universities

    Microsoft Academic Search

    Samuel I. Akinseinde; Esharenana E. Adomi

    2004-01-01

    This work surveys use of e-mail by Technical Education students in Nigerian universities. Questionnaires were used to collect data from technical education students in three Nigerian universities: University of Benin, Nnamdi Azikiwe University and Delta State University. Data were analysed and presented by gender using frequency counts and percentages. Findings reveal that a majority of the respondents used e-mail to

  1. On Capturing and Containing E-mail Worms Chin-Tser Huang*

    E-print Network

    Liu, Alex X.

    On Capturing and Containing E-mail Worms Chin-Tser Huang* Nathan L. Johnson* Jeff Janies* Alex X@cs.utexas.edu Abstract Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage that may be caused by the worm

  2. Questions? Call 540/231-8636 or e-mail grad @vt.edu for assistance.

    E-print Network

    Buehrer, R. Michael

    /231-8636 or e-mail grads@vt.edu for assistance. To Pay Via Check or Money Order Enclose your check or moneyQuestions? Call 540/231-8636 or e-mail grad @vt.edu for assistance. APPLICATION FOR SIMULTANEOUS: Graduate School Graduate Life Center at Donaldson Brown Virginia Tech (0325) Blacksburg, VA 24061 Fax: 540

  3. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    ERIC Educational Resources Information Center

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  4. Correspondence: Souad DEMIGHA. Other author information: S.D.; E-mail: *Souad.Demigha@malix.univ-paris1.fr. C.R.; E-mail: *Colette.Rolland@univ-paris1.fr. **T.P.B.; E-mail: baum@uvp5.univ-paris5.fr. ***(C.B, B.V, J.C, Y.M).; E-mails

    E-print Network

    Boyer, Edmond

    .Demigha@malix.univ-paris1.fr. C.R.; E- mail: *Colette.Rolland@univ-paris1.fr. **T.P.B.; E-mail: baum@uvp5.univ-paris5.fr DEMIGHA*a , Colette ROLLAND*a , Thierry-Pascal BAUM**b , Corinne BALLEYGUIER***c , Bénédicte VINCENT

  5. Keeping in Touch and out of Trouble: E-mail, the Web, and the Job Search.

    ERIC Educational Resources Information Center

    Ives, Maura

    1999-01-01

    Suggests that e-mail and the Web can make the hunt for a job in the English profession and the hiring process easier, faster, less expensive, and more effective for everyone involved. Addresses problems using e-mail for the job search. Concludes that the Web functions best as a supplementary source of information for candidates and institutions.…

  6. Egocentrism Over E-Mail: Can We Communicate as Well as We Think?

    Microsoft Academic Search

    Justin Kruger; Nicholas Epley; Jason Parker; Zhi-Wen Ng

    2005-01-01

    Without the benefit of paralinguistic cues such as gesture, emphasis, and intonation, it can be difficult to convey emotion and tone over electronic mail (e-mail). Five experiments suggest that this limitation is often underappreciated, such that people tend to believe that they can communicate over e-mail more effectively than they actually can. Studies 4 and 5 further suggest that this

  7. http://articles.boston.com/2011-12-31/lifestyle/30577050_1_e-mail-marketing-e-mail-communication-radicati-group

    E-print Network

    Kuzmanovic, Aleksandar

    gives a personal touch to a typewritten letter, the e-mail sign- off is the only opportunity to add some, of course, to make sure they are read before they are deleted. That's why experts say that any touch-mail you are going to lose points from the judges,'' said Jodi R. R. Smith, a Marblehead etiquette

  8. Transferable Output ASCII Data (TOAD) gateway: Version 1.0 user's guide

    NASA Technical Reports Server (NTRS)

    Bingel, Bradford D.

    1991-01-01

    The Transferable Output ASCII Data (TOAD) Gateway, release 1.0 is described. This is a software tool for converting tabular data from one format into another via the TOAD format. This initial release of the Gateway allows free data interchange among the following file formats: TOAD; Standard Interface File (SIF); Program to Optimize Simulated Trajectories (POST) input; Comma Separated Value (TSV); and a general free-form file format. As required, additional formats can be accommodated quickly and easily.

  9. A Doppler-limited rubidium atlas in ascii format, 9500–12 300 cm ?1

    Microsoft Academic Search

    Amanda J. Ross; Victor Bertrand; Heather Harker; Patrick Crozet

    2010-01-01

    We present a Doppler-limited transmission spectrum of the rubidium dimer, suitable for frequency calibration of near infrared (e.g. Ti:sapphire) excitation experiments in the region 9500–12300cm?1. It provides an abundant source of reference peaks that can be used in a graphic environment to calibrate short (<1cm?1) scans of excitation spectrum. This is a sequel to an iodine atlas in ascii format

  10. RF model of the distribution system as a communication channel, phase 2. Volume 4: Sofware source program and illustrations ASCII database listings

    NASA Technical Reports Server (NTRS)

    Rustay, R. C.; Gajjar, J. T.; Rankin, R. W.; Wentz, R. C.; Wooding, R.

    1982-01-01

    Listings of source programs and some illustrative examples of various ASCII data base files are presented. The listings are grouped into the following categories: main programs, subroutine programs, illustrative ASCII data base files. Within each category files are listed alphabetically.

  11. Corresponding author: Huosheng Hu E-mail: hhu@essex.ac.uk

    E-print Network

    Hu, Huosheng

    Corresponding author: Huosheng Hu E-mail: hhu@essex.ac.uk Journal of Bionic Engineering 6 (2009, a brief conclusion and future work are summarized in Section 5. #12;Journal of Bionic Engineering (2009

  12. Journal of Nanotechnology in Engineering and Medicine Journal Copy of e-mail Notification

    E-print Network

    Mukhopadhyay, Sharmila M.

    Journal of Nanotechnology in Engineering and Medicine Journal Copy of e-mail Notification Journal of Nanotechnology in Engineering and Medicine Published by ASME Dear Author, Congratulations on having your paper

  13. Nazia Sarwat Islam e-mail: nazia1357@gmail.com

    E-print Network

    Henkel, Werner

    Nazia Sarwat Islam e-mail: nazia1357@gmail.com Current Position 2012 - present MS. Student-directional Lempel-Ziv-like Compression Algorithms; Authors: Attiya Mahmood, Nazia Islam, Dawit Nigatu, and Werner

  14. ELDERLY AMERICANS AND THE INTERNET: E-MAIL, TV NEWS, INFORMATION AND ENTERTAINMENT WEBSITES

    Microsoft Academic Search

    Michael L. Hilt; Jeremy H. Lipschultz

    2004-01-01

    Older Americans, like other groups, vary in their use of the Internet. The participants for this study—elderly computer users from a Midwestern mid-size sample—used e-mail and considered it the most important Internet function. It was common for them to use e-mail with family and friends on a regular, if not daily, basis. When this group of older people did surf

  15. www.omega.com e-mail: info@omega.com

    E-print Network

    Kleinfeld, David

    www.omega.com e-mail: info@omega.com User'sGuide CN76000 Microprocessor-Based Temperature;Servicing North America: USA: One Omega Drive, Box 4047 ISO 9001 Certified Stamford CT 06907-0047 Tel: (203) 359-1660 FAX: (203) 359-7700 e-mail: info@omega.com Canada: 976 Bergar Laval (Quebec) H7L 5A1, Canada

  16. www.omega.com e-mail: info@omega.com

    E-print Network

    Gellman, Andrew J.

    www.omega.com e-mail: info@omega.com www.omega.com/software User'sGuide MICROMEGA® CN77000 Series Controller ® ® Shop on line at #12;® ® OMEGAnet¨ On-Line Service www.omega.com Internet e-mail info@omega.com Servicing North America: USA:·· One Omega Drive, P.O. Box 4047 ISO 9001 Certified· Stamford CT 06907

  17. Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail

    Microsoft Academic Search

    Noria Foukia; Li Zhou; B. Clifford Neuman

    2006-01-01

    \\u000a Current anti-spam tools focus on filtering incoming e-mails. The scope of these tools is limited to local administrative domains.\\u000a With such limited information, it is difficult to make accurate spam control decisions. We observe that sending servers process\\u000a more information on their outgoing e-mail traffic than receiving servers do on their incoming traffic. Better spam control\\u000a can be achieved if

  18. Studying E-Mail Graphs for Intelligence Monitoring and Analysis in the Absence of Semantic Information

    Microsoft Academic Search

    Petros Drineas; Mukkai S. Krishnamoorthy; Michael D. Sofka; Bülent Yener

    2004-01-01

    This work describes a methodology that can be used to iden- tify structure and communication patterns within an organization based on e-mail data. The first step of the method is the construction of an e-mail graph; we then experimentally show that the adjacency matrix of the graph is well approximated by a low-rank matrix. The low-rank property indicates that Principal

  19. A survey of patient–provider e-mail communication: what do patients think?

    Microsoft Academic Search

    Dean F. Sittig; Stephen King; Brian L. Hazlehurst

    2001-01-01

    Communication between patients and providers forms the backbone of the patient–provider relationship. Often such communication is strained due to time and space limitations on the part of both patients and providers. Many healthcare organizations are developing secure e-mail communication facilities to allow patients to exchange e-mail messages with their providers. Providers are worried that opening such lines of communication will

  20. Research Paper: The Use of Wireless E-Mail to Improve Healthcare Team Communication

    Microsoft Academic Search

    Chris O'Connor; Jan O. Friedrich; Damon C. Scales; Neill K. J. Adhikari

    2009-01-01

    ObjectiveTo assess the impact of using wireless e-mail for clinical communication in an intensive care unit (ICU).DesignThe authors implemented push wireless e-mail over a GSM cellular network in a 26-bed ICU during a 6-month study period. Daytime ICU staff (intensivists, nurses, respiratory therapists, pharmacists, clerical staff, and ICU leadership) used handheld devices (BlackBerry, Research in Motion, Waterloo, ON) without dedicated

  1. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    ERIC Educational Resources Information Center

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of…

  2. Legal and policy issues associated with monitoring employee E-mail

    SciTech Connect

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  3. Feminist issues in e-mail group discussion among cancer patients.

    PubMed

    Im, Eun-Ok; Chee, Wonshik

    2003-01-01

    From a feminist perspective, issues in using e-mail group discussion among cancer patients are explored and discussed by analyzing a study on gender and ethnic differences in cancer pain experiences among cancer patients. First, the study is concisely described. Then, while considering the essential components of research from a feminist perspective, issues identified throughout the research process (intersubjectivity, lack of women's voices, reflexivity and contextuality, dependability, and adequacy and credibility) are discussed. Based on the discussion, implications for future feminist research using e-mail group discussion are proposed. PMID:14674577

  4. ALERT: Fraudulent E-Mail Claims to Be From the FDIC Summary: E-mails fraudulently claiming to be from the FDIC are attempting to trick recipients into installing

    E-print Network

    Asaithambi, Asai

    ALERT: Fraudulent E-Mail Claims to Be From the FDIC Summary: E-mails fraudulently claiming. These e-mails falsely indicate that recipients should install software that was developed by the FDIC://www.fdic.gov/consumers/consumer/alerts/index.html Identity Theft: Identity Theft occurs when someone uses your name, Social Security number, credit card

  5. 7 CFR 984.445 - Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any other means...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Whenever the Board conducts meetings by telephone, videoconference, or any...

  6. 7 CFR 984.445 - Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any other means...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Whenever the Board conducts meetings by telephone, videoconference, or any...

  7. 43 CFR 2.6 - Will the Department accept written requests, including fax, e-mail, or telephone requests, for...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...requests, including fax, e-mail, or telephone requests, for routinely available information...requests, including fax, e-mail, or telephone requests, for routinely available information...respond to oral requests (those made by telephone or otherwise) for routinely...

  8. 7 CFR 984.445 - Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any other means...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Whenever the Board conducts meetings by telephone, videoconference, or any...

  9. 7 CFR 984.445 - Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any other means...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Procedures for voting by mail, e-mail, telephone, videoconference, facsimile, or any...Whenever the Board conducts meetings by telephone, videoconference, or any...

  10. 43 CFR 2.6 - Will the Department accept written requests, including fax, e-mail, or telephone requests, for...

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...requests, including fax, e-mail, or telephone requests, for routinely available information...requests, including fax, e-mail, or telephone requests, for routinely available information...respond to oral requests (those made by telephone or otherwise) for routinely...

  11. 43 CFR 2.6 - Will the Department accept written requests, including fax, e-mail, or telephone requests, for...

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...requests, including fax, e-mail, or telephone requests, for routinely available information...requests, including fax, e-mail, or telephone requests, for routinely available information...respond to oral requests (those made by telephone or otherwise) for routinely...

  12. Understanding the limitations of S\\/MIME digital signatures for e-mails: A GUI based approach

    Microsoft Academic Search

    Albert Levi; Can Berk Güder

    2009-01-01

    S\\/MIME (Secure\\/Multipurpose Internet Mail Extensions) is a well-known standard for secure e-mail exchange. S\\/MIME builds its identity management on e-mail addresses, rather than real names. This fact may sometimes cause sending a signed e-mail with a bogus name on it. Moreover, header information of a signed e-mail message, such as subject and name, can be altered without affecting the verifiability

  13. Productivity, part 1: getting things done, using e-mail, scanners, reference managers, note-taking applications, and text expanders.

    PubMed

    Lackey, Amanda E; Moshiri, Mariam; Pandey, Tarun; Lall, Chandana; Lalwani, Neeraj; Bhargava, Puneet

    2014-05-01

    In an era of declining reimbursements and tightening of the job market, today's radiologists are forced to "make do with less." With the rollout of the Patient Protection and Affordable Care Act, commonly called "Obamacare," radiologists will be expected not only to interpret studies but to also take on many additional roles, adding a new layer of complexity to already demanding daily duties. These changes make it more important than ever to develop a personal workflow management system incorporating some of the most potent productivity tools. In this article, the authors discuss current productivity techniques and related software with the most potential to help radiologists keep up with the ever increasing demands on their time at the work place and help us lead more balanced lives. PMID:24656443

  14. Fax +41 61 306 12 34 E-Mail karger@karger.ch

    E-print Network

    Nizet, Victor

    Fax +41 61 306 12 34 E-Mail karger@karger.ch www.karger.com Research Article J Innate Immun DOI: 10 spectrum of hospital- and community-acquired in- fections [1, 2]. Clinical disease ranges from uncomplicat are recruited from the blood to the site of infection where they engul

  15. Public release date: 19-Feb-2005 [ Print Article | E-mail Article | Close Window

    E-print Network

    Hutchings, Jeffrey A.

    Public release date: 19-Feb-2005 [ Print Article | E-mail Article | Close Window ] Contact: Jessica as usual threatens future of fish - Scientists call on managers to incorporate new scientific understanding double whammy, researchers report that fishing pressure is causing fish to evolve to smaller sizes, just

  16. e-mail: {kimthun, yang}@cs.yonsei.ac.kr Neighbor Selection Methods Using

    E-print Network

    Yang, Sung-Bong

    Transactions on Information Systems, Vol.22, No.1, 2004. [7] G. Xue, C. Lin, and Q.E. Yang, "Scalable o , e-mail: {kimthun, yang}@cs.yonsei.ac.kr Neighbor Selection Methods Using Multi-Attribute Based Multi-Level Clustering Taek-Hun Kimo , Sung-Bong Yang Dept. of Computer Science, Yonsei University

  17. E-mail: hendrik-jan.veen@tuebingen.mpg.de Psychophysical Experiments on the Internet

    E-print Network

    E-mail: hendrik-jan.veen@tuebingen.mpg.de Psychophysical Experiments on the Internet Hendrik participated in one or more web-experiments. A comparison between the results of the anonymous Internet the anonymous Internet subjects (the main subject group). Members of the lab participating in web

  18. Not Wanted in the Inbox!: Evaluations of Unsolicited and Harassing E-Mail

    ERIC Educational Resources Information Center

    Khoo, Pek Ne; Senn, Charlene Y.

    2004-01-01

    This study was designed as a first step to explore sexual harassment in the electronic domain. One hundred six students read 10 e-mail messages ranging from jokes to spam to a sexual proposition from a stranger and rated them on an offensiveness evaluative scale. Participants also completed social desirability and attitudes toward sexual…

  19. Andrew Cotton-Clay Massachusetts Institute of Technology E-mail: acotton@math.berkeley.edu

    E-print Network

    Cotton-Clay, Andrew

    Andrew Cotton-Clay Massachusetts Institute of Technology E-mail: acotton: Gromov's Nonsqueezing Theorem · Advisor: Peter Kronheimer Publications · A. Cotton-Clay. A sharp bound on fixed points of area-preserving surface diffeo- morphisms. In preparation. · A. Cotton-Clay. Symplectic

  20. AISEC: an Artificial Immune System for E-mail Classification Andrew Secker

    E-print Network

    Timmis, Jon

    AISEC: an Artificial Immune System for E-mail Classification Andrew Secker Computing Laboratory-interesting material is increasing. Drawing analogies from the biological immune system, this paper presents an immune an immune-inspired approach we believe the final system will have the ability to dynamically determine

  1. Military E-mails sent to MIT LL in November and December 2007

    E-print Network

    Polz, Martin

    Military E-mails sent to MIT LL in November and December 2007 Classification: UNCLASSIFIED Joanne AP 96601 - 1701 #12;To MIT Lincoln Laboratory: Thanks so much for the package! I got it today want to thank you so much for sending the care package. It wonderful! I'm over whelmed with heart warm

  2. EP-MAC e-mail : jyoak@snu.ac.kr, sbahk@snu.ac.kr

    E-print Network

    Bahk, Saewoong

    EP-MAC *, e-mail : jyoak@snu.ac.kr, sbahk@snu.ac.kr Early Preamble MAC to reduce, Saewoong Bahk EECS & INMC, Seoul National University Abstract In MAC protocol for wireless sensor networks-cycled wireless sensor motes. In this paper we propose Early Preamble-MAC(EP-MAC) which enables to get enhanced

  3. DEPARTMENTOF GEOGRAPHY WESTERN MICHIGAN UNIVERSITY CURRENT FROM FALL 2013 NAME WIN E-MAIL

    E-print Network

    de Doncker, Elise

    /Transfer Course Grade 1000 World Ecological Problems 4 1050 Physical Geography 4 2050 Human Geography 3 3100DEPARTMENTOF GEOGRAPHY WESTERN MICHIGAN UNIVERSITY CURRENT FROM FALL 2013 NAME WIN E-MAIL TOURISM Courses: 3-4 courses. You may enroll for up to two regional geography courses. You select additional

  4. Exploring Culture from a Distance: A U.S./Israeli E-Mail Exchange Project.

    ERIC Educational Resources Information Center

    Nutta, Joyce W.; Spector-Cohen, Elana

    2002-01-01

    Explores the use of electronic mail to link native-English-speaking teachers and teacher candidates in one country with English-as-a-Foreign-Language students in the other. An average of 10 participants per semester have spent approximately 2 months leaning about each other's cultures through an e-mail exchange of ideas and views. (Author/VWL)

  5. Electronic bumper stickers: the content and interpersonal functions of messages attached to e-mail signatures

    Microsoft Academic Search

    Stephen A. Rains; Geoffrey R. Tumlin; Mark L. Knapp

    2009-01-01

    The two-phase study reported here examined the content and communication function served by electronic bumper stickers (EBSs). EBSs consist of the sayings that are included in an e-mail signature file following personal identifiers such as one's name, phone number, and postal address. In the first phase, 334 EBSs were gathered and content analyzed into one of five message categories. In

  6. Integrating the Web and e-mail into a push-pull strategy

    Microsoft Academic Search

    Mike Sands

    2003-01-01

    This paper looks at the potential for developing customer relationship strategies using the Internet (electronic customer relationship management) (ECRM) with particular relevance for SMEs. Its basis is in qualitative research and it attempts to integrate the two Internet technologies of the Web and e-mail into a push-pull strategy. Aspects of “control” of the message in ECRM are examined and in

  7. http://www.omega.com e-mail: info@omega.com

    E-print Network

    Gellman, Andrew J.

    http://www.omega.com e-mail: info@omega.com UserÃ?sGuide DP25-TC Programmable Digital Thermocouple Meter Shop on line at #12;It is the policy of OMEGA to comply with all worldwide safety and EMC/EMI regulations that apply. OMEGA is constantly pursuing certification of its products to the European New

  8. The Alzheimer List An e-mail based support & discussion group for

    E-print Network

    The Alzheimer List An e-mail based support & discussion group for family caregivers and health professionals The Alzheimer List is a free public service of the Alzheimer's Disease Research Center (ADRC) at Washington University in St. Louis, Missouri. Founded in 1994, the Alzheimer List is the oldest, ongoing e

  9. Fax: 425-936-7329 (USA) E-mail: askmsip@microsoft.com

    E-print Network

    Narasayya, Vivek

    Fax: 425-936-7329 (USA) E-mail: askmsip@microsoft.com One Microsoft Way Redmond, WA 98052 USA. Microsoft offers our on-line Manufacturers Marketplace. This site has become a desti- nation site for global retail brands looking for licensed suppliers of Microsoft hardware technologies. http://www.microsoft

  10. Decision Support Methodologies E-mail: rxq@cs.nott.ac.uk

    E-print Network

    Qu, Rong

    1 Decision Support Methodologies (G54DSM) Dr Rong Qu E-mail: rxq@cs.nott.ac.uk School of Computer Science Decision Support Systems & Examples #12;Dr Rong Qu G54DSM ­ Decision Making 2 of 25 Decision of analytical decision models and access to databases, in order to support a decision maker in making decisions

  11. Decision Support Methodologies E-mail: rxq@cs.nott.ac.uk

    E-print Network

    Qu, Rong

    1 Decision Support Methodologies (G54DSM) Dr Rong Qu E-mail: rxq@cs.nott.ac.uk School of Computer, sometimes difficult to access Quick decisions Managers need tools and techniques to support effective decision making Computerised support extensively used in modern business and management Generating

  12. E-Mail Counseling: Skills for Maximum Impact. ERIC/CASS Digest.

    ERIC Educational Resources Information Center

    Collie, Kate; Mitchell, Dan; Murphy, Lawrence

    Online counseling is a growing means of interaction for counselors and clients. This paper presents an interview among three counselors who simultaneously describe and demonstrate skills they use in their e-mail counseling practices. The interviewer and the interviewees all have been involved in the development of online counseling. The skills…

  13. Deaf and hard of hearing Americans' instant messaging and e-mail use: a national survey.

    PubMed

    Bowe, Frank G

    2002-10-01

    An online survey of 884 deaf and hard of hearing adults asked about their current and past use of communication technologies, notably TTY, telecommunications relay services, e-mail, and instant messaging (IM). Results showed that respondents were using e-mail and IM far more than TTY and relay services. The study participants virtually all had e-mail and IM at home. In fact, about one quarter had a high-speed ("broadband") connection at home. While the vast majority also had and used e-mail at work, just 1 in 3 had IM at his or her place of employment. The findings have several implications. Most important for educators is that strong reading and writing skills are essential if adults who are deaf or hard of hearing are to take advantage of today's communications technologies. Another conclusion is that some workers who are deaf or hard of hearing appear to face discrimination in employment because office policies forbid the use of a highly effective reasonable accommodation, instant messaging. PMID:12592800

  14. Ellie Abrons, M.Arch., Lecturer E-mail: eabrons@umich.edu

    E-print Network

    Kamat, Vineet R.

    Professor Contemporary forms of urbanism and architecture in the rapid urbanization in China and its effects Arquero de Alarcón, M.L.A., Assistant Professor Landscape and urbanism, and issues of interpretation/criticism, architectural history E-mail: cbconsta@umich.edu Milton S.F. Curry, M.Arch., Associate Professor Urbanization

  15. E-mail Communities--A Story of Collaboration between Students in Australia and Indonesia.

    ERIC Educational Resources Information Center

    Lelong, Peter; Fearnley-Sander, Mary

    1999-01-01

    Describes two projects: the first linked teacher-education students in Australia and Indonesia through e-mail and then grew into a link between primary students; the second project was a prize-winning publication by the primary students on the Internet. Gives a list of different materials and guidelines for teachers. (CMK)

  16. L. Vu-Quoc1 e-mail: vu-quoc@ufl.edu

    E-print Network

    Vu-Quoc, Loc

    L. Vu-Quoc1 Professor, e-mail: vu-quoc@ufl.edu Mem. ASME X. Zhang2 Graduate Research Assistant L positions and velocities see Cundall and Strack 1 and Vu-Quoc, Zhang, and Walton 2 . The particle- particle recently, Vu-Quoc and Lesburg 7 presents extensive FE validation of the theories of Hertz and Mindlin

  17. D-41844Wegberg e-mail: ivanhoe49152@yahoo.com

    E-print Network

    Sigmund, Karl

    Rurweg 3 D-41844Wegberg Germany e-mail: ivanhoe49152@yahoo.com Kurt GOdel.Das Album-The Album Karl in malice. Such being the case, Kurt GOdel. The Album comes as a welcome addition to the literature on G6del Sigmund, John Dawson, and Kurt Mfihlberger, with a Foreword by Hans Magnus Enzensberger WIESBADEN, VIEWEG

  18. Corresponding author: Eduardo R. Miranda E-mail: eduardo.miranda@plymouth.ac.uk

    E-print Network

    Miranda, Eduardo Reck

    Corresponding author: Eduardo R. Miranda E-mail: eduardo.miranda@plymouth.ac.uk Journal of Bionic of England, Bristol, BS16 1QY, UK Abstract This paper introduces a novel application of bionic engineering: a bionic musical instrument using Physarum polycepha- lum. Physarum polycephalum is a huge single cell

  19. Managing irrelevant knowledge in CBR models for unsolicited e-mail classification q

    Microsoft Academic Search

    J. R. Mendez; D. Glez-Pena; F. Fdez-Riverola; F. Di ´; J. M. Corchado

    The problem of unsolicited e-mail has been increasing during recent years. Fortunately, some advanced technologies have been suc- cessfully applied to spam filtering, achieving promising results. Recently, we have introduced SPAMHUNTING, a successful spam filter able to address the concept drift problem by combining a relevant term identification technique with an evolving sliding window strategy. Several successful spam filtering techniques

  20. e-mail: elperin@menix.bgu.ac.il Department of Mechanical Engineering,

    E-print Network

    Elperin, Tov

    in electronics and for solar cells production, processing of amor- phous semiconductors. Up to the middleT. Elperin e-mail: elperin@menix.bgu.ac.il G. Rudin Department of Mechanical Engineering the cracked wafer into chips along the microcrack contour by applying small bending stresses. The emphasis

  1. E-Mail Alerts and RSS Feeds for Distance Learning Administrators

    ERIC Educational Resources Information Center

    Washburn, Allyson; Howell, Scott L.

    2008-01-01

    This article describes how E-Mail Alerts and RSS feeds can be helpful tools for busy distance education administrators by helping them to efficiently sort through the research and news information that is now available. These tools and their respective filters and aggregators make it possible for busy distance education administrators to stay…

  2. Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation Jussi Kangasharju

    E-print Network

    Kangasharju, Jussi

    Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation Jussi Kangasharju to rely on a single server and boosts the resilience of email against any kinds of attacks. Our. If this mail server is down ­ due to, for example, inadvertent faults, disasters, physical or cyber attacks

  3. *Corresponding author. E-mail: kareem@navier.ce.nd.edu. Journal of Wind Engineering

    E-print Network

    Kareem, Ahsan

    *Corresponding author. E-mail: kareem@navier.ce.nd.edu. Journal of Wind Engineering and Industrial Aerodynamics 77&78 (1998) 725--739 Aerodynamics of Nanjing Tower: A case study Ahsan Kareem *, Scott Kabat Numerical simulations and experimental measurements of the aerodynamics of the Nanjing Tower have been

  4. Hotels e-mail for reservations & website Phone number Single room

    E-print Network

    Thévenaz, Jacques

    Hotels e-mail for reservations & website Phone number Single room (SFr) Double room (SFr) Including Tax not yet communicated. Should be less than SFr 5.- to add per day and per person Hôtel Aulac 4, place de la Navigation 1000 Lausanne 6 aulac@cdmgroup.ch www.aulac.ch +41 (0)21.613.15.00 SFr 130.- SFr

  5. * Corresponding author. E-mail address: dengx@physics.utoledo.edu (X. Deng)

    E-print Network

    Deng, Xunming

    -SiGe related materials and the development and improvement of novel deposition tech- niques. During the past* Corresponding author. E-mail address: dengx@physics.utoledo.edu (X. Deng) Solar Energy Materials & Solar Cells 62 (2000) 89}95 Amorphous silicon and silicon germanium materials for high-e$ciency triple

  6. Shared Protection Routing Algorithm for Optical Network Shengli Yuan (e-mail: syuan@utdallas.edu)

    E-print Network

    Jue, Jason P.

    1 Shared Protection Routing Algorithm for Optical Network Shengli Yuan (e-mail: syuan, shared protection provides the same level of protection against single path failures as dedicated protection, with potentially higher network utilization. This paper lists the requirements of path protection

  7. Public release date: 9-Sep-2009 [ Print | E-mail | Share ] [ Close Window

    E-print Network

    Wenseleers, Tom

    Benorman@wiley.com 44-124-377-0375 Wiley-Blackwell New research discovers worker bees in 'reproductive class war' with queen Bee colonies are well known for high levels of cooperation, but new research to the other." ### [ Print | E-mail | Share ] [ Close Window ] Page 2 of 2New research discovers worker bees

  8. e-mail: pc2052@columbia.edu Y. Lawrence Yao

    E-print Network

    Yao, Y. Lawrence

    or precisely controllable. The objective of the National Institute of Standards and Technology sponsored in the National Institute of Standards and Technology NIST - sponsored project "Laser Forming of ComplexPeng Cheng e-mail: pc2052@columbia.edu Yajun Fan Jie Zhang Y. Lawrence Yao Department of Mechanical

  9. Cross-Cultural Team Teaching: E-mail for Literary Analysis.

    ERIC Educational Resources Information Center

    Schwartz, Helen J.

    Using electronic mail (E-mail), the instructor of a master's level drama class at a Finnish university and an introductory literature instructor at Indiana University-Perdue University at Indianapolis communicated between themselves and served as intermediaries for communication between two groups of their students. While instructional levels and…

  10. Sample E-mail Scripts for Networking The University of Georgia Career Center

    E-print Network

    Arnold, Jonathan

    . Thanks in advance for your help. (Your Name) Your Phone Number Your e-mail address Forwarding a resume her resume in front of some of the best and brightest I know, I am attaching it here for your review information is at the top of the resume, but please let me know if you have any questions. Regards, Name

  11. e-mail: wtong@smu.edu Department of Mechanical Engineering,

    E-print Network

    Tong, Wei

    Wei Tong1 e-mail: wtong@smu.edu Nian Zhang Department of Mechanical Engineering, Yale University characteristics of serrated plastic flow or the so-called Portevin-Le Chatelier (PLC) deformation bands loading conditions (machine stiffness and crosshead speed), and mechanical polishing had an observable

  12. Harmonic Analysis (I) e-mail fang@math.ncku.edu.tw

    E-print Network

    Fang, Yung-Fu

    99 2 () Harmonic Analysis (I) L166010 3 e-mail fang@math.ncku.edu.tw 275 Algebras An Introduction to Harmonic Analysis( Chapter 1 - 8) by Yitzhak Katznelson Real Analysis transform on the line and the related Fourier analysis We expect to grab the basic idea and concept

  13. Fax +41 61 306 12 34 E-Mail karger@karger.ch

    E-print Network

    Kocher, Thomas D.

    Fax +41 61 306 12 34 E-Mail karger@karger.ch www.karger.com Original Article Cytogenet Genome Res Chromosomal rearrangements Cichlidae Genome evolution Molecular cytogenetics Abstract Cichlid fishes have been- pendently in Oreochromis and Tilapia genera, and led to the reduced chromosome number detected in O

  14. Android Diabetes Log Book E-mail: kongkamol@kku.ac.th

    E-print Network

    Runapongsa, Kanda

    Android Diabetes Log Book 1 2 3 1 . . 40002 2, 3 . . 40002 E-mail: kongkamol@kku.ac.th Abstract Diabetes is a chronic disease, of which the patients have to continually monitor their health conditions. Keywords: android application, diabetes 4.07 5.00 , 1. 285 . . 2573 435 . . 2552 558,156 7,019 [1] 15 7% [2

  15. e-mail: dr.mohsen.akbari@gmail.com Biomedical Engineering Department,

    E-print Network

    Bahrami, Majid

    M. Akbari1 e-mail: dr.mohsen.akbari@gmail.com A. Tamayol Biomedical Engineering Department, McGill University, Montreal, QC, H3A 1A4, Canada; Center for Biomedical Engineering, Department of Medicine, Brigham for a wide variety of cross-sectional shapes. The suggested model can be used for the design and optimization

  16. Exploring Students' Use of E-Mail for Out-of-Class Communication: Frequency, Satisfaction, and Learning Self-Efficacy

    ERIC Educational Resources Information Center

    Zhao, Q.; Ahn, S.; Meyers, R. A.; Timmerman, C. E.; Fonner, K. L.

    2012-01-01

    The authors assessed students' use of e-mail for out-of-class communication (OCC) and its impact on satisfaction and learning self-efficacy. Findings showed that students and instructors use e-mail frequently for OCC, and frequency of use is positively associated with student satisfaction with e-mail as an OCC medium. Moreover, the content of…

  17. The Messages They Send: E-Mail Use by Adolescents with and without a History of Specific Language Impairment (SLI)

    ERIC Educational Resources Information Center

    Conti-Ramsden, Gina; Durkin, Kevin; Walker, Allan J.

    2012-01-01

    Background: Contemporary adolescents use e-mail for a variety of purposes, including peer communication and education. Research into these uses has focused on typically developing individuals; much less is known about the use of e-mail by exceptional youth. Aims: The present study examined the structure and form of e-mail messages sent by…

  18. TEAM REGISTRATION FORM In county please complete this form and send to the address/fax/e-mail

    E-print Network

    MKT-3131-F TEAM REGISTRATION FORM In county please complete this form and send to the address/fax/e-mail below by (date) to finalize your enrollment in Walk Across Texas! Name: Address: Fax: E-mail: Team Name: Team Captain's Name: Captain's Phone: Captain's Address: Captain's E-mail Address: Walking teams have 7

  19. New Software Product Feature Identification: An Analysis of E-mail User Characteristics and Functional Requirements

    NASA Astrophysics Data System (ADS)

    Sofuoglu, Ecehan; Basoglu, Nuri; Daim, Tugrul

    Improving the product development process is becoming more important as business environment gets more competitive. This study aims at understanding and characterizing potential users of a software product through idea sharing of users. It also targets to create a new product concept through understanding the common features users prefer most. During this product conceptualization stage, the customer ideas are captured through use of a questionnaire. The target users, priority of product functions and features are investigated and the details of the existing e-mail systems as well as of the ideal e-mail systems are identified. Some of the key results included users with demographic differences having different usage and requirements characteristics, expectations of females being higher than those of males and the software functions used and characteristics required being different for those with different job categories or educational backgrounds.

  20. Facilitated lipid management using interactive e-mail: preliminary results of a randomized controlled trial.

    PubMed

    Lester, William T; Grant, Richard; Barnett, G Octo; Chueh, Henry

    2004-01-01

    We describe the design and implementation of a clinical decision support system for ambulatory hyperlipidemia management. Despite readily available and evidence-based guidelines, cholesterol control remains persistently sub-optimal in clinical practice. "FastTrack" is an integrated, multi-faceted informatics tool to reduce barriers to effective cholesterol management by proactively integrating pertinent clinical information, evidence-based decision support and a simple means to act via a single FastTrack e-mail. We tested the intervention in a randomized, controlled trial involving 14 physicians and 276 patients. In an interim analysis, we found that physicians on average were able to review and act upon 9 patient e-mails in less than 15 minutes. Significantly more intervention patients were initiated on a statin therapy or had their dose increased (15.3% vs. 2.3%, p < 0.001). Impact of the intervention on LDL levels will be assessed at trial completion. PMID:15360809

  1. Cut as a querying unit for WWW, Netnews, and e-mail

    Microsoft Academic Search

    Keishi Tajima; Yoshiaki Mizuuchi; Masatsugu Kitagawa; Katsumi Tanaka

    1998-01-01

    In this paper, we propose a query framework for hypertextdata in general, and for WWW pages, Netnews articles,and e-mails in particular. In existing query toolsfor hypertext data, such as search engines for WWWor intelligent news\\/mail readers, data units in query aretypically individual nodes. In actual hypertext data,however, one topic is often described over a series of connectednodes, and therefore, the

  2. Adaptive e-mails intention finding system based on words social networks

    Microsoft Academic Search

    Ching-Hao Mao; Hahn-Ming Lee; Che-Fu Yeh

    2011-01-01

    Although many anti-spam techniques have been proposed till date, a foolproof solution for overcoming spam has not been found yet. Spammers still spread spam by using invariant intentions such as advertising and phishing; these intentions are difficult to detect using signature-based or content-based spam filters. In this study, we have proposed an adaptive e-mail intention finding system based on the

  3. Managing irrelevant knowledge in CBR models for unsolicited e-mail classification

    Microsoft Academic Search

    José Ramon Méndez; Daniel Glez-peña; Florentino Fdez-riverola; Fernando Díaz; Juan M. Corchado

    2009-01-01

    The problem of unsolicited e-mail has been increasing during recent years. Fortunately, some advanced technologies have been successfully applied to spam filtering, achieving promising results. Recently, we have introduced SpamHunting, a successful spam filter able to address the concept drift problem by combining a relevant term identification technique with an evolving sliding window strategy.Several successful spam filtering techniques use continuous

  4. GETTING THE MOST OUT OF YOUR IN-BOX: USING E-MAIL EFFECTIVELY AND EFFICIENTLY

    E-print Network

    Edwards, Paul N.

    easily contact you if they need to. --More-- #12;2 8. Don't write in all capital letters. It looks like you're yelling. 9. Don't write an e-mail in anger. Calm down and then talk to the person with whom you topic, but write on another topic, change your outgoing subject line to match the new topic. 12. Use

  5. Comparison of e-mail communication skills among first- and fourth-year dental students.

    PubMed

    Oakley, Marnie; Horvath, Zsuzsa; Weinberg, Seth M; Bhatt, Jaya; Spallek, Heiko

    2013-11-01

    As e-mail and other forms of electronic communication increase in popularity, it is important for dental schools to consider a curriculum that prepares their graduates to understand and apply effective electronic communication strategies to their patients. Reflecting this shift in communication behavior, the American Medical Association has developed specific e-mail communication guidelines. Some behavioral examples in these guidelines include protecting patients' protected health information (PHI), ensuring proper record keeping, and using professional, courteous, and understandable language. In this study, a sample of first- and fourth-year dental students (n=160) at the University of Pittsburgh School of Dental Medicine participated in an assignment assessing their patient-provider e-mail communication skills. A rubric was used to evaluate and compare the data between dental student classes. The results reveal a generalized lack of compliance with several of these guidelines by both classes (e.g., failure to protect PHI), despite efforts to expose students to these concepts in the curriculum. In an effort to train emerging dentists to function in a rapidly changing technological environment, these findings suggest a need for growth and development of curricula and perhaps guidelines/recommendations for behavioral competencies regarding dental students' use of electronic communication in the patient care environment. PMID:24192406

  6. Michael P. Frank ASCII-controls-v2.2.doc 9/15/06 Page 1 of 9

    E-print Network

    Frank, Michael P.

    Michael P. Frank ASCII-controls-v2.2.doc 9/15/06 Page 1 of 9 Discussion of the Intended Meanings-controls-v2.2.doc 9/15/06 Page 2 of 9 x/y Hex Dec Oct Bin Ctl Syms Abbr Name Type Sec 0/2 02 2 002 000 0010 ^B

  7. Siena uses Postini to manage junk and virus-infected email. Most junk e-mail is intercepted before it gets into your inbox. However, sometime e-mail you want may be quarantined in error. The

    E-print Network

    Siena uses Postini to manage junk and virus-infected email. Most junk e-mail is intercepted before it gets into your inbox. However, sometime e-mail you want may be quarantined in error. The Postini Center. What Is Message Center? To prevent unwanted messages from reaching your email inbox, your email

  8. Standardization of teleradiology using Dicom e-mail: recommendations of the German Radiology Society.

    PubMed

    Weisser, G; Walz, M; Ruggiero, S; Kämmerer, M; Schröter, A; Runa, A; Mildenberger, P; Engelmann, U

    2006-03-01

    Until recently there has been no standard for an interoperable and manufacturer-independent protocol for secure teleradiology connections. This was one of the main reasons for the limited use of teleradiology in Germany. Various teleradiology solutions have been developed in the past, but the vast majority have not been interoperable. Therefore an ad hoc teleradiology connection was impossible even between partners who were already equipped with teleradiology workstations. Based on the evaluation of vendor-independent protocols in recent years the IT Working Group (AGIT) of the German Radiology Society set up an initiative to standardize basic teleradiology. An e-mail based solution using the Dicom standard for e-mail attachments with additional encryption according to the OpenPGP standard was found to be the common denominator. This protocol is easy to implement and safe for personalized patient data and fulfills the legal requirements for teleradiology in Germany and other countries. The first version of the recommendation was presented at the 85th German Radiology Convention in 2004. Eight commercial and three open-source implementations of the protocol are currently available; the protocol is in daily use in over 50 hospitals and institutions. PMID:16228213

  9. A Comparative Analysis of E-Mail and Face-to-Face Communication in an Educational Environment

    ERIC Educational Resources Information Center

    Lightfoot, Jay M.

    2006-01-01

    Electronic mail (e-mail) is an extremely important medium for Internet-based education. Due to its unique characteristics, there is reason to be concerned that students do not put appropriate care into writing messages that are sent via e-mail. This has significant implications for the effectiveness of online learning environments. This paper…

  10. Evaluating Tandem Language Learning by E-Mail: Report on a Bilateral Project. CLCS Occasional Paper No. 55.

    ERIC Educational Resources Information Center

    Little, David; Ushioda, Ema; Appel, Marie Christine; Moran, John; O'Rourke, Breffni; Schwienhorst, Klaus

    The report details the Irish portion of an experiment in tandem language learning by electronic mail (e-mail). The partners were Trinity College, Dublin (Ireland) and Ruhr University, Bochum (Germany), funded by the European Union within the International E-Mail Tandem Network as part of a two-year project. Tandem language learning is a form of…

  11. Mitigating E-Mail Requests in Teenagers' First and Second Language Academic Cyber-Consultation

    ERIC Educational Resources Information Center

    Alcón Soler, Eva

    2013-01-01

    The study analyses teenagers' e-mail requests during academic cyber-consultation, exploring how the performance of request modifiers is influenced by participants' perceptions of the degree of imposition of the speech act and social distance with the recipient. A total of 295 e-mail requests, 145 produced by British English speakers…

  12. Can Messages Make a Difference? The Association between E-Mail Messages and Health Outcomes in Diabetes Patients

    ERIC Educational Resources Information Center

    Turner, Jeanine Warisse; Robinson, James D.; Tian, Yan; Neustadtl, Alan; Angelus, Pam; Russell, Marie; Mun, Seong K.; Levine, Betty

    2013-01-01

    This investigation examined the impact of social support messages on patient health outcomes. Forty-one American Indian, Alaska Native, and Native Hawaiian patients received a total of 618 e-mail messages from their healthcare provider (HCP). The e-mail messages were divided into 3,565 message units and coded for instances of emotional social…

  13. Responsiveness to a Prospective Student E-Mail Inquiry by Community Colleges in the Nine Mega-States

    ERIC Educational Resources Information Center

    Shadinger, David A.

    2014-01-01

    This quantitative study investigated e-mail responsiveness by community colleges in the nine mega-states to an inquiry from a prospective student. Noel-Levitz (2006b) reported that prospective students want to receive an e-mail with information about an institution prior to applying for admission. Specifically, high school juniors and seniors want…

  14. Predicted Outcome Value of E-Mail Communication: Factors that Foster Professional Relational Development between Students and Teachers

    ERIC Educational Resources Information Center

    Young, Stacy; Kelsey, Dawn; Lancaster, Alexander

    2011-01-01

    Using predicted outcome value theory as a guide, this study investigated the link between e-mail correspondence as a form of computer mediated extra class communication and how it may shape students' desire to foster student-teacher relational development. The findings revealed that when students believe their teacher e-mails the class frequently,…

  15. XML/VOTable and Simple ASCII Tabular Output from NED with Sample Applications

    NASA Astrophysics Data System (ADS)

    Schmitz, M.; Pevunova, O.; Mazzarella, J.; Good, J.; Berriman, B.; Madore, B.; NED Team

    2005-12-01

    The NASA/IPAC Extragalactic Database (NED) provides data and cross-identifications for over 8 million objects fused from thousands of survey catalogs and journal articles. The data cover all frequencies from radio through gamma rays and include positions, redshifts, photometry and spectral energy distributions (SEDs), sizes, and images. NED services have traditionally supplied data in HTML format for connections from Web browsers, and a custom ASCII data structure for connections by remote computer programs written in C. We demonstrate new services that provide responses from NED queries in XML documents compliant with the international virtual observatory VOTable protocol, as well as simple tab-separated or comma-separated values (CSV). The NED services that support the new tabular output include By Name, Near Name and Near Position (cone searches), All-Sky searches based on object parameters (survey names, cross-IDs, redshifts, flux densities), and queries for images, photometry/SEDs, redshifts, positions, and diameters. The VOTable services have been integrated into the NVO registry, and they are also available directly from NED's Web interface (http://nedwww.ipac.caltech.edu). This development greatly simplifies the integration of data from NED into visualization and analysis packages, scripts, and other applications. We illustrate an example of importing a NED SED into Excel, as well as plotting and comparing SEDs using the VOPlot Java applet. NED is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration. The XML/VOTable portion of this work was funded by the US National Virtual Observatory, which is sponsored by the National Science Foundation. We also acknowledge assistance from the NVO Technical Working Group.

  16. Unsolicited commercial e?mail, the internet and the first amendment: Another free speech showdown in cyberspace?

    Microsoft Academic Search

    Jan H. Samoriski

    1999-01-01

    This study examines and analyzes efforts to deal with unsolicited commercial e?mail or “spam.” Using the Central Hudson test for commercial speech as a benchmark, various legislative proposals to address the spam problem are categorized and evaluated. With legal and technical solutions at hand, the author argues that source?based, content restrictions on unsolicited commercial e?mail are potentially unconstitutional. The impact

  17. The lost e-mail method: Milgram’s lost-letter technique in the age of the Internet

    Microsoft Academic Search

    Steven E. Stern; Jon E. Faber

    1997-01-01

    We examined Milgram’s (1977) lost-letter technique using e-mail. In the first experiment, 79 college faculty received mock\\u000a lost e-mail messages. Nineteen percent of those who received the messages responded, in all cases by returning the message\\u000a to the “sender” instead of forwarding it to the “recipient.” In the second study, attitudes toward presidential candidate\\u000a Ross Perot were examined by sending

  18. The CAN-SPAM Act: New rules for sending commercial e-mail messages and implications for the sales force

    Microsoft Academic Search

    Irvine Clarke; Theresa B. Flaherty; Michael T. Zugelder

    2005-01-01

    The CAN-SPAM (Controlling the Assault of Non-Solicited Pornography And Marketing) Act significantly modifies the legal understanding of spam, offers important protections for consumers and, at the same time, holds the company primarily responsible for e-mail sent by salespeople on its behalf. This new law prohibits deceptive headings, using e-mail addresses obtained illegally, requires senders to have a working unsubscribe system,

  19. A Simple E-Mail Mechanism To Enhance Reflection, Independence, and Communication in Young Researchers

    PubMed Central

    Lom, Barbara

    2006-01-01

    Providing undergraduates with mentored research experiences is a critical component of contemporary undergraduate science education. Although the benefits of undergraduate research experiences are apparent, the methods for mentoring young scientists as they first begin navigating the research lab environment are reinvented in labs all over the world. Students come to research labs with varied skills, motivations, needs, and dispositions, placing each student and mentor in a unique relationship. How can we help students become aware of their own intellectual progress? How can we encourage our students to take initial steps toward independent investigation? When do we need to let setbacks happen? We have developed a simple mechanism to address these common problems. Each week, students in our labs answer a series of five questions by e-mail that improve lab communication and help students develop into mature scientists without taxing an instructor's already busy schedule. Our observations, experiences, and student feedback indicate that this approach is a useful mechanism to help faculty who mentor young scientists in the research lab. PMID:17146038

  20. "While you still think, I already type": experienced social power reduces deliberation during e-mail communication.

    PubMed

    Scholl, Annika; Sassenberg, Kai

    2014-11-01

    E-mail allows individuals to deliberate on their communication before sending it off. For instance, communication partners can easily take their time to ponder how best to frame a request before they actually send a message. Individuals at times strategically exploit this opportunity to deliberate in order to tailor messages to their communication partner, such as when communicating with a relatively more powerful person. As social power reduces concerns about impression management, we predicted that individuals deliberate more while composing e-mail messages under low (vs. high) power. This assumption was tested with well-established power priming. As such, we expected that experienced power in one context would diminish deliberation times during a subsequent e-mail communication. An experiment manipulating the experience of (low vs. high) power and measuring deliberation times during e-mail composition supported this hypothesis. The findings thus indicate how social power alters deliberation times. More importantly, the results show that individuals not only strategically deliberate during e-mail communication in line with their current situation, but also in line with their social standing in a previous situation (here, their experience of power). PMID:25286277

  1. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    PubMed Central

    2012-01-01

    Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18?years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6?±?17.1, of whom 110 were women (55%). Ninety-three (46.5%) responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5%) would not object to obtaining it. Of the 171 patients (85.5%) who had e-mail addresses, 25 (14.6%) said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7%) said they would not object to getting it, and 61 (35.7%) were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow of clinical practice. PMID:22929801

  2. EFL Students' Vocabulary Learning in NS-NNS E-Mail Interactions: Do They Learn New Words by Imitation?

    ERIC Educational Resources Information Center

    Sasaki, Akihiko; Takeuchi, Osamu

    2010-01-01

    The present study investigated Japanese students' EFL vocabulary development through e-mail interactions with a native English speaker (NS), with primary focus on students' imitation of new words. According to sociocultural theory, learners can internalize new linguistic knowledge by imitating an expert's expressions to create his/her own…

  3. Assessing the Factors Affecting the Amount of E-Mail Spam Delivery in a Public School District

    ERIC Educational Resources Information Center

    Yasenchock, David A.

    2013-01-01

    Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…

  4. Linking Tacit Knowledge in the Pediatric Pain e-Mail Archives and Explicit Knowledge in PubMed

    E-print Network

    Abidi, Syed Sibte Raza

    Linking Tacit Knowledge in the Pediatric Pain e-Mail Archives and Explicit Knowledge in Pub and linked directly to the explicit knowledge found in PubMed. The Pediatric Pain Mailing List (PPML of pediatric pain has been recognized widely in the past fifteen years. Although knowledge about pediatric pain

  5. Accessing Tacit Knowledge in the Pediatric Pain e-Mail Archives Qiufen Qi, Qigang Gao and Michael Shepherd

    E-print Network

    Shepherd, Mike

    Accessing Tacit Knowledge in the Pediatric Pain e-Mail Archives Qiufen Qi, Qigang Gao and Michael, NS, Canada allen.finley@dal.ca Abstract The Pediatric Pain Mailing List (PPML) is an international hierarchically such that the PPML archives can be browsed easily. 1. Introduction The existence of pediatric pain

  6. Personal Web Archive: E-mail: waka@iplab.cs.tsukuba.ac.jp, {shizuki,jiro}@cs.tsukuba.ac.jp

    E-print Network

    Tanaka, Jiro

    Personal Web Archive: Web E-mail: waka@iplab.cs.tsukuba.ac.jp, {shizuki,jiro}@cs.tsukuba.ac.jp Web Web Web Web Web Web Personal Web Archive Personal Web Archive: Support System for Browsing the Versions of Web Page Ryota WAKAMATSU Buntarou SHIZUKI Jiro TANAKA Graduate School of Systems

  7. LIMNOLOGY Biology 4470 / 5470 Fall 2006 Dr. Alan Groeger (E-mail ag11@txstate.edu)

    E-print Network

    Aspbury, Andrea S. - Department of Biology, Texas State University

    LIMNOLOGY Biology 4470 / 5470 Fall 2006 Dr. Alan Groeger (E-mail ag11@txstate.edu) OFFICE: Room 262 advantage of my office hours for help in limnology- if my office hours are inconvenient, other times may assigned. COURSE DESCRIPTION: Limnology is the study of inland waters: their physical, chemical, geological

  8. Analysis of E-Mail Produced by Middle School Students with Disabilities Using Accessible Interfaces: An Exploratory Study

    ERIC Educational Resources Information Center

    Sohlberg, McKay Moore; Todis, Bonnie; Fickas, Stephen; Ehlhardt, Laurie

    2011-01-01

    The goal of this exploratory study was to investigate electronic communication as a potential method to enhance social communication in a range of students with disabilities. This study investigated the usability of an adapted e-mail interface, TeenMail, for 11 middle school students with significant learning and communication impairments who…

  9. Setting up E-mail on Outlook 2007 with Viterbi Exchange 2007 July 26, 2010 Page 1 of 10

    E-print Network

    Zhou, Chongwu

    2007 July 26, 2010 Page 3 of 10 Figure 3: Bypass the Auto Account Setup 4. Select the check box on the "Exchange Proxy Settings..." button #12;Setting up E-mail on Outlook 2007 with Viterbi Exchange 2007 July 26, 2010 Page 9 of 10 Figure 8: Exchange Proxy Settings window d. Under Connections settings, in the first

  10. e-mail : neojesus@cs.yonsei.ac.kr Load Balancing Considering Object Accesses in P2P

    E-print Network

    Yang, Sung-Bong

    1451 DHT P2P , , e-mail : neojesus@cs.yonsei.ac.kr Load Balancing Considering Object Accesses in P2 Systems," Proc. IEEE INFOCOM, Vol.4, pp. 2253-2262, 2004 [5] J.Byer, J.Considine, M.Mitzenmacher, "Simple systems," IEEE Transactions on Parallel and Distributed Systems, volume 16, Issue 4, pp.349-361, 2005 #12;

  11. TEL 075-753-2233 E-MAIL weeks@mail2.adm.kyoto-u.ac.jp

    E-print Network

    Takada, Shoji

    @city.shunan.lg.jp http://www.city.shunan.lg.jp/index.jsp http://fserc.kyoto-u.ac.jp/toku/ 80 SHIGA50 10/21 13 30 16 30 300 11/3 9 00 16 00 KUMAMOTO 5280 TEL 0967-67-0022 E-MAIL web-admin@aso.vgs.kyoto-u.ac.jp http://www

  12. 1Sperm fate and function in reproductive isolation in Drosophila Corresponding author E-mail: tmarkow@arl.arizona.edu

    E-print Network

    Markow, Therese

    of the genus Drosophila provide an unusually attractive model system for studies of the reproductive isolating1Sperm fate and function in reproductive isolation in Drosophila Corresponding author E-mail: tmarkow@arl.arizona.edu Sperm fate and function in reproductive isolation in Drosophila Therese Ann Markow

  13. The Use of E-Mail as a Tool To Enhance Second Language Education Programs: An Example from a Core French Classroom.

    ERIC Educational Resources Information Center

    Lawrence, Geoff

    2002-01-01

    Outlines reasons why electronic mail, and specifically e-mail exchanges, are valuable tools for promoting authentic target language interaction in the second language (L2) classroom. Research examining the use of e-mail exchanges on the L2 learning process is outlined, followed by one specific example of an e-mail exchange in a secondary core…

  14. Activating your McGill E-mail address Before you start you need to know your 9 digit McGill student number.

    E-print Network

    Kambhampati, Patanjali

    Activating your McGill E-mail address Before you start you need. The procedure for activating your Minerva account and McGill e-mail address. Set the password for your e-mail address. (This password will be different

  15. "E-mail makes my job so much more work," a colleague said recently. I couldn't believe it. E-

    E-print Network

    Kay, David G.

    spam by sending from their on- campus e-mail accounts and choosing subject lines that stand out from a course-wide address for e-mail questions, with messages to that address going to the entire teaching, Don't send me questions like this Responding Effectively to Student E-mail: Nine Tips David G. Kay

  16. Chat, E-Mail, Web, and Chat Room Slang and Acronyms

    MedlinePLUS

    ... Web, and Chat Room Slang and Acronyms Article Body If you look at your teens’ IMs or text messages, they can be perplexing— part English, part foreign language, part alien. For help, check out this list ...

  17. E-Mail and Word Processing in the ESL Classroom: How the Medium Affects the Message.

    ERIC Educational Resources Information Center

    Biesenbach-Lucas, Sigrun; Weasenforth, Donald

    2001-01-01

    Examines whether electronic mail writing will improve academic writing abilities. Nonnative students in an intermediate pre-academic English-as-a-Second-Language course responded to writing prompts using electronic mail and word processing. Their writing was examined for differences in uses of cohesive features, length of text produced in each…

  18. Detecting Action-Items in E-mail Paul N. Bennett

    E-print Network

    Carbonell, Jaime

    Meetings (Break for Lunch) + 2:00 p.m. Sales Pitch To prepare, I need each of your parts body, typical text categorization (TC) merely assigns a topic label to the entire message -- whether on the part of the receiver. Whereas TC by topic [5, 6, 9], TDT [1], and even genre- classification [7] work

  19. CHEM 411. Intermed. Inorganic Chem. (MWF 2-2:50 Eng A. 210) Bakul Dave. Office: Neckers 316. Hours: Open door policy (or by appointment). phone: 424-CHEM-411. e-mail: dave@chem.siu.edu

    E-print Network

    Nickrent, Daniel L.

    CHEM 411. Intermed. Inorganic Chem. (MWF 2-2:50 Eng A. 210) Bakul Dave. Office: Neckers 316. Hours: Open door policy (or by appointment). phone: 424-CHEM-411. e-mail: dave@chem.siu.edu Text: Inorganic under any circumstances that are missed due to not being present at the time regardless of the reason

  20. Modul Prfungsberechtigte Raum Telefon e-mail Lineare Algebra Bley MA518 78846 bley@math.tu-berlin.de

    E-print Network

    Nabben, Reinhard

    1 Modul Prüfungsberechtigte Raum Telefon e-mail Lineare Algebra Bley MA518 78846 bley@math.tu-berlin.de Holtz MA417 29295 holtz@math-berlin.de Knipping MA576 29782 knipping@math.tu-berlin.de Liesen MA378 29295 liesen@math.tu-berlin.de Nabben MA372 29291 nabben@math.tu-berlin.de Penn-Karras MA825 23760

  1. Can I get pregnant from oral sex? Sexual health misconceptions in e-mails to a reproductive health website

    PubMed Central

    Wynn, L.L.; Foster, Angel M.; Trussell, James

    2013-01-01

    Background This study identifies sexual and reproductive health misconceptions contained in e-mails sent to an emergency contraception website. Study design From July 1, 2003 through June 30, 2004, 1,134 English-language questions were e-mailed to http://ec.princeton.edu. We performed content analysis on these e-mails and grouped misconceptions into thematic categories. Results Of the questions sent during the study period, 27% (n=303, total n=1,134) evinced underlying misconceptions about sexual and reproductive health issues. Content analysis revealed five major thematic categories of misconceptions: sexual acts that can lead to pregnancy; definitions of “protected” sex; timing of pregnancy and pregnancy testing; dangers that emergency contraceptives pose to women and fetuses; and confusion between emergency contraception and abortion. Conclusions These misconceptions have several possible sources: abstinence-only sexual education programs in the U.S., the proliferation of medically inaccurate websites, terminology used in public health campaigns, non-evidence based medical protocols, and confusion between emergency contraception and medication abortion in the media. PMID:19135564

  2. Linguistic analysis: terms and phrases used by patients in e-mail messages to nurses.

    PubMed

    Hsieh, Yichuan; Hardardottir, Gudrun Audur; Brennan, Patricia Flatley

    2004-01-01

    While some researchers are focusing on mapping free-text within health care fields into controlled vocabularies and classifications, many researchers are focusing on consumers' vocabularies. Using natural language processing (NLP) tools, such as MetaMap, to extract and map into terms in a controlled vocabulary is one way of understanding the pattern of terms used by lay people. Before an NLP tool can be effectively and efficiently used to extract concepts and create machine-understandable interpretations of the data, the appropriateness of the tool needs to be determined. This study aims were to determine the appropriateness of linguistic meaning captured for terms and phrases used by patients in electronic mail messages to nurses, using nursing-specific MetaMap output. Twenty messages were randomly selected from the 241 messages data set. Results indicated that four out of six nursing classification systems captured more than 50 % of the parsed word's linguistic meaning. This study demonstrates that it is possible to automatically extract and capture the linguistic meaning of the terms patients use in their electronic mail messages. PMID:15360865

  3. The effects of e-mail, video and lecturing methods on sexual risk reduction among adolescents: Counselling for Hiv\\/Aids prevention

    Microsoft Academic Search

    Thomas Tunde Olofintoye; Florence Foluso Akanle

    2011-01-01

    This study compared the effects of e-mail, video and lecture methods on sexual risk reduction and assertive behaviour of out-ofschool youths. Simple random sampling was used to select the sample. Treatment consisted of exposure to the sexuality content using e-mail, video and lecture methods. Data analyses revealed that subjects exposed to E-mail showed more assertive behaviours in their being able

  4. TRMM Gridded Text Products

    NASA Technical Reports Server (NTRS)

    Stocker, Erich Franz

    2007-01-01

    NASA's Tropical Rainfall Measuring Mission (TRMM) has many products that contain instantaneous or gridded rain rates often among many other parameters. However, these products because of their completeness can often seem intimidating to users just desiring surface rain rates. For example one of the gridded monthly products contains well over 200 parameters. It is clear that if only rain rates are desired, this many parameters might prove intimidating. In addition, for many good reasons these products are archived and currently distributed in HDF format. This also can be an inhibiting factor in using TRMM rain rates. To provide a simple format and isolate just the rain rates from the many other parameters, the TRMM product created a series of gridded products in ASCII text format. This paper describes the various text rain rate products produced. It provides detailed information about parameters and how they are calculated. It also gives detailed format information. These products are used in a number of applications with the TRMM processing system. The products are produced from the swath instantaneous rain rates and contain information from the three major TRMM instruments: radar, radiometer, and combined. They are simple to use, human readable, and small for downloading.

  5. Phone: (765) 494-5146 E-mail: environment@purdue.edu Web: http://www.purdue.edu/DP/environment Center for the Environment

    E-print Network

    " Phone: (765) 494-5146 · E-mail: environment@purdue.edu · Web: http overlapping aspects of the environmental challenges facing the world today. By emphasizing the deep connection-making and behavior #12;" " Phone: (765) 494-5146 · E-mail: environment@purdue.edu · Web: http

  6. Virginia Tech News Daily E-mail Policy Page 1 of 2 Virginia Polytechnic Institute and State University No. 12200 Rev.: 0

    E-print Network

    Buehrer, R. Michael

    Virginia Tech News Daily E-mail Policy Page 1 of 2 Virginia Polytechnic Institute and State __________________________________________________________________________________ Subject: Virginia Tech News Daily E-Mail Policy ............................................................................................................................................................1 3.1 How to Submit an Item to the Virginia Tech News Daily E

  7. Lifsey House Event Request Form This form can be submitted via e-mail, fax or regular campus mailstop. Please type and email completed

    E-print Network

    Meyers, Steven D.

    Lifsey House Event Request Form This form can be submitted via e-mail, fax or regular campus mailstop. Please type and email completed form or send it to: University of South Florida Department House. Event Day Date Purpose Guests Event Contact Information Name E-mail Phone Fax Print Form

  8. A Look at the Use of Electronic Mail (e-mail) as a Learning Tool in the Writing Skills of Adult LEP Female Students.

    ERIC Educational Resources Information Center

    Grosz-Gluckman, Viviana

    This study examined the utility of electronic mail (e-mail) as an instructional tool for limited-English-proficient (LEP) adult females who have made little progress in learning writing in English as a Second Language (ESL). Six subjects, aged 30-50 years, enrolled in a university ESL program produced 25 e-mail exchanges with the research over a…

  9. Save the filled out contact form to your local disk. Send it as e-mail attachement to auslaenderbehoerde@tu-ilmenau.de

    E-print Network

    Knobloch,Jürgen

    Save the filled out contact form to your local disk. Send it as e-mail attachement information Telephone number E-mail address Herewith I would like to contact the Aliens Department for making Date of birth Nationality / citizenship Authorized representative if appropriate Address Optional

  10. Receiving E-mail on the Math Computer System The Math and Computer Science computer systems are largely integrated --the function-

    E-print Network

    deYoung, Brad

    Receiving E-mail on the Math Computer System The Math and Computer Science computer systems systems. On the Math system, e-mail is read on riemann.math.mun.ca while on the CS system, it is read should now see a field which will resemble the following: Enter Mail Forward: shannons@math

  11. A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme

    Microsoft Academic Search

    Wei-ling Chang; Xiao-chun Yun; Bin-xing Fang; Shu-peng Wang; Shu-hao Li

    2008-01-01

    In this paper we present a universal compression algorithm for English text, ERecode. The proposed scheme highlights the importance of pre-processing work for English text, and employs one or two bytes code values to recode the 511 most common used English words, sequences of symbols and ASCII codes based on their occurrence frequency. Acting as a pre-processing tool for English

  12. Strengthening Argumentation in Medical Explanations by Text Plan Revision ?

    E-print Network

    Grasso, Floriana

    , Edinburgh, UK, e­mail: floriana@cee.hw.ac.uk 3 Department of Psychology, University of Reading, UK e­mail: d proved to favour compliance and cor­ rect treatment performance. To achieve this purpose, these texts attitudes of the Addressee. This paper describes how Rhetorical Sentence Planning can contribute to this aim

  13. New Mothers NetworkThe Provision of Social Support to Single, Low-Income, African American Mothers Via E-Mail Messages

    Microsoft Academic Search

    Christie K. Campbell-Grossman; Diane Brage Hudson; Rebecca Keating-Lefler; Sally Heusinkvelt

    2009-01-01

    Electronic mail (e-mail) is being investigated as a health care intervention for mothers caring for their infants. The purpose of this study is to describe themes representing the content of e-mail messages written by 12 single, low-income, African American mothers to nurses participating in the New Mothers Network Study. Three themes that emerged were (a) life's logistics: day-to-day concerns; (b)

  14. Further explorations in text alignment with handwritten documents

    Microsoft Academic Search

    E. Micah Kornfield; R. Manmatha; James Allan

    2007-01-01

    Today's digital libraries increasingly include not only printed text but also scanned handwritten pages and other multimedia\\u000a material. There are, however, few tools available for manipulating handwritten pages. Here, we extend our algorithm from [5]based\\u000a on dynamic time warping (DTW) for a word by word alignment of handwritten documents with (ASCII) transcripts. We specifically\\u000a attempt to incorporate language modelling and

  15. Social equity and access to the World Wide Web and E-mail: implications for design and implementation of medical applications.

    PubMed Central

    Mandl, K. D.; Katz, S. B.; Kohane, I. S.

    1998-01-01

    INTRODUCTION: The distribution and types of Internet connectivity will determine the equity of access by patient populations to emerging health technologies. We sought to measure the rates, types, and predictors of access in a patient population targeted for Web-based medical services. METHODS: Design. Cross sectional in-person interview. Setting. Emergency department of a large urban pediatric teaching hospital. Subjects. Primary caretakers of patients or patients at least 16 years old. Procedure and measures. Subjects were asked about access to e-mail and the Internet as well as about willingness to use and concerns about Web-based services. Views of equity and access and sociodemographic data were also elicited. RESULTS: 132 subjects were enrolled in the study. Of respondents, 67.2% use a computer and 36.4% can access the Internet or e-mail from home. Including Internet connections and/or e-mail accounts at work, school and public libraries, 50.7% of the sample has access. Forty percent of families have e-mail accounts. The rate at which families have connectivity is primarily correlated with income (r = 0.6, p < 0.01). At all income levels, rates of access to the World Wide Web are higher than to e-mail. White patients are much more likely to have e-mail (OR 5.0, 95% CI 2.4-10.8) and Web access (OR 3.6, 95% CI 1.7-7.5). CONCLUSIONS: Connectivity is directly correlated with income and distributed unevenly across racial and ethnic groups. World Wide Web access is more prevalent than e-mail accounts, and both are often obtained outside the home. Design of health applications should account for these attributes of patient access. PMID:9929213

  16. Effectiveness of an intensive E-mail based intervention in smoking cessation (TABATIC study): study protocol for a randomized controlled trial

    PubMed Central

    2013-01-01

    Background Intensive interventions on smoking cessation increase abstinence rates. However, few electronic mail (E-mail) based intensive interventions have been tested in smokers and none in primary care (PC) setting. The aim of the present study is to evaluate the effectiveness of an intensive E-mail based intervention in smokers attending PC services. Methods/design Randomized Controlled Multicentric Trial. Study population: 1060 smokers aged between 18–70 years from Catalonia, Salamanca and Aragón (Spain) who have and check regularly an E-mail account. Patients will be randomly assigned to control or intervention group. Intervention: Six phase intensive intervention with two face to face interviews and four automatically created and personal E-mail patients tracking, if needed other E-mail contacts will be made. Control group will receive a brief advice on smoking cessation. Outcome measures: Will be measured at 6 and 12 months after intervention: self reported continuous abstinence (confirmed by cooximetry), point prevalence abstinence, tobacco consumption, evolution of stage according to Prochaska and DiClemente's Stages of Change Model, length of visit, costs for the patient to access Primary Care Center. Statistical analysis: Descriptive and logistic and Poisson regression analysis under the intention to treat basis using SPSS v.17. Discussion The proposed intervention is an E-mail based intensive intervention in smokers attending primary care. Positive results could be useful to demonstrate a higher percentage of short and long-term abstinence among smokers attended in PC in Spain who regularly use E-mail. Furthermore, this intervention could be helpful in all health services to help smokers to quit. Trial Registration Clinical Trials.gov Identifier: NCT01494246. PMID:23597262

  17. CS 481 Lab 1 Due by 11:59pm on Monday, 20 February, as an e-mail to the instructor (jedcrandall@gmail.com).

    E-print Network

    Crandall, Jedidiah R.

    CS 481 Lab 1 Due by 11:59pm on Monday, 20 February, as an e-mail to the instructor (jedcrandall their virtual address space, file descriptors, interprocess communication, and system calls, and Linux everything else I need to know in 20 pages or less. I'm not so concerned about the length of your writeup, I

  18. A. Boccuto, Department of Matematics and Computer Science, via Vanvitelli 1, I-06123 Perugia, Italy; e-mail: boccuto@dipmat.unipg.it,

    E-print Network

    Boccuto, Antonio

    and Computer Science, via Vanvitelli 1, I-06123 Perugia, Italy; e-mail: candelor@dipmat.unipg.it Sobczyk of the type of Sobczyk-Hammer for mea- sures with values in l-groups, and also deduce some convergence)-convergence, uniform s-boundedness, uniform continuity, Vitali-Hahn-Saks theorems, Sobczyk-Hammer decomposition

  19. Sea Level Rise, Green Greenland & Fantabulous Inference To be removed from Jim Hansen's e-mail list respond to sender with REMOVE as subject

    E-print Network

    Hansen, James E.

    Warm Pool (a) and the Indian Ocean (b). Temperatures prior to 1870 are inferred from the compositionSea Level Rise, Green Greenland & Fantabulous Inference To be removed from Jim Hansen's e-mail list respond to sender with REMOVE as subject Sea Level Rise: I confess to collaborating with Michael Le Page

  20. Benefits Office: Phone: (352) 392-2HRS Fax: (352) 392-5166 E-mail: benefits@ufl.edu Preferred Legal Plan

    E-print Network

    Mair, Bernard A.

    Benefits Office: Phone: (352) 392-2HRS Fax: (352) 392-5166 E-mail: benefits@ufl.edu Preferred Legal on a calendar year. That means your benefits run from January 1 to December 31 each year. This dental plan pays Dental This plan includes lifetime benefits for orthodontics of $1500. Orthodontics is not a separate

  1. PO BOX 6150 AGUADILLA, PR 006 04 -6150 PHONE : (787)890 -2681 ,E XT.485 E -MAIL: MARCOS.ROS ADO 1 @ UPR.E DU

    E-print Network

    Gilbes, Fernando

    PO BOX 6150 · AGUADILLA, PR· 006 04 -6150 PHONE : (787)890 -2681 ,E XT.485 · E -MAIL: MARCOS with Unix, Windows and Mac computer operating systems Above intermediate knowledge of Microsoft Office-Myers-Squibb, Mayagüez Operations CONFERENCES August 2001 - Computer Security and privacy protection: how to prevent

  2. * Corresponding author. Tel.: #61-3-992-55316; fax #61-3-992-E-mail address: jiankun.hu@rmit.edu.au (J. Hu)

    E-print Network

    Hu, Jiankun

    * Corresponding author. Tel.: #61-3-992-55316; fax #61-3-992- 55340. E-mail address: jiankun.hu@rmit.edu.au (J. Hu) Control Engineering Practice 8 (2000) 241}252 Systematic H weighting function selection and its application to the real-time control of a vertical take-o! aircraft Jiankun Hu *, Christian Bohn

  3. Weather Research Center 5104 Caroline Houston, Texas 77004 Phone: 713-529-3076 Fax: 713-528-3538 E-mail: wrc@wxresearch.org

    E-print Network

    Droegemeier, Kelvin K.

    ® Weather Research Center 5104 Caroline Houston, Texas 77004 Phone: 713-529-3076 Fax: 713-528-3538 E-mail: wrc@wxresearch.org Title: Weather Camp Director Date: Summer 2012 Weather Research Center to a need to educate the public about weather and weather safety. The mission of WRC is to advance

  4. On the integration of MPEG4 video streams with voice and e-mail data packet traffic over wireless picocellular networks

    Microsoft Academic Search

    P. Koutsakis; S. Psychis; M. Paterakis

    2001-01-01

    A new medium access control (MAC) protocol for mobile wireless communications is presented and investigated. We explore, via an extensive simulation study, the performance of the protocol when integrating voice, MPEG-4 video and e-mail data packet traffic over a wireless channel of high capacity. Our scheme achieves high aggregate channel throughput in all cases of traffic load, while preserving the

  5. * Corresponding author. E-mail: wolfgang.cassing@theo.physik.uni-giessen.de. Supported by BMBF, DFG, GSI Darmstadt and FZ Ju lich.

    E-print Network

    Bratkovskaya, Elena

    * Corresponding author. E-mail: wolfgang.cassing@theo.physik.uni-giessen.de. Supported by BMBF probes of hot and dense nuclear matter W. Cassing*, E.L. Bratkovskaya Institut fu( r Theoretische Physik - 3 #12;HADRONIC AND ELECTROMAGNETIC PROBES OF HOT AND DENSE NUCLEAR MATTER W. CASSING, E

  6. Outlook Web Access (OWA) U kunt Outlook Web Access gebruiken om uw e-mail via het Web te gebruiken. Dit kan vanaf

    E-print Network

    Galis, Frietson

    Outlook Web Access (OWA) U kunt Outlook Web Access gebruiken om uw e-mail via het Web te gebruiken zoekfunctie. #12;Instellingen wijzigen via Outlook Web Access Via Outlook Web Access kunt u o.a. uw ingelogd klik u op de button OPTIES. De onderstaande functionaliteiten kunt u regelen via Outlook Web

  7. * E-mail: 1n.vriend@qmw.ac.uk2, http://www.qmw.ac.uk/&ugte173/. Journal of Economic Dynamics & Control

    E-print Network

    Tesfatsion, Leigh

    * E-mail: 1n.vriend@qmw.ac.uk2, http://www.qmw.ac.uk/&ugte173/. Journal of Economic Dynamics; Social learning; Spite e!ect; Genetic Algorithm 1. Introduction Learning and adaptive behavior learning algorithm will lead to sharply di!erent results when applied as a model of individual learning

  8. Setting up E-mail on Outlook 2010 with Viterbi Exchange Last Updated: 2/10/12 1 | P a g e

    E-print Network

    Zhou, Chongwu

    2010 with Viterbi Exchange Last Updated: 2/10/12 3 | P a g e Figure 3: Bypass the Auto Account Setup 4 on the "Exchange Proxy Settings..." button #12;Setting up E-mail on Outlook 2010 with Viterbi Exchange Last Updated: 2/10/12 9 | P a g e Figure 8: Exchange Proxy Settings window d. Under Connections settings

  9. E-mail: ceas-adv@UWM.edu Website: www.uwm.edu/CEAS Phone: (414) 229-4667 COMPUTER SCIENCE

    E-print Network

    Saldin, Dilano

    E-mail: ceas-adv@UWM.edu Website: www.uwm.edu/CEAS Phone: (414) 229-4667 COMPUTER SCIENCE Just% doctorate Undergraduate Degrees Bachelor of Science in Computer Science Bachelor of Science in Engineering (Civil, Computer, Electrical, Industrial, Materials and Mechanical) Minors Computer Science, Electrical

  10. Benefits Office: Phone: (352) 392-2HRS Fax: (352) 392-5166 E-mail: benefits@ufl.edu 1 What is Disability Insurance?

    E-print Network

    Mair, Bernard A.

    Benefits Office: Phone: (352) 392-2HRS Fax: (352) 392-5166 E-mail: benefits@ufl.edu 1 What is Disability Insurance? Standard Disability Chances are you already purchase home, auto and life insurance, benefits will be paid on a monthly basis under a Long Term Disability plan. #12;Benefits Office: Phone

  11. The Author 2012. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

    E-print Network

    Gleeson, Joseph G.

    , please e-mail: journals.permissions@oup.com Human Milk Oligosaccharides: Every Baby needs a Sugar Mama Oligosaccharides (HMO) are a family of structurally diverse unconjugated glycans that are highly abundant the postulated beneficial effects of HMO for the breast-fed neonate, compares HMO to oligosaccharides in the milk

  12. Photoresists, developers, remover, adhesion promoters, etchants, and solvents ... Phone: +49 731 36080-409 www.microchemicals.eu e-Mail: sales@microchemicals.eu

    E-print Network

    Yoo, S. J. Ben

    are also etched by aqua regia. For etching platinum or rhodium, the etching solution has to be heated 36080-409 www.microchemicals.eu e-Mail: sales@microchemicals.eu Gold Etching Revised: 2009-12-15 Source valence electron which hereby is well shielded against any reaction partners. Wet chemical etching of gold

  13. Northwest Straits Commission, 10441 Bayview Edison Rd., Mt. Vernon WA 98273 phone: 360.428-1064 e-mail: info@nwstraits.org web: www.nwstraits.org

    E-print Network

    98273 phone: 360.428-1064 e-mail: info@nwstraits.org web: www.nwstraits.org RAIN GARDENS The Skagit MRC worked with the Port of Anacortes to install a rain garden to treat roof runoff and provide a model Harbor, the San Juan MRC put in a rain garden to filter and divert polluted stormwater runoff. EELGRASS

  14. *Corresponding author. Tel.: #1 505 667 5876. E-mail address: cy@lanl.gov (C.M. Ho!man).

    E-print Network

    California at Santa Cruz, University of

    *Corresponding author. Tel.: #1 505 667 5876. E-mail address: cy@lanl.gov (C.M. Ho!man). Permanent , G. Gisler , J.A. Goodman , T.J. Haines , C.M. Ho!man *, S. Hugenberger , L.A. Kelley , S. Klein , I

  15. Useful links from http://nsf.gov Get NSF Updates by e-mail: Click on upper right-hand corner of http://nsf.gov

    E-print Network

    Harms, Kyle E.

    Useful links from http://nsf.gov Get NSF Updates by e-mail: Click on upper right-hand corner of http://nsf.gov This is the single most important thing you can do; it enables you to customize the information you would like to gain from NSF, so that new information comes directly to you without your having

  16. Text Structure

    NSDL National Science Digital Library

    2012-01-01

    This web page defines and describes text structure, or how the information within a written text is organized. It explains the benefits of teaching students to identify and analyze text structures within text and describes an instructional sequence in which students read examples of different text structures and then write paragraphs that follow a specific text structure. The site includes definitions and examples of five common text structures, and graphic organizers that can be used with each type of text. Links to additional resources and research citations are included.

  17. Log ASCII Standard (LAS) Files for Geophysical (Gamma Ray) Wireline Well Logs and Their Application to Geologic Cross Section C-C' Through the Central Appalachian Basin

    USGS Publications Warehouse

    Trippi, Michael H.; Crangle, Robert D., Jr.

    2009-01-01

    U.S. Geological Survey (USGS) regional geologic cross section C-C' (Ryder and others, 2008) displays key stratigraphic intervals in the central Appalachian basin. For this cross section, strata were correlated by using descriptions of well cuttings and gamma ray well log traces. This report summarizes the procedures used to convert gamma ray curves on paper well logs to the digital Log ASCII (American Standard Code for Information Interchange) Standard (LAS) format using the third-party software application Neuralog. The procedures could be used with other geophysical wireline logs also. The creation of digital LAS files from paper well logs by using Neuralog is very helpful, especially when dealing with older logs with limited or nonexistent digital data. The LAS files from the gamma ray logs of 11 wells used to construct cross section C-C' are included in this report. They may be downloaded from the index page as a single ZIP file.

  18. 48 CFR 52.223-18 - Encouraging Contractor Policies To Ban Text Messaging While Driving.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...Acquisition Regulations System 2 2013-10-01...Policies To Ban Text Messaging While Driving. 52...Acquisition Regulations System FEDERAL ACQUISITION...Policies To Ban Text Messaging While Driving. As...texting, e-mailing, instant messaging,...

  19. 48 CFR 52.223-18 - Encouraging Contractor Policies To Ban Text Messaging While Driving.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...Acquisition Regulations System 2 2012-10-01...Policies To Ban Text Messaging While Driving. 52...Acquisition Regulations System FEDERAL ACQUISITION...Policies To Ban Text Messaging While Driving. As...texting, e-mailing, instant messaging,...

  20. 48 CFR 52.223-18 - Encouraging Contractor Policies To Ban Text Messaging While Driving.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...Acquisition Regulations System 2 2011-10-01...Policies To Ban Text Messaging While Driving. 52...Acquisition Regulations System FEDERAL ACQUISITION...Policies To Ban Text Messaging While Driving. As...texting, e-mailing, instant messaging,...

  1. 48 CFR 52.223-18 - Encouraging Contractor Policies To Ban Text Messaging While Driving.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...Acquisition Regulations System 2 2014-10-01...Policies To Ban Text Messaging While Driving. 52...Acquisition Regulations System FEDERAL ACQUISITION...Policies To Ban Text Messaging While Driving. As...texting, e-mailing, instant messaging,...

  2. Text Mining.

    ERIC Educational Resources Information Center

    Trybula, Walter J.

    1999-01-01

    Reviews the state of research in text mining, focusing on newer developments. The intent is to describe the disparate investigations currently included under the term text mining and provide a cohesive structure for these efforts. A summary of research identifies key organizations responsible for pushing the development of text mining. A section…

  3. Don't LOL at virtual visits. Technology is allowing more doctors and patients to consult via e-mail, and insurance companies are reimbursing for it.

    PubMed

    Robeznieks, Andis

    2007-10-15

    In today's "I-gotta-know-now" society, many patients turn to e-mail to contact doctors on matters, as opposed to waiting for an in-person office visit. Now, some insurers are actually reimbursing doctors for their electronic time, which is also known as a "virtual visit." Internist Paul Tang, left, doesn't consider the practice mainstream yet. "No one is reimbursing us," he says. PMID:17972489

  4. NAME RM PHONE FAX E-MAIL Box Abd-Elrahman, Amr Plant City 813-757-2283 813-707-7399 aamr@ufl.edu GCREC

    E-print Network

    Jawitz, James W.

    NAME RM PHONE FAX E-MAIL Box Abd-Elrahman, Amr Plant City 813-757-2283 813-707-7399 aamr@ufl.edu GCREC Acharya, Subodh 119 Phelps Lab 392-0840 sacharya@ufl.edu Box 116350 ACMF Bldg 402/1 371-8041 367-9256 ACMF Adams, Damian 355 NZ 846-0872 846-1277 dcadams@ufl.edu Box 110410 Ahrens, Rob 402 McCarty C 273

  5. (MIRU2008) 2008 7 E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp

    E-print Network

    Takiguchi, Tetsuya

    (MIRU2008) 2008 7 HOG 3 1-1 1-1 E-mail: katsu0920@me.cs.scitec.kobe-u.ac.jp, {takigu,ariki}@kobe-u.ac.jp 3 3 1 Histograms of Oriented Gradients (HOG) HOG Shape Contexts HOG 5.35 3 Histograms of Oriented Gradients 3D Human Posture Estimation Using the HOG Features from Monocular Image Katsunori ONISHI , Tetsuya

  6. Here’s My Phone Number, Don’t Call Me: Physician Accessibility in the Cell Phone and E-mail Era

    Microsoft Academic Search

    Reuben K. M. Wong; Jane S. M. Tan; Douglas A. Drossman

    2010-01-01

    Physician accessibility, for example how available a doctor should be by cell phone or e-mail is an important issue that is\\u000a not well understood. There can be large differences between the expectations of patients and the perspective of their providers.\\u000a The rationale for providing accessibility has historical roots and relates to the very basis of the physician–patient relationship\\u000a and the

  7. Modul Prfungsberechtigte Raum Telefon e-mail Lineare Algebra fr Ing. Nabben MA372 29291 nabben@math.tu-berlin.de

    E-print Network

    Nabben, Reinhard

    1 Modul Prüfungsberechtigte Raum Telefon e-mail Lineare Algebra für Ing. Nabben MA372 29291 nabben@math.tu-berlin.de Penn-Karras MA825 23760 pkarras@math.tu-berlin.de Scheutzow MA776 25767 ms@math.tu-berlin.de Unterreiter MA672 24884 unterreiter@math.tu-berlin.de Analysis I für Ing. Bärwolff MA669 25749 baerwolf@math

  8. Modul Prfungsberechtigte Raum Telefon e-mail Lineare Algebra fr Ing. Bley MA518 78846 bley@math.tu-berlin.de

    E-print Network

    Nabben, Reinhard

    1 Modul Prüfungsberechtigte Raum Telefon e-mail Lineare Algebra für Ing. Bley MA518 78846 bley@math.tu-berlin.de Holtz MA417 29295 holtz@math-berlin.de Knipping MA576 29782 knipping@math.tu-berlin.de Liesen MA378 29295 liesen@math.tu-berlin.de Nabben MA372 29291 nabben@math.tu-berlin.de Penn-Karras MA825 23760

  9. 167Thermomagnetic treatment of zinc: selective grain growth and texture modification Corresponding author: A.D. Sheikh-Ali, e-mail: a.sheikh-ali@kbtu.kz

    E-print Network

    Garmestani, Hamid

    author: A.D. Sheikh-Ali, e-mail: a.sheikh-ali@kbtu.kz Rev.Adv.Mater.Sci. 11 (2006) 167-173 © 2006 MODIFICATION A.D. Sheikh-Ali1,* , D.A. Molodov2 and H. Garmestani3 1 Institute for Metals Superplasticity a high probability for significant structural alterations can be expected. #12;168 A.D. Sheikh-Ali, D

  10. Text Sets.

    ERIC Educational Resources Information Center

    Giorgis, Cyndi; Johnson, Nancy J.

    2002-01-01

    Presents annotations of approximately 30 titles grouped in text sets. Defines a text set as five to ten books on a particular topic or theme. Discusses books on the following topics: living creatures; pirates; physical appearance; natural disasters; and the Irish potato famine. (SG)

  11. Fetch Text

    NSDL National Science Digital Library

    Jiang, Andy

    Looking for a new way to share articles in your emails? Fetch Text can lend a hand. By simply forwarding a link to the email address provided on the site, visitors will receive a response email of just the main text pulled from the link. Itâ??s easy to use and is compatible with all operating systems.

  12. The Impact of Gender on the Quality and Content of E-Mail Advice Professors Give to Students Applying to Graduate School

    NASA Astrophysics Data System (ADS)

    Steinpreis, Rhea E.; Anders, Katie A.; Riley, Monica G.; Ritzke, Dawn M.; McDonald, Theodore W.

    The purpose of this study was to determine if gender plays a role in the quality and quantity of the advice given to undergraduates about applying to graduate school. Four hundred male and female psychologists who listed a university address and e-mail address in the 1997 Directory of the American Psychological Association were sent an e-mail inquiry from a pseudostudent (either Theresa or Brian Miller). In the first e-mail, the pseudostudent asked if the subjects would be willing to look at his or her GRE scores and grade point average (GPA) for the purpose of providing advice about his or her chances of getting into the graduate program at the subject's school. Two hundred forty subjects consented to examine the figures, nearly equally split between males and females. Subjects were then sent the GPA and scores of an outstanding, average, or poor applicant. The results indicated that female faculty were significantly more likely to consent to examine the data of a female pseudostudent and male faculty were significantly more likely to consent to examine the data of a male pseudostudent. However, once the faculty member agreed to offer advice, gender had no impact on the length or quality of advice given to the pseudostudent, and advice became a function of the pseudostudent's academic credentials. Furthermore, while male and female subjects were equally likely to encourage, discourage, or recant on their offer to give feedback, male subjects were more likely to refuse to review the data and female subjects were more likely to offer a neutral response to the data. The results are discussed in terms of the difficulty students face in finding adequate information about pursuing a graduate education. These problems may be magnified for female students because there are fewer female faculty available to serve as mentors.

  13. What a rude e-mail! Examining the differential effects of incivility versus support on mood, energy, engagement, and performance in an online context.

    PubMed

    Giumetti, Gary W; Hatfield, Andrea L; Scisco, Jenna L; Schroeder, Amber N; Muth, Eric R; Kowalski, Robin M

    2013-07-01

    Existing research on workplace incivility has demonstrated an association with a host of negative outcomes, including increased burnout, turnover intentions, and physical symptoms. With the rise in Internet communication over the last decade, interpersonal mistreatment has spilled over to the Internet, but little is known about the impact of incivility communicated via e-mail on employee psychological and performance outcomes. The current study presents a within-subjects experiment wherein incivility and support were manipulated in a laboratory-based simulated workplace setting. Eighty-four participants completed a series of math tasks while interacting with either an uncivil or a supportive supervisor via e-mail. Data were collected on energy, cardiac activity, mood, task performance, and engagement. Findings indicate that participants reported higher levels of negative affect and lower levels of energy after working with the uncivil supervisor than with the supportive supervisor. Additionally, participants performed significantly worse on the math tasks and had lower engagement in the uncivil condition than the supportive condition, and these relationships were mediated by energy. No differences were found in cardiac activity between the two conditions. Results are discussed in terms of their implications for the 21st century world of work. PMID:23834445

  14. Personalized Feedback as a Universal Prevention Approach for College Drinking: A Randomized Trial of an e-Mail Linked Universal Web-Based Alcohol Intervention

    PubMed Central

    Winter, Michael; Lu, John; Rosenbloom, David; Saitz, Richard

    2014-01-01

    Alcohol use among first-year university students continues to be a central health concern. Efforts to address drinking in this population have increasingly relied on web-based interventions, which have the capacity to reach large numbers of students through a convenient and highly utilized medium. Despite evidence for the utility of this approach for reducing hazardous drinking, recent studies that have examined the effectiveness of this approach as a universal prevention strategy in campus-wide studies have produced mixed results. We sought to test the effectiveness of a web-based alcohol intervention as a universal prevention strategy for first-year students. An e-mail invitation linked to a brief, web-based survey on health behaviors was sent to all first-year students during the fall semester. Those who completed the baseline assessment were randomized to receive either a feedback-based alcohol intervention (intervention condition) or feedback about other health-related behaviors such as sleep and nutrition (control condition). A second web-based survey was used to collect follow-up drinking data 5 months later. The number of heavy drinking episodes in the previous month and alcohol-related consequences in the previous 3 months served as the primary dependent variables. Negative binomial regression analyses did not indicate a significant effect of the intervention at follow-up on either heavy drinking episodes or alcohol-related consequences. Analyses of additional drinking outcomes among the subsample of students who reported that they did not drink at baseline showed that those who received the alcohol intervention were subsequently less likely to drink alcohol. These results suggest that web-based alcohol interventions may be a potentially useful method of maintaining abstinence among underage, non-drinking students. Overall, however, results indicate that an e-mail-linked, campus-wide, web-intervention approach to address alcohol use among first-year students may have limited effectiveness as an approach to minimize hazardous drinking over the course of the year. PMID:24421075

  15. If you have any questions, please contact Cambridge in America at (212) 984-0960, e-mail mail@cantab.org, or visit the website www.cantab.org, where you can make your gift online.

    E-print Network

    Goldschmidt, Christina

    If you have any questions, please contact Cambridge in America at (212) 984-0960, e-mail mail__________________________________________ Matric Year __________________ Address__________________________________________ Date__________________ My employer will match my gift ­ I will send the forms to Cambridge in America

  16. Access, Card, & Parking Services 3241 S Federal Street, Suite 201 Chicago, Illinois 60616 Phone: (312) 567-8968 Fax: (312) 567-8979 Web Site: www.parking.iit.edu E-mail: parking@iit.edu

    E-print Network

    Saniie, Jafar

    Access, Card, & Parking Services · 3241 S Federal Street, Suite 201 · Chicago, Illinois 60616 Phone Date____________ Card#____________ Cashier Initials____________ Amount:____________ CREDIT CARD: Last 4: _____________________________________________________________________________ Street City State ZIP IIT E-mail: ________________________________________________ Phone Number

  17. Phone: 607-255-2524 Fax: 607-255-4319 E-mail: digital@cornell.edu Web: bigredprint.cornell.edu Job #:q Quote only

    E-print Network

    Hemami, Sheila S.

    : _______________________________ sides Printed: q Simplex (1-sided) q Duplex (2-sided) Collate: q Yes q No flat size: q 4" x 6" q 4: Text Weights: q 20/50# text q 24/60# text q 28/70# text q 32/80# text q 32/80# coated text q 100# coated text other Paper not listed: ___________________________ Paper Color (if other than white

  18. TRMM .25 deg x .25 deg Gridded Precipitation Text Product

    NASA Technical Reports Server (NTRS)

    Stocker, Erich; Kelley, Owen

    2009-01-01

    Since the launch of the Tropical Rainfall Measuring Mission (TRMM), the Precipitation Measurement Missions science team has endeavored to provide TRMM precipitation retrievals in a variety of formats that are more easily usable by the broad science community than the standard Hierarchical Data Format (HDF) in which TRMM data is produced and archived. At the request of users, the Precipitation Processing System (PPS) has developed a .25 x .25 gridded product in an easily used ASCII text format. The entire TRMM mission data has been made available in this format. The paper provides the details of this new precipitation product that is designated with the TRMM designator 3G68.25. The format is packaged into daily files. It provides hourly precipitation information from the TRMM microwave imager (TMI), precipitation radar (PR), and TMI/PR combined rain retrievals. A major advantage of this approach is the inclusion only of rain data, compression when a particular grid has no rain from the PR or combined, and its direct ASCII text format. For those interested only in rain retrievals and whether rain is convection or stratiform, these products provide a huge reduction in the data volume inherent in the standard TRMM products. This paper provides examples of the 3G68 data products and their uses. It also provides information about C tools that can be used to aggregate daily files into larger time samples. In addition, it describes the possibilities inherent in the spatial sampling which allows resampling into coarser spatial sampling. The paper concludes with information about downloading the gridded text data products.

  19. Constituents' E-Mail on XM Deal Not Well Received http://www.washingtonpost.com/wp-dyn/content/article/2007/11/2... 1 of 4 11/22/07 7:30 PM

    E-print Network

    Massachusetts at Amherst, University of

    ?" she asked. "I don't want someone using my name for something I don't even know about." A check the name, date, postal address and numerical Internet address of the e-mailers, including those contactedConstituents' E-Mail on XM Deal Not Well Received http

  20. Increasing Induction-Level Teachers' Positive-to-Negative Communication Ratio and Use of Behavior-Specific Praise through E-Mailed Performance Feedback and Its Effect on Students' Task Engagement

    ERIC Educational Resources Information Center

    Rathel, Jeanna M.; Drasgow, Erik; Brown, William H.; Marshall, Kathleen J.

    2014-01-01

    The purpose of this study was to examine the effects of e-mailed specific performance feedback that included progress monitoring graphs on induction-level teachers' ratios of positive-to-negative communication behaviors and their use of behavior-specific praise in classrooms for students with emotional and behavioral disorders, mild…

  1. Int J Software Informatics, Vol.?, No.?, March 2010, pp. 1?? E-mail: ijsi@iscas.ac.cn International Journal of Software and Informatics, ISSN 1673-7288 http://www.ijsi.org

    E-print Network

    Paris-Sud XI, Université de

    Int J Software Informatics, Vol.?, No.?, March 2010, pp. 1­?? E-mail: ijsi@iscas.ac.cn International Journal of Software and Informatics, ISSN 1673-7288 http://www.ijsi.org c 2010 by Institute Software Informatics, 2010, ?(?): 1­??. http://www.ijsi.org/? 1 Introduction Inconsistency handling is one

  2. Proposal Title Fac Full Name Fac Dept Name E-mail Debate on "Fair Market Value" and "Historical Cost"-Literary Review Grace Kang Accounting-D gkang@d.umn.edu

    E-print Network

    Minnesota, University of

    Proposal Title Fac Full Name Fac Dept Name E-mail Debate on "Fair Market Value" and "Historical Cost"- Literary Review Grace Kang Accounting-D gkang@d.umn.edu Analysis of Financial Reporting of US-Listed Chinese Firms Fu-Jen (Daniel) Hsiao Accounting-D fhsiao@d.umn.edu Do

  3. Confidential report on a candidate for graduate studies Facult des sciences TO BE CONSIDERED VALID, THIS FORM, MUST BE FORWARDED TO THE VICE-DEAN E-MAIL ADDRESS BY THE REFEREE

    E-print Network

    Spino, Claude

    VALID, THIS FORM, MUST BE FORWARDED TO THE VICE-DEAN E-MAIL ADDRESS BY THE REFEREE HIMSELF AND FROM A PROFESSIONAL EMAIL ADDRESS. DOCUMENTS FROM GMAIL, HOTMAIL AND OTHER PERSONAL EMAIL ADDRESSES Additionnal remarks : III ­ REFEREE'S INFORMATION IV - ADDRESS OF REFEREE Name Street address App

  4. Chinese Journal of Chemistry, 2006, 24, 1716--1720 Full Paper * E-mail: jplang@suda.edu.cn; Tel.: 0086-512-65882865; Fax: 0086-512-65880089

    E-print Network

    Gao, Song

    Chinese Journal of Chemistry, 2006, 24, 1716--1720 Full Paper * E-mail: jplang@suda.edu.cn; Tel September 19, 2006. Project supported by the Outstanding Young Scientist Award from the National Natural properties of 1 and 2 were also investigated. Keywords cobalt, coordination polymer, synthesis, crystal

  5. Instituto de Matemtica Interdisciplinar -Universidad Complutense de Madrid Plaza de las Ciencias, 3 E-28040 Madrid Tel./Fax. +34 9139 44385 e-mail imi@mat.ucm.es

    E-print Network

    Tradacete, Pedro

    Instituto de Matemática Interdisciplinar - Universidad Complutense de Madrid Plaza de las Ciencias, 3 E- 28040 Madrid Tel./Fax. +34 9139 44385 e-mail imi@mat.ucm.es www.mat.ucm.es/imi CONVOCATORIA DE los que al menos uno deberá pertenecer a la Universidad Complutense de Madrid) y breve descripción de

  6. The Author 2014. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

    E-print Network

    Dutta, Prabal

    on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com. doi:10.1093/ntr/ntt275 Original investigatiOn a mobile-phone-based breath carbon monoxide meter, 56%, now own smartphones, and this percentage is substantially higher among young adults (18­29 years

  7. Name E-Mail Office Phone Fee Tutoring Mesa, Camilo camilo.mesa@colorado.edu Math 312 303-815-6949 $30/hr H.S. and all undergraduate except Math 1300

    E-print Network

    Stowell, Michael

    Name E-Mail Office Phone Fee Tutoring Mesa, Camilo camilo.mesa@colorado.edu Math 312 303-815-6949 $30/hr H.S. and all undergraduate except Math 1300 Andrews, Scott scott.andrews@colorado.edu Math 362 978-460-3347 $40/hr H.S. and All Undergrad except Math 1300 Migler, Joseph joseph

  8. Policlinico Umberto I -Dipartimento di Scienze Radiologiche, Oncologiche e Anatomo Patologiche Viale Regina Elena, 324 00161 Roma T (+39) 06 49970270 F (+39) 06 491774 e-mail: vincenzo.tombolini@uniroma1.it

    E-print Network

    Guidoni, Leonardo

    .tombolini@uniroma1.it Htpp:w3.uniroma1.it/dip-radiologia C.F. 80209930587 P.I. 02133771002 DIPARTIMENTO DI SCIENZE ­ T (+39) 06 49970270 F (+39) 06 491774 ­ e-mail: vincenzo.tombolini@uniroma1.it Htpp:w3.uniroma1.it/dip-radiologia

  9. LOOK- A TEXT FILE DISPLAY PROGRAM

    NASA Technical Reports Server (NTRS)

    Vavrus, J. L.

    1994-01-01

    The LOOK program was developed to permit a user to examine a text file in a psuedo-random access manner. Many engineering and scientific programs generate large amounts of printed output. Often this output needs to be examined in only a few places. On mini-computers (like the DEC VAX) high-speed printers are usually at a premium. One alternative is to save the output in a text file and examine it with a text editor. The slowness of a text editor, the possibility of inadvertently changing the output, and other factors make this an unsatisfactory solution. The LOOK program provides the user with a means of rapidly examining the contents of an ASCII text file. LOOK's basis of operation is to open the text file for input only and then access it in a block-wise fashion. LOOK handles the text formatting and displays the text lines on the screen. The user can move forward or backward in the file by a given number of lines or blocks. LOOK also provides the ability to "scroll" the text at various speeds in the forward or backward directions. The user can perform a search for a string (or a combination of up to 10 strings) in a forward or backward direction. Also, user selected portions of text may be extracted and submitted to print or placed in a file. Additional features available to the LOOK user include: cancellation of an operation with a keystroke, user definable keys, switching mode of operation (e.g. 80/132 column), on-line help facility, trapping broadcast messages, and the ability to spawn a sub-process to carry out DCL functions without leaving LOOK. The LOOK program is written in FORTRAN 77 and MACRO ASSEMBLER for interactive execution and has been implemented on a DEC VAX computer using VAX/VMS with a central memory requirement of approximately 430K of 8 bit bytes. LOOK operation is terminal independent but will take advantage of the features of the DEC VT100 terminal if available. LOOK was developed in 1983.

  10. Dear Mr. Hansen. Thank you very much for your e-mail to the Prime Minister, which was forwarded to the

    E-print Network

    Hansen, James E.

    : Climate Change and the Tar Sands Development Vedlegg: Hansen text for ad and letter in both languages of the Government, I am pleased to say that we hold your work on climate change in high esteem, and further, that we Parliament. I can however assure you that we will continue our offensive stance on climate change issues both

  11. Text Nouveau: Visible Structure in Text Presentation.

    ERIC Educational Resources Information Center

    Hunter, Lawrie

    1998-01-01

    Examines the emerging form of text on the World Wide Web and how it is influencing reading, in particular reading by non-native readers of English. Focus is on the visual representation of text structure. (Author/VWL)

  12. The BlackBerry Project: Capturing the Content of Adolescents' Text Messaging

    ERIC Educational Resources Information Center

    Underwood, Marion K.; Rosen, Lisa H.; More, David; Ehrenreich, Samuel E.; Gentsch, Joanna K.

    2012-01-01

    This article presents an innovative method for capturing the content of adolescents' electronic communication on handheld devices: text messaging, e-mail, and instant messaging. In an ongoing longitudinal study, adolescents were provided with BlackBerry devices with service plans paid for by the investigators, and use of text messaging was…

  13. On-line acquisition, analysis, and e-mailing of high-resolution exact-mass electron impact\\/chemical ionization mass spectrometry data acquired using an automated direct probe

    Microsoft Academic Search

    Nelson Huang; Marshall M. Siegel; Helmut Muenster; Klaus Weissenberg

    1999-01-01

    A complete automation package has been developed for data acquisition, processing, interpreting, and e-mailing of high-resolution\\u000a exact-mass electron impact (EI) and chemical ionization (CI) mass spectrometry data. A commercial high performance magnetic\\u000a sector mass spectrometer equipped with a commercial programmable robotic direct probe was used. The software package contains\\u000a a series of modules that automatically performs all the functions necessary

  14. Policlinico Umberto I -Dipartimento di Scienze Radiologiche, Oncologiche e Anatomo Patologiche Viale Regina Elena, 324 00161 Roma T (+39) 06 49970270 F (+39) 06 491774 e-mail: vincenzo.tombolini@uniroma1.it

    E-print Network

    Di Pillo, Gianni

    .tombolini@uniroma1.it Htpp:w3.uniroma1.it/dip-radiologia C.F. 80209930587 P.I. 02133771002 DIPARTIMENTO DI SCIENZE.uniroma1.it/dip-radiologia C.F. 80209930587 P.I. 02133771002 CONFERISCE Al Dott. Morabito Vincenzo ­ T (+39) 06 49970270 F (+39) 06 491774 ­ e-mail: vincenzo.tombolini@uniroma1.it Htpp:w3.uniroma1.it/dip-radiologia

  15. Selective text utilization and text traversal

    Microsoft Academic Search

    Gerard Salton; James Allan

    1995-01-01

    Many large collections of full-text documents are currently stored in machine-readable form and processed automatically in various ways. These collections may include different types of documents, such as messages, research articles, and books, and the subject matter may vary widely. To process such collections, robust text analysis methods must be used, capable of handling materials in arbitrary subject areas, and

  16. Writing Home/Decolonizing Text(s)

    ERIC Educational Resources Information Center

    Asher, Nina

    2009-01-01

    The article draws on postcolonial and feminist theories, combined with critical reflection and autobiography, and argues for generating decolonizing texts as one way to write and reclaim home in a postcolonial world. Colonizers leave home to seek power and control elsewhere, and the colonized suffer loss of home as they know it. This dislocation…

  17. TELEFONI INDIRIZZI E.MAIL Allergologiaed

    E-print Network

    Di Pillo, Gianni

    .scanest@uniroma1.it 1. Fisiologia umana II 2. Biochimica II 3. Farmacologia e Tossicologia 4. Medicina interna e 6. Farmacologia e Tossicologia 7. Malattie del Sistema Nervoso Cardiochirurgia Michele TOSCANO

  18. School Grade E-mail Phone

    E-print Network

    ? 4. 20 children are grouped into 10 pairs: one boy and one girl in each pair. In each pair the boy) in all pairs the girl is taller than the boy; (b) in 9 pairs out of 10 the girl is taller than the boy? 5

  19. Via e-mail February 8, 2011

    E-print Network

    Sheridan, Jennifer

    ) a template for proposals for new centers; (iii) the official list of approved approved centers and that such centers undergo periodic evaluation. Under that a review of the official list of approved centers be conducted every five years

  20. E-mail on the Move

    NASA Technical Reports Server (NTRS)

    1999-01-01

    PocketScience, Inc. was a member of the NASA Ames Technology Commercialization Center. Their PocketMail product is an email service that brings email capabilities to new hand-held devices. The PocketMail service uses technology originally developed at JPL. Through its involvement with the ATCC, PocketScience, Inc. was able to use this space probe communications technology and adapt it for advanced signal processing on Earth.

  1. Stalked by E-mail on Vacation

    ERIC Educational Resources Information Center

    Bugeja, Michael

    2006-01-01

    In this essay, the author describes the difficulties email has introduced to the academic world, from monopolizing faculty's down time to adding a new dimension to interpersonal problems. He discusses the "withdrawal" symptoms he felt when he decided to go without email during a family vacation, and his realization, upon examining the emails sent…

  2. Using E-Mail across Computer Networks.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1990-01-01

    Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)

  3. PTHER: Physical Therapy E-mail List

    NSDL National Science Digital Library

    PTHER is a forum for the exchange of ideas pertaining to treatment protocols, clinic management, and the general advancement of the field of physical therapy. Practicing physical therapists, students of physical therapy, and those interested in physical therapy and related fields are encouraged to subscribe and participate. The list is not moderated.

  4. Subscribe to GAO E-Mail Alerts

    NSDL National Science Digital Library

    1969-12-31

    The U.S. General Accounting Office, Congress' Watchdog agency, now has a mailing list service for a daily electronic posting of the General Accounting Office (GAO) Daybook. The GAO Daybook is the daily listing of released GAO reports and testimony.

  5. E-mail in Semantic Task Management

    Microsoft Academic Search

    Uwe V. Riss; Marlen Jurisch; Viktor Kaufman

    2009-01-01

    Email management applications are among the mostly used tools for collaboration in enterprises. They are often overused and simultaneously criticised for lacking means to prevent cognitive overload of the users and off-target value of the deployed software. Apparently, their value proposition does not cover the user needs for the management of personal communication, information and collaboration appropriately. Recently, several approaches

  6. From Data to Text in the Neonatal Intensive Care Unit: Using NLG Technology for

    E-print Network

    Boyer, Edmond

    1 From Data to Text in the Neonatal Intensive Care Unit: Using NLG Technology for Decision Support Martin d'H`eres, France E-mail: francois.portet@imag.fr Contemporary Neonatal Intensive Care Units decision support in a Neonatal Intensive Care Unit (NICU)2 . As patient care standards improve, the demand

  7. Noisy text categorization

    Microsoft Academic Search

    Alessandro Vinciarelli

    2005-01-01

    This work presents categorization experiments performed over noisy texts. By noisy, we mean any text obtained through an extraction process (affected by errors) from media other than digital texts (e.g., transcriptions of speech recordings extracted with a recognition system). The performance of a categorization system over the clean and noisy (word error rate between ? 10 and ? 50 percent)

  8. Full-Text Databases.

    ERIC Educational Resources Information Center

    Siddiqui, Moid A.

    1991-01-01

    This review of the literature on full-text databases provides information on search strategy, performance measurement, and the benefits and limitations of full text compared to bibliographic database searching. Various use studies and uses of full-text databases are also listed. (21 references) (LAE)

  9. Oxford Text Archive

    NSDL National Science Digital Library

    The well-established Oxford Text Archive can now be accessed via its new web site, a redesign intended to improve navigation, functionality, and to utilize the SGML metadata available for all texts. Users can also now conduct full text searches. Founded in 1976 and based in the Humanities Computing Unit of Oxford University Computing Services, the Oxford Text Archive houses selected academic submissions for the purpose of preserving "high-quality electronic texts for research and teaching." Scholars and other interested users have access to more than 2500 resources in over 25 different languages. The OTA encourages new submissions of quality, scholarly electronic resources.

  10. Persian Text Watermarking

    Microsoft Academic Search

    Ali Asghar Khodami; Khashayar Yaghmaie

    2006-01-01

    Digital watermarking applies to variety of media including image, video, audio and text. Because of the nature of digital\\u000a text, its watermarking methods are special. Moreover, these methods basically depend on the script used in the text. This\\u000a paper reviews application of digital watermarking to Farsi (Persian) and similar scripts (like Arabic, Urdu and Pashto) which\\u000a are substantially different from

  11. TextImages

    NSDL National Science Digital Library

    Trost, Stefan

    2012-03-30

    Those persons who do their own website design will find TextImages most useful. Developed by Stefan Trost, this helpful tool allows users to integrate text written on images into their websites. Visitors can create single text images with this application, along with a wide range of pictures. Visitors also have the ability to precisely adjust the writing, design, format, style, colors, fonts, margins, and spacing as they see fit. The tool is particularly useful for those who want headings or other recurring text to look the same regardless of browser or available fonts. This version is compatible with Windows 7, XP, and Vista.

  12. Text File Comparator

    NASA Technical Reports Server (NTRS)

    Kotler, R. S.

    1983-01-01

    File Comparator program IFCOMP, is text file comparator for IBM OS/VScompatable systems. IFCOMP accepts as input two text files and produces listing of differences in pseudo-update form. IFCOMP is very useful in monitoring changes made to software at the source code level.

  13. Solar Energy Project: Text.

    ERIC Educational Resources Information Center

    Tullock, Bruce, Ed.; And Others

    The text is a compilation of background information which should be useful to teachers wishing to obtain some technical information on solar technology. Twenty sections are included which deal with topics ranging from discussion of the sun's composition to the legal implications of using solar energy. The text is intended to provide useful…

  14. Arabic Short Text Compression

    Microsoft Academic Search

    Eman Omer; Khalaf Khatatneh

    Problem statement: Text compression permits representing a document by using less space. This is useful not only to save disk space, but more importantly, to save disk transfer and network transmission time. With the continues incre ase in the number of Arabic short text messages sent by mobile phones, the use of a suitable compre ssion scheme would allow users

  15. YORUBA, INTERMEDIATE TEXTS.

    ERIC Educational Resources Information Center

    MCCLURE, H. DAVID; OYEWALE, JOHN O.

    THIS COURSE IS BASED ON A SERIES OF BRIEF MONOLOGUES RECORDED BY A WESTERN-EDUCATED NATIVE SPEAKER OF YORUBA FROM THE OYO AREA. THE TAPES CONSTITUTE THE CENTRAL PART OF THE COURSE, WITH THE TEXT INTENDED AS SUPPLEMENTARY AND AUXILIARY MATERIAL. THE TEXT TOPICS WERE CHOSEN FOR THEIR SPECIAL RELEVANCE TO PEACE CORPS VOLUNTEERS WHO EXPECT TO USE…

  16. Making Sense of Texts

    ERIC Educational Resources Information Center

    Harper, Rebecca G.

    2014-01-01

    This article addresses the triadic nature regarding meaning construction of texts. Grounded in Rosenblatt's (1995; 1998; 2004) Transactional Theory, research conducted in an undergraduate Language Arts curriculum course revealed that when presented with unfamiliar texts, students used prior experiences, social interactions, and literary…

  17. Lossy Text Compression Techniques

    NASA Astrophysics Data System (ADS)

    Palaniappan, Venka; Latifi, Shahram

    Most text documents contain a large amount of redundancy. Data compression can be used to minimize this redundancy and increase transmission efficiency or save storage space. Several text compression algorithms have been introduced for lossless text compression used in critical application areas. For non-critical applications, we could use lossy text compression to improve compression efficiency. In this paper, we propose three different source models for character-based lossy text compression: Dropped Vowels (DOV), Letter Mapping (LMP), and Replacement of Characters (ROC). The working principles and transformation methods associated with these methods are presented. Compression ratios obtained are included and compared. Comparisons of performance with those of the Huffman Coding and Arithmetic Coding algorithm are also made. Finally, some ideas for further improving the performance already obtained are proposed.

  18. Text Segmentation by Topic

    Microsoft Academic Search

    Jay M. Ponte; W. Bruce Croft

    1997-01-01

    . We investigate the problem of text segmentation by topic.Applications for this task include topic tracking of broadcast speech dataand topic identification in full-text databases. Researchers have tackledsimilar problems before but with different goals. This study focuses ondata with relatively small segment sizes and for which within-segmentsentences have relatively few words in common making the problem challenging.We present a method

  19. Emotion Detection from Text

    E-print Network

    Shivhare, Shiv Naresh

    2012-01-01

    Emotion can be expressed in many ways that can be seen such as facial expression and gestures, speech and by written text. Emotion Detection in text documents is essentially a content - based classification problem involving concepts from the domains of Natural Language Processing as well as Machine Learning. In this paper emotion recognition based on textual data and the techniques used in emotion detection are discussed.

  20. Text Exchange System

    NASA Technical Reports Server (NTRS)

    Snyder, W. V.; Hanson, R. J.

    1986-01-01

    Text Exchange System (TES) exchanges and maintains organized textual information including source code, documentation, data, and listings. System consists of two computer programs and definition of format for information storage. Comprehensive program used to create, read, and maintain TES files. TES developed to meet three goals: First, easy and efficient exchange of programs and other textual data between similar and dissimilar computer systems via magnetic tape. Second, provide transportable management system for textual information. Third, provide common user interface, over wide variety of computing systems, for all activities associated with text exchange.

  1. BILAN SOCIAL [Texte

    E-print Network

    Sart, Remi

    BILAN SOCIAL 2011 > #12;#12;3) #12;B) 3) 4) #12;§ § § #12;#12;#12;#12;[Texte] L'UBP EN BREF SERVICE DE MÉDECINE DE PRÉVENTION M.-C. Ratinaud SERVICE COMMUN D'ACTION SOCIALE D. Sargos SERVICE DE. Bachelery ÉCOLES DOCTORALES LETTRES, SCIENCES HUMAINES ET SOCIALES E. Lysoe SCIENCES FONDAMENTALES P

  2. [Type text] Northwestern University

    E-print Network

    Shull, Kenneth R.

    [Type text] Northwestern University Office for Research Safety Hazardous Waste Management Program ­ Radiation & Laser Safety Officer Office: (847) 467-0634 24-hour pager: (312) 661-3858 Cell 708 668 8042 (Evanston) (847) 570-2000 STATE AND LOCAL AGENCIES Metropolitan Water Reclamation District (NWRD) (312) 787

  3. STEM Careers Cursive Text

    NSDL National Science Digital Library

    WPSU

    2009-11-10

    This brief video from WPSU compares technologies from yesterday with today. Yesterday a middle school girl writes in cursive while today a girl the same age texts on her cell. The video suggests that science will bring us technologies of tomorrow.

  4. Texting on the Move

    MedlinePLUS

    ... for Parents for Kids for Teens Teens Home Body Mind Sexual Health Food & Fitness Diseases & Conditions Infections Q&A School & Jobs Drugs & Alcohol Staying Safe Recipes En Español ... Guy's Guide to Body Image Texting on the Move KidsHealth > Teens > Staying ...

  5. Elision Based Text Zooming

    Microsoft Academic Search

    Sam Davis

    Scrolling through text documents is a cumbersome and ineffective means of getting context and overview. I present a superior technique that augments scrolling by using elision to simulate zooming. This allows smooth, rapid transitions between overview and detail and effectively supports the task of recovering lost context when reading or navigating through a document. I describe an implementation of the

  6. Text Mining for Neuroscience

    NASA Astrophysics Data System (ADS)

    Tirupattur, Naveen; Lapish, Christopher C.; Mukhopadhyay, Snehasis

    2011-06-01

    Text mining, sometimes alternately referred to as text analytics, refers to the process of extracting high-quality knowledge from the analysis of textual data. Text mining has wide variety of applications in areas such as biomedical science, news analysis, and homeland security. In this paper, we describe an approach and some relatively small-scale experiments which apply text mining to neuroscience research literature to find novel associations among a diverse set of entities. Neuroscience is a discipline which encompasses an exceptionally wide range of experimental approaches and rapidly growing interest. This combination results in an overwhelmingly large and often diffuse literature which makes a comprehensive synthesis difficult. Understanding the relations or associations among the entities appearing in the literature not only improves the researchers current understanding of recent advances in their field, but also provides an important computational tool to formulate novel hypotheses and thereby assist in scientific discoveries. We describe a methodology to automatically mine the literature and form novel associations through direct analysis of published texts. The method first retrieves a set of documents from databases such as PubMed using a set of relevant domain terms. In the current study these terms yielded a set of documents ranging from 160,909 to 367,214 documents. Each document is then represented in a numerical vector form from which an Association Graph is computed which represents relationships between all pairs of domain terms, based on co-occurrence. Association graphs can then be subjected to various graph theoretic algorithms such as transitive closure and cycle (circuit) detection to derive additional information, and can also be visually presented to a human researcher for understanding. In this paper, we present three relatively small-scale problem-specific case studies to demonstrate that such an approach is very successful in replicating a neuroscience expert's mental model of object-object associations entirely by means of text mining. These preliminary results provide the confidence that this type of text mining based research approach provides an extremely powerful tool to better understand the literature and drive novel discovery for the neuroscience community.

  7. e-mail: wzhao10@iit.edu e-mail: kxu8@iit.edu

    E-print Network

    Qian, Xiaoping

    reliable particle pushing without scratching the sample or damaging the tip. One drawback of AFM an atomic force microscope (AFM) based approach for automated manipulation of nanoparticles to form designed successfully imple- mented into an AFM system. We demonstrate that complex designed patterns including over 100

  8. e-mail: puneet.agarwal@stress.com e-mail: lmanuel@mail.utexas.edu

    E-print Network

    Manuel, Lance

    On the Modeling of Nonlinear Waves for Prediction of Long-Term Offshore Wind Turbine Loads In the design of wind practice for modeling waves on offshore wind turbines is limited to the representation of linear irregular not adequately represent waves in shallow waters where most offshore wind turbines are being sited

  9. Internet Sacred Text Archive

    NSDL National Science Digital Library

    The world's philosophical and religious traditions have found a fine home at the Internet Sacred Text Archive, which, as the homepage notes, is "a quiet place in cyberspace devoted to religious tolerance and scholarship." Working together with a number of colleagues and volunteers, JB Hare has compiled this vast archive of sacred and philosophical texts from a number of public-domain sources and placed them on the site. What makes the site so intriguing is that Hare has placed detailed information about the sources and standards that have been deployed for each separate project, which will be of great interest to scholars. While the entire site can be searched, there is much to be learned by looking through the topics listed on the main page, which range from Atlantis to Zoroastrianism. Each separate topic contains a number of accurately transcribed (and some times, translated) primary and secondary documents, such as first-hand collections of oral traditions. For persons looking for their own copy of the material contained on the site, a CD-ROM is available for purchase as well.

  10. Ergito: Virtual Text

    NSDL National Science Digital Library

    Ergito's Virtual Text, started in 2000, was created to provide a more timely and interactive alternative to printed scientific textbooks at the undergraduate and graduate level. This still-developing Web site covers life science writ large, including molecular biology, cell biology, genetics, biochemistry, immunology, and so on. However, only a small number of features are available free of charge. The first chapter of the molecular biology module -- Genes are DNA -- is available for free, as is Great Experiments, a collection of essays written by authors who conducted original research that has contributed greatly to our understanding of molecular and cellular biology. Great Experiments has a recently added essay by 2001 Nobel Prize winner Paul Nurse, titled "The Discovery of cdc2 as the Key Regulator of the Cell Cycle." These essays are formatted just as the Virtual Text pages are, with downloadable figures, a glossary, an online note-taking feature (notes are automatically compiled with a summary of the essay), glossary, and more. Ergito will soon make available Techniques, another free feature offering descriptions of widely used experimental protocols. Even without free access to the larger body of material in this Web site, Ergito is a fantastic resource for learning about molecular and cellular biology. Users must complete a free registration process to access this Web site.

  11. Reception of Texts Database

    NSDL National Science Digital Library

    Created by the Reception of Texts Project at the Open University, this pilot database is designed to help practitioners of reception studies "address issues of performance with the same degree of rigour and attention to evidence which is expected in textual studies and to develop ways of documenting performance which recognise its cross disciplinary and creative dimensions." To that end, academics and students in classical studies, literature, theater studies, and related fields can use this database to search for information on the performances of Greek plays in the original and in adaptations, versions and translations in English from c.1970 to the present, and in the future, poetry in English which draws on Greek texts, myths, and images. The database offers nine search categories, each with a slightly different search format, some offering only a simple keyword search, others with multiple modifiers, and others with pull-down menus for browsing. With the exception of the Critical Works category, searches ultimately return a Production Details page which generally includes modern and original title, year, theater, dates of performance, company, and music, design, and general notes. A useful feature throughout the database is a Missing Information form, which allows users to submit additional or missing information about specific entries.

  12. Ways students read texts

    NASA Astrophysics Data System (ADS)

    Wandersee, James H.

    College students responding to the Preferred Method of Study (PMOS) questionnaire explained how they approach reading a new textbook chapter for comprehension. Results indicated that a significant positive correlation exists between the number of passes a student makes at new textbook material and his/her college grade-point average. Women showed a significant preference for adopting a single method of study. Less than half of the students queried construct organizational tools such as outlines or diagrams as they study a textbook. Students said they would alter their textbook strategies in response to the type of test they expected significantly more often than they would for the type of subject matter being studied. Only 6% of the students said they make a conscious effort to link the new concepts in the text to prior knowledge. There was no discernable relationship between the study strategies undergraduate college students employ and their college grade level (freshman through senior).

  13. Magnetic Resonance Online Texts

    NSDL National Science Digital Library

    S�½kora, Stanislav

    This well-organized and very thorough website was developed by the physicist Stanislav Sykora with the aim of providing free online texts, theses, and course materials on the subjects of magnetic resonance (MR), magnetic resonance imaging (MRI), nuclear-magnetic resonance (NMR) and other related topics. The amount of material on the site is impressive. At the top of the page are links to an "MR Blog", as well as to "MR Links" and the "Site Plan & SEARCH". The NMR/MRI Extras section on the right side of the page is particularly useful for visitors interested in all things about MR. Its links to "Events" provides an up-to-date list of symposia, conferences, and meetings, along with links to the events' sites. The "Societies" link offers at least 50 groups about MR, some of which are country-based, and others that are region- or application-based.

  14. Important Text Characteristics for Early-Grades Text Complexity

    ERIC Educational Resources Information Center

    Fitzgerald, Jill; Elmore, Jeff; Koons, Heather; Hiebert, Elfrieda H.; Bowen, Kimberly; Sanford-Moore, Eleanor E.; Stenner, A. Jackson

    2015-01-01

    The Common Core set a standard for all children to read increasingly complex texts throughout schooling. The purpose of the present study was to explore text characteristics specifically in relation to early-grades text complexity. Three hundred fifty primary-grades texts were selected and digitized. Twenty-two text characteristics were identified…

  15. E-mail people@rice.eduOffice 713-348-2514Fax 713-348-5479Rice University Human Resources -MS 92 P.O. Box 1892Houston, TX 77251-1892www.rice.edu Rev. 02/10/10

    E-print Network

    E-mail people@rice.eduOffice 713-348-2514Fax 713-348-5479Rice University Human Resources - MS 92 P Employee Name: (Please Print) Employee ID Number: Last four digits of SSN: I hereby give Rice University

  16. Featurizing Text: Converting Text into Predictors for Regression Analysis

    E-print Network

    Stine, Robert A.

    : sentiment analysis, n-gram, latent semantic analysis, text mining Research supported by NSF grant 1106743 1 text with numerical data suitable for in regres- sion analysis. For example, patient medical recordsFeaturizing Text: Converting Text into Predictors for Regression Analysis Dean P. Foster Mark

  17. GPM Mission Gridded Text Products Providing Surface Precipitation Retrievals

    NASA Astrophysics Data System (ADS)

    Stocker, Erich Franz; Kelley, Owen; Huffman, George; Kummerow, Christian

    2015-04-01

    In February 2015, the Global Precipitation Measurement (GPM) mission core satellite will complete its first year in space. The core satellite carries a conically scanning microwave imager called the GPM Microwave Imager (GMI), which also has 166 GHz and 183 GHz frequency channels. The GPM core satellite also carries a dual frequency radar (DPR) which operates at Ku frequency, similar to the Tropical Rainfall Measuring Mission (TRMM) Precipitation Radar), and a new Ka frequency. The precipitation processing system (PPS) is producing swath-based instantaneous precipitation retrievals from GMI, both radars including a dual-frequency product, and a combined GMI/DPR precipitation retrieval. These level 2 products are written in the HDF5 format and have many additional parameters beyond surface precipitation that are organized into appropriate groups. While these retrieval algorithms were developed prior to launch and are not optimal, these algorithms are producing very creditable retrievals. It is appropriate for a wide group of users to have access to the GPM retrievals. However, for reseachers requiring only surface precipitation, these L2 swath products can appear to be very intimidating and they certainly do contain many more variables than the average researcher needs. Some researchers desire only surface retrievals stored in a simple easily accessible format. In response, PPS has begun to produce gridded text based products that contain just the most widely used variables for each instrument (surface rainfall rate, fraction liquid, fraction convective) in a single line for each grid box that contains one or more observations. This paper will describe the gridded data products that are being produced and provide an overview of their content. Currently two types of gridded products are being produced: (1) surface precipitation retrievals from the core satellite instruments - GMI, DPR, and combined GMI/DPR (2) surface precipitation retrievals for the partner constellation satellites. Both of these gridded products are generated for a .25 degree x .25 degree hourly grid, which are packaged into daily ASCII files that can downloaded from the PPS FTP site. To reduce the download size, the files are compressed using the gzip utility. This paper will focus on presenting high-level details about the gridded text product being generated from the instruments on the GPM core satellite. But summary information will also be presented about the partner radiometer gridded product. All retrievals for the partner radiometer are done using the GPROF2014 algorithm using as input the PPS generated inter-calibrated 1C product for the radiometer.

  18. Zipf rank approach and cross-country convergence of incomes This article has been downloaded from IOPscience. Please scroll down to see the full text article.

    E-print Network

    Stanley, H. Eugene

    IOPscience. Please scroll down to see the full text article. 2011 EPL 94 48001 (http, EU 3 Harvard Medical School and Division of Sleep Medicine, Brigham and Women's Hospital Boston, MA)E-mail: bp@phy.hr model a) the long-run rate of growth is exogenously deter- mined (outside of the model

  19. Mining the Text: 34 Text Features that Can Ease or Obstruct Text Comprehension and Use

    ERIC Educational Resources Information Center

    White, Sheida

    2012-01-01

    This article presents 34 characteristics of texts and tasks ("text features") that can make continuous (prose), noncontinuous (document), and quantitative texts easier or more difficult for adolescents and adults to comprehend and use. The text features were identified by examining the assessment tasks and associated texts in the national…

  20. Text Complexity and the CCSS

    ERIC Educational Resources Information Center

    Aspen Institute, 2012

    2012-01-01

    What is meant by text complexity is a measurement of how challenging a particular text is to read. There are a myriad of different ways of explaining what makes text challenging to read, from the sophistication of the vocabulary employed to the length of its sentences to even measurements of how the text as a whole coheres. Research shows that no…

  1. The Challenge of Challenging Text

    ERIC Educational Resources Information Center

    Shanahan, Timothy; Fisher, Douglas; Frey, Nancy

    2012-01-01

    The Common Core State Standards emphasize the value of teaching students to engage with complex text. But what exactly makes a text complex, and how can teachers help students develop their ability to learn from such texts? The authors of this article discuss five factors that determine text complexity: vocabulary, sentence structure, coherence,…

  2. Systematic Characterizations of Text Similarity in Full Text Biomedical Publications

    Microsoft Academic Search

    Zhaohui Sun; Mounir Errami; Tara Long; Chris Renard; Nishant Choradia; Harold Garner; Walter H. Curioso

    2010-01-01

    BackgroundComputational methods have been used to find duplicate biomedical publications in MEDLINE. Full text articles are becoming increasingly available, yet the similarities among them have not been systematically studied. Here, we quantitatively investigated the full text similarity of biomedical publications in PubMed Central.Methodology\\/Principal Findings72,011 full text articles from PubMed Central (PMC) were parsed to generate three different datasets: full texts,

  3. A New Block Partitioned Text Feature for Text Verification

    Microsoft Academic Search

    Xiufei Wang; Lei Huang; Changping Liu

    2009-01-01

    In this paper, a new feature for text verification is proposed. The difficulties for the selection of features for text verification (FTV) are first discussed, followed by two principles for the FTV: the FTV should minimize the influence of backgrounds, and it should also be expressive enough for all the texts varied in structures prominently. In this paper, we exploit

  4. Choosing Software for Text Processing.

    ERIC Educational Resources Information Center

    Mason, Robert M.

    1983-01-01

    Review of text processing software for microcomputers covers data entry, text editing, document formatting, and spelling and proofreading programs including "Wordstar,""PeachText,""PerfectWriter,""Select," and "The Word Plus.""The Whole Earth Software Catalog" and a new terminal to be manufactured for OCLC by IBM are mentioned. (EJS)

  5. Informational Text and the CCSS

    ERIC Educational Resources Information Center

    Aspen Institute, 2012

    2012-01-01

    What constitutes an informational text covers a broad swath of different types of texts. Biographies & memoirs, speeches, opinion pieces & argumentative essays, and historical, scientific or technical accounts of a non-narrative nature are all included in what the Common Core State Standards (CCSS) envisions as informational text. Also included…

  6. Too Dumb for Complex Texts?

    ERIC Educational Resources Information Center

    Bauerlein, Mark

    2011-01-01

    High school students' lack of experience and practice with reading complex texts is a primary cause of their difficulties with college-level reading. Filling the syllabus with digital texts does little to address this deficiency. Complex texts demand three dispositions from readers: a willingness to probe works characterized by dense meanings, the…

  7. ParaText : scalable text analysis and visualization.

    SciTech Connect

    Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-07-01

    Automated analysis of unstructured text documents (e.g., web pages, newswire articles, research publications, business reports) is a key capability for solving important problems in areas including decision making, risk assessment, social network analysis, intelligence analysis, scholarly research and others. However, as data sizes continue to grow in these areas, scalable processing, modeling, and semantic analysis of text collections becomes essential. In this paper, we present the ParaText text analysis engine, a distributed memory software framework for processing, modeling, and analyzing collections of unstructured text documents. Results on several document collections using hundreds of processors are presented to illustrate the exibility, extensibility, and scalability of the the entire process of text modeling from raw data ingestion to application analysis.

  8. Complex dynamics of text analysis

    NASA Astrophysics Data System (ADS)

    Ke, Xiaohua; Zeng, Yongqiang; Ma, Qinghua; Zhu, Lin

    2014-12-01

    This paper presents a novel method for the analysis of nonlinear text quality in Chinese language. Texts produced by university students in China were represented as scale-free networks (word adjacency model), from which typical network features such as the in/outdegree, clustering coefficient and network dynamics were obtained. The method integrates the classical concepts of network feature representation and text quality series variation. The analytical and numerical scheme leads to a parameter space representation that constitutes a valid alternative to represent the network features. The results reveal that complex network features of different text qualities can be clearly revealed and applied to potential applications in other instances of text analysis.

  9. ParaText : scalable text modeling and analysis.

    SciTech Connect

    Dunlavy, Daniel M.; Stanton, Eric T.; Shead, Timothy M.

    2010-06-01

    Automated processing, modeling, and analysis of unstructured text (news documents, web content, journal articles, etc.) is a key task in many data analysis and decision making applications. As data sizes grow, scalability is essential for deep analysis. In many cases, documents are modeled as term or feature vectors and latent semantic analysis (LSA) is used to model latent, or hidden, relationships between documents and terms appearing in those documents. LSA supplies conceptual organization and analysis of document collections by modeling high-dimension feature vectors in many fewer dimensions. While past work on the scalability of LSA modeling has focused on the SVD, the goal of our work is to investigate the use of distributed memory architectures for the entire text analysis process, from data ingestion to semantic modeling and analysis. ParaText is a set of software components for distributed processing, modeling, and analysis of unstructured text. The ParaText source code is available under a BSD license, as an integral part of the Titan toolkit. ParaText components are chained-together into data-parallel pipelines that are replicated across processes on distributed-memory architectures. Individual components can be replaced or rewired to explore different computational strategies and implement new functionality. ParaText functionality can be embedded in applications on any platform using the native C++ API, Python, or Java. The ParaText MPI Process provides a 'generic' text analysis pipeline in a command-line executable that can be used for many serial and parallel analysis tasks. ParaText can also be deployed as a web service accessible via a RESTful (HTTP) API. In the web service configuration, any client can access the functionality provided by ParaText using commodity protocols ... from standard web browsers to custom clients written in any language.

  10. Texting while driving: is speech-based text entry less risky than handheld text entry?

    PubMed

    He, J; Chaparro, A; Nguyen, B; Burge, R J; Crandall, J; Chaparro, B; Ni, R; Cao, S

    2014-11-01

    Research indicates that using a cell phone to talk or text while maneuvering a vehicle impairs driving performance. However, few published studies directly compare the distracting effects of texting using a hands-free (i.e., speech-based interface) versus handheld cell phone, which is an important issue for legislation, automotive interface design and driving safety training. This study compared the effect of speech-based versus handheld text entries on simulated driving performance by asking participants to perform a car following task while controlling the duration of a secondary text-entry task. Results showed that both speech-based and handheld text entries impaired driving performance relative to the drive-only condition by causing more variation in speed and lane position. Handheld text entry also increased the brake response time and increased variation in headway distance. Text entry using a speech-based cell phone was less detrimental to driving performance than handheld text entry. Nevertheless, the speech-based text entry task still significantly impaired driving compared to the drive-only condition. These results suggest that speech-based text entry disrupts driving, but reduces the level of performance interference compared to text entry with a handheld device. In addition, the difference in the distraction effect caused by speech-based and handheld text entry is not simply due to the difference in task duration. PMID:25089769

  11. Click here to add text Click here to add text. Click here to add text.

    E-print Network

    Martin, Jeff

    text. Click here to add text. Click here to add text. Personal Information (PI) Recorded information, nationality or ethnic origin · Religion or creed, belief system, association or activity · Personal health Provide Access to Information · Public may request access to general University records · Individuals may

  12. Hierarchical Text Classification Incremental Learning

    Microsoft Academic Search

    Shengli Song; Xiaofei Qiao; Ping Chen

    2009-01-01

    \\u000a To classify large-scale text corpora, an incremental learning method for hierarchical text classification is proposed. Based\\u000a on the deep analysis of virtual classification tree based hierarchical text classification, combining the two application\\u000a models of single document adjustment after classification and new sample set learning, a dynamic online learning algorithm\\u000a and a sample set incremental learning algorithm are put forward. By

  13. Scene text deblurring using text-specific multiscale dictionaries.

    PubMed

    Cao, Xiaochun; Ren, Wenqi; Zuo, Wangmeng; Guo, Xiaojie; Foroosh, Hassan

    2015-04-01

    Texts in natural scenes carry critical semantic clues for understanding images. When capturing natural scene images, especially by handheld cameras, a common artifact, i.e., blur, frequently happens. To improve the visual quality of such images, deblurring techniques are desired, which also play an important role in character recognition and image understanding. In this paper, we study the problem of recovering the clear scene text by exploiting the text field characteristics. A series of text-specific multiscale dictionaries (TMD) and a natural scene dictionary is learned for separately modeling the priors on the text and nontext fields. The TMD-based text field reconstruction helps to deal with the different scales of strings in a blurry image effectively. Furthermore, an adaptive version of nonuniform deblurring method is proposed to efficiently solve the real-world spatially varying problem. Dictionary learning allows more flexible modeling with respect to the text field property, and the combination with the nonuniform method is more appropriate in real situations where blur kernel sizes are depth dependent. Experimental results show that the proposed method achieves the deblurring results with better visual quality than the state-of-the-art methods. PMID:25705915

  14. User profiling using text classification

    Microsoft Academic Search

    Patricia H. Carter

    2005-01-01

    Computer user behavior over time is abstracted into text documents. Using text classification methods users from a small group are well-distinguished from one another by their behaviors, even using relatively small amounts of data. This technique is particularly appropriate to forensics, but is widely applicable in information assurance.

  15. Text, Topos, and Mental Models.

    ERIC Educational Resources Information Center

    Jarvella, Robert J.; And Others

    1995-01-01

    Investigates how readers use predication for the interpretation of referents in text and to develop a coherent model of the events described in text. Illustrates how two types of predication (scalar copredication and antipredication) induce readers to disambiguate the referents of definite noun phrases in essentially the opposite way, with…

  16. Automated Text Summarization in SUMMARIST

    Microsoft Academic Search

    Eduard Hovy; Chin-Yew Lin

    1999-01-01

    SUMMARIST is an attempt to create a robust automated text summarization system, based on the 'equation': summarization = topic identification + interpretation + generation. Each of these stages contains several independent modules, many of them trained on large corpora of text. We describe the system's architecture and provide details of some of its modules.

  17. Intercultural Rhetoric Research: Beyond Texts

    ERIC Educational Resources Information Center

    Connor, Ulla

    2004-01-01

    This paper proposes a set of new methods for intercultural rhetoric research that is context-sensitive and, in many instances, goes beyond mere text analysis. It considers changes in the field as intercultural rhetoric has moved from the EAP study of student essays to the study of writing in many disciplines and genres. New developments in text,…

  18. Improve Reading with Complex Texts

    ERIC Educational Resources Information Center

    Fisher, Douglas; Frey, Nancy

    2015-01-01

    The Common Core State Standards have cast a renewed light on reading instruction, presenting teachers with the new requirements to teach close reading of complex texts. Teachers and administrators should consider a number of essential features of close reading: They are short, complex texts; rich discussions based on worthy questions; revisiting…

  19. Text Mining Using Linear Models

    E-print Network

    Stine, Robert A.

    ) or something else. Wiki example Jim bought 300 shares of Acme Corp in 2006. Customized systems build Statistical Models for Text Markov chains Hidden Markov models have been successfully used in text mining, particularly speech tagging Hidden Markov model (HMM) Transition probabilities for observed words ! P(wt|wt-1

  20. Graphic design of program text

    Microsoft Academic Search

    Aaron Marcus; Ronald Baecker

    1982-01-01

    Computer programs, like literature, deserve attention not only to conceptual and verbal (linguistic) structure but also to visual structure, i.e., the qualities of alphanumeric text fonts and other graphic symbols, the spatial arrangement of isolated texts and symbols, the temporal sequencing of individual parts of the program, and the use of color (including gray values). With the increasing numbers of

  1. Text recycling: acceptable or misconduct?

    PubMed

    Harriman, Stephanie; Patel, Jigisha

    2014-01-01

    Text recycling, also referred to as self-plagiarism, is the reproduction of an author's own text from a previous publication in a new publication. Opinions on the acceptability of this practice vary, with some viewing it as acceptable and efficient, and others as misleading and unacceptable. In light of the lack of consensus, journal editors often have difficulty deciding how to act upon the discovery of text recycling. In response to these difficulties, we have created a set of guidelines for journal editors on how to deal with text recycling. In this editorial, we discuss some of the challenges of developing these guidelines, and how authors can avoid undisclosed text recycling. PMID:25127654

  2. Why is Light Text Harder to Read Than Dark Text?

    NASA Technical Reports Server (NTRS)

    Scharff, Lauren V.; Ahumada, Albert J.

    2005-01-01

    Scharff and Ahumada (2002, 2003) measured text legibility for light text and dark text. For paragraph readability and letter identification, responses to light text were slower and less accurate for a given contrast. Was this polarity effect (1) an artifact of our apparatus, (2) a physiological difference in the separate pathways for positive and negative contrast or (3) the result of increased experience with dark text on light backgrounds? To rule out the apparatus-artifact hypothesis, all data were collected on one monitor. Its luminance was measured at all levels used, and the spatial effects of the monitor were reduced by pixel doubling and quadrupling (increasing the viewing distance to maintain constant angular size). Luminances of vertical and horizontal square-wave gratings were compared to assess display speed effects. They existed, even for 4-pixel-wide bars. Tests for polarity asymmetries in display speed were negative. Increased experience might develop full letter templates for dark text, while recognition of light letters is based on component features. Earlier, an observer ran all conditions at one polarity and then switched. If dark and light letters were intermixed, the observer might use component features on all trials and do worse on the dark letters, reducing the polarity effect. We varied polarity blocking (completely blocked, alternating smaller blocks, and intermixed blocks). Letter identification responses times showed polarity effects at all contrasts and display resolution levels. Observers were also more accurate with higher contrasts and more pixels per degree. Intermixed blocks increased the polarity effect by reducing performance on the light letters, but only if the randomized block occurred prior to the nonrandomized block. Perhaps observers tried to use poorly developed templates, or they did not work as hard on the more difficult items. The experience hypothesis and the physiological gain hypothesis remain viable explanations.

  3. Stemming Malay Text and Its Application in Automatic Text Categorization

    NASA Astrophysics Data System (ADS)

    Yasukawa, Michiko; Lim, Hui Tian; Yokoo, Hidetoshi

    In Malay language, there are no conjugations and declensions and affixes have important grammatical functions. In Malay, the same word may function as a noun, an adjective, an adverb, or, a verb, depending on its position in the sentence. Although extensively simple root words are used in informal conversations, it is essential to use the precise words in formal speech or written texts. In Malay, to make sentences clear, derivative words are used. Derivation is achieved mainly by the use of affixes. There are approximately a hundred possible derivative forms of a root word in written language of the educated Malay. Therefore, the composition of Malay words may be complicated. Although there are several types of stemming algorithms available for text processing in English and some other languages, they cannot be used to overcome the difficulties in Malay word stemming. Stemming is the process of reducing various words to their root forms in order to improve the effectiveness of text processing in information systems. It is essential to avoid both over-stemming and under-stemming errors. We have developed a new Malay stemmer (stemming algorithm) for removing inflectional and derivational affixes. Our stemmer uses a set of affix rules and two types of dictionaries: a root-word dictionary and a derivative-word dictionary. The use of set of rules is aimed at reducing the occurrence of under-stemming errors, while that of the dictionaries is believed to reduce the occurrence of over-stemming errors. We performed an experiment to evaluate the application of our stemmer in text mining software. For the experiment, text data used were actual web pages collected from the World Wide Web to demonstrate the effectiveness of our Malay stemming algorithm. The experimental results showed that our stemmer can effectively increase the precision of the extracted Boolean expressions for text categorization.

  4. Discourse Analysis and Structuring Text.

    ERIC Educational Resources Information Center

    Pace, Ann Jaffe

    1980-01-01

    Reviews the kinds of discourse analyses that are currently being undertaken, summarizes research findings, and makes suggestions based on these findings for structuring texts to be used for instructional or informational purposes. (Author/MER)

  5. Text Analysis for Knowledge Graphs

    Microsoft Academic Search

    Roel Popping

    2007-01-01

    :  The concept of knowledge graphs is introduced as a method to represent the state of the art in a specific scientific discipline.\\u000a Next the text analysis part in the construction of such graphs is considered. Here the ‘translation’ from text to graph takes\\u000a place. The method that is used here is compared to methods used in other approaches in which

  6. Text Mining in Social Networks

    NASA Astrophysics Data System (ADS)

    Aggarwal, Charu C.; Wang, Haixun

    Social networks are rich in various kinds of contents such as text and multimedia. The ability to apply text mining algorithms effectively in the context of text data is critical for a wide variety of applications. Social networks require text mining algorithms for a wide variety of applications such as keyword search, classification, and clustering. While search and classification are well known applications for a wide variety of scenarios, social networks have a much richer structure both in terms of text and links. Much of the work in the area uses either purely the text content or purely the linkage structure. However, many recent algorithms use a combination of linkage and content information for mining purposes. In many cases, it turns out that the use of a combination of linkage and content information provides much more effective results than a system which is based purely on either of the two. This paper provides a survey of such algorithms, and the advantages observed by using such algorithms in different scenarios. We also present avenues for future research in this area.

  7. Text Structures, Readings, and Retellings: An Exploration of Two Texts

    ERIC Educational Resources Information Center

    Martens, Prisca; Arya, Poonam; Wilson, Pat; Jin, Lijun

    2007-01-01

    The purpose of this study is to explore the relationship between children's use of reading strategies and language cues while reading and their comprehension after reading two texts: "Cherries and Cherry Pits" (Williams, 1986) and "There's Something in My Attic" (Mayer, 1988). The data were drawn from a larger study of the reading strategies of…

  8. Alex Catalog of Electronic Texts

    NSDL National Science Digital Library

    This catalog, maintained by Eric Lease Morgan, a systems librarian at North Carolina State University, specializes in American literature, English literature, and philosophy. Alex is particularly helpful because the search interface allows researchers to both look for documents and search the content of those documents. Users first search standard fields such as author, title, or publication date; then they can search the content of documents they select from their returns list. Though returns in content searches would be more convenient were they hyperlinked to the complete record for the text, such a search nonetheless has obvious utility for someone writing on, for example, flower imagery in Shakespearian sonnets or Emerson's vision of democracy. Another nice feature of the catalog is the ability to convert documents to .pdf files on-the-fly (with the font and spacing customizable). Alternately, users can download the whole collection of American or English literature or philosophy texts and the tools to search the texts.

  9. Finding text in color images

    NASA Astrophysics Data System (ADS)

    Zhou, Jiangying; Lopresti, Daniel P.; Tasdizen, Tolga

    1998-04-01

    In this paper, we consider the problem of locating and extracting text from WWW images. A previous algorithm based on color clustering and connected components analysis works well as long as the color of each character is relatively uniform and the typography is fairly simple. It breaks down quickly, however, when these assumptions are violated. In this paper, we describe more robust techniques for dealing with this challenging problem. We present an improved color clustering algorithm that measures similarity based on both RGB and spatial proximity. Layout analysis is also incorporated to handle more complex typography. THese changes significantly enhance the performance of our text detection procedure.

  10. Biomarker Identification Using Text Mining

    PubMed Central

    Li, Hui; Liu, Chunmei

    2012-01-01

    Identifying molecular biomarkers has become one of the important tasks for scientists to assess the different phenotypic states of cells or organisms correlated to the genotypes of diseases from large-scale biological data. In this paper, we proposed a text-mining-based method to discover biomarkers from PubMed. First, we construct a database based on a dictionary, and then we used a finite state machine to identify the biomarkers. Our method of text mining provides a highly reliable approach to discover the biomarkers in the PubMed database. PMID:23197989

  11. Text Classification using String Kernels

    Microsoft Academic Search

    Huma Lodhi; Craig Saunders; John Shawe-Taylor; Nello Cristianini; Christopher J. C. H. Watkins

    2002-01-01

    We propose a novel approach for categorizing text\\u000a documents based on the use of a special kernel. The kernel\\u000a is an inner product in the feature space generated by all\\u000a subsequences of length k. A subsequence is any ordered\\u000a sequence of k characters occurring in the text though not\\u000a necessarily contiguously. The subsequences are weighted by\\u000a an exponentially decaying factor

  12. Text Mining Nonnegative Matrix Factorization

    E-print Network

    Kunkle, Tom

    Text Mining using the Nonnegative Matrix Factorization Amy Langville Carl Meyer Department: Guide D3: Child Safety at Home T4: Health D4: Your Baby's Health & Safety : From Infant to Toddler T5 Babies Collector's Guide T8: Safety T9: Toddler #12;Example from Berry's book Terms Documents T1: Bab

  13. A Visually Oriented Text Editor

    NASA Technical Reports Server (NTRS)

    Gomez, J. E.

    1985-01-01

    HERMAN employs Evans & Sutherland Picture System 2 to provide screenoriented editing capability for DEC PDP-11 series computer. Text altered by visual indication of characters changed. Group of HERMAN commands provides for higher level operations. HERMAN provides special features for editing FORTRAN source programs.

  14. Reviving "Walden": Mining the Text.

    ERIC Educational Resources Information Center

    Hewitt Julia

    2000-01-01

    Describes how the author and her high school English students begin their study of Thoreau's "Walden" by mining the text for quotations to inspire their own writing and discussion on the topic, "How does Thoreau speak to you or how could he speak to someone you know?" (SR)

  15. Predictive Encoding in Text Compression.

    ERIC Educational Resources Information Center

    Raita, Timo; Teuhola, Jukka

    1989-01-01

    Presents three text compression methods of increasing power and evaluates each based on the trade-off between compression gain and processing time. The advantages of using hash coding for speed and optimal arithmetic coding to successor information for compression gain are discussed. (26 references) (Author/CLB)

  16. Extracting company names from text

    Microsoft Academic Search

    Lisa F. Rau

    1991-01-01

    A detailed description is given of an implemented algorithm that extracts company names automatically from financial news. Extracting company names from text is one problem; recognizing subsequent references to a company is another. The author addresses both problems in an implemented, well-tested module that operates as a detachable process from a set of natural language processing tools. She implements a

  17. Bornholm Text analysis rup Nielsen

    E-print Network

    Nielsen, Finn Årup

    white spaces! #15; Web search engines { Letters (case-insensitive) and digits as characters { Everything.nih.gov/entrez/query/static/help/pmhelp.html#Stopwords. #15; Implemented in web search engine such as Google? \\Google ignores common words and characters; Statistical language processing #15; Examples { Text classication { Authorship with N-grams { Topic spotting

  18. This Article Full Text (PDF)

    E-print Network

    Lopez, John M.

    This Article Full Text (PDF) Alert me when this article is cited Alert me if a correction is posted Services Email this article to a friend Similar articles in this journal Alert me to new issues Articles by LOPEZ, J. M. Articles by MURPHY, J. O. Search for Related Content Social Bookmarking What

  19. Applications of Multilingual Text Retrieval

    Microsoft Academic Search

    W. Bruce Croft; John Broglio; Hideo Fujii

    1996-01-01

    The recent enormous increase in the use of networked information access and on-line databases has led to more databases being available in languages other than English. The Center for Intelligent Information Retrieval (CIIR) at the University of Massachusetts is involved in a variety of industrial government, and digital library applications which have a need for multilingual text retrieval. Most information

  20. Combining classifiers in text categorization

    Microsoft Academic Search

    Leah S. Larkey; W. Bruce Croft

    1996-01-01

    Three different types of classifiers were investigatedin the context of a text categorization problem in the medical do- main: the automatic assignment of ICD9 codes to dictated inpatient discharge summaries. K-nearest-neighbor, rele- vance feedback, and Bayesian independence classifiers were applied individually and in combination. A coknbination of different classifiers produced better results than any sin- gle type of classifier. For

  1. Ageism in Undergraduate Psychology Texts.

    ERIC Educational Resources Information Center

    Whitbourne, Susan Krauss; Hulicka, Irene M.

    1990-01-01

    A study of 139 textbooks written over the last 40 years. Recent texts are found to give more coverage to the psychology of later life, and many seek to present a positive image of aging and older adults. These treatments, however, often contain material that perpetuates stereotypes. (EVL)

  2. Policy Discourses in School Texts

    ERIC Educational Resources Information Center

    Maguire, Meg; Hoskins, Kate; Ball, Stephen; Braun, Annette

    2011-01-01

    In this paper, we focus on some of the ways in which schools are both productive of and constituted by sets of "discursive practices, events and texts" that contribute to the process of policy enactment. As Colebatch (2002: 2) says, "policy involves the creation of order--that is, shared understandings about how the various participants will act…

  3. Critical Edition of Sanskrit Texts

    Microsoft Academic Search

    Marc Csernel; François Patte

    2008-01-01

    A critical edition takes into account all the different known versions of the same text in order to show the differ- ences between any two distinct versions. The construction of a critical edition is a long and, sometimes, tedious work. Some software that help the philologist in such a task have been available for a long time for the European

  4. Alan Thrift e-mail: alan.thrift@siemens.com

    E-print Network

    Thole, Karen A.

    to engine thermal efficiency can be gained if the performance of the leakage flow in reducing the end- wall flat and one axisymmetric contoured endwall with a slope of 45 deg. Both endwalls incorporated a slot

  5. Minjung Kwak e-mail: kwak14@illinois.edu

    E-print Network

    Kim, Harrison

    , University of Illinois at Urbana-Champaign, Urbana, IL 61801 E-Waste Stream Analysis and Design Implications as the major sources of the uncertainty that complicates the e-waste recovery. This paper presents the results of an analysis of data from an incoming stream for an e-waste collection center and analyzes the quantity and age

  6. Minjung Kwak e-mail: kwak14@illinois.edu

    E-print Network

    Kim, Harrison

    to this improvement, sometimes called "Green IT", are discussed, including E-waste mitigation, data center economies of reduced electricity use and lower carbon footprint is a model for other sectors. Keywords E-waste, Green

  7. CHERYL A. LASZYNSKI E-mail: claszynski@purdue.edu

    E-print Network

    Ginzel, Matthew

    status of all funded contracts and grant activity for compliance with applicable University, government development, personnel management, contract negotiations and fiscal management. Five years experience in WorkLife Programs and Staff Benefits. Skills include problem solving, interdepartmental communication

  8. R. A. Wirtz e-mail: rawirtz@unr.edu

    E-print Network

    Wirtz, Richard A.

    of Nevada, Reno, Reno, NV 89557 A Hybrid Thermal Energy Storage Device, Part 1: Design Methodology A thermal response model for designing a hybrid thermal energy storage (TES) heat sink is developed coolers must be designed for peak power operation. Incorporation of a Thermal Energy Storage TES mechanism

  9. E-Mail karger@karger.com Research Paper

    E-print Network

    Hammock, Bruce D.

    Soluble Epoxide Hydrolase and Oxylipin Levels in a Porcine Arteriovenous Graft Stenosis Model Christi M in the graft-venous anastomotic tissues when compared to control veins. Pharmacological inhibitors of s effect on the proliferation of these cells. These results provide insights on epoxide biology in vascular

  10. Politeness Strategies in Collaborative E-Mail Exchanges

    ERIC Educational Resources Information Center

    Vinagre, Margarita

    2008-01-01

    Computer-supported collaborative learning (CSCL) has been the subject of a wide range of studies over the last twenty years. Previous research suggests that CSCL exchanges can facilitate group-based learning and knowledge construction among learners who are in different geographical locations [Littleton, K. & Whitelock, D. (2004). "Guiding the…

  11. M. D. Barringer e-mail: mbarringer@psu.edu

    E-print Network

    Thole, Karen A.

    for a Representative Seal Pin Between Two Blades Many land-based gas turbine applications are conducive deposition in a geometry representative of an axial seal pin between two blades. Initial studies were is bled from the compressor and used to cool compo- nents and to minimize hot gas ingestion. As shown

  12. Ali Akturk1 e-mail: akturkali@gmail.com

    E-print Network

    Camci, Cengiz

    of rotor blades and tip vortex was effectively reduced and the aerodynamic performance of the rotor blades of leakage vortex in axial flow fans and compressors in open literature [1­6]. Inoue and Kuroumaru et al. [7 al. [8] also investigated breakdown of tip leakage vor- tex in a low speed axial flow compressor

  13. Vijay Kumar e-mail: kumar2@purdue.edu

    E-print Network

    Rhoads, Jeffrey F.

    Lafayette, IN 47907 Modeling and Analysis of an Optically-Actuated, Bistable MEMS Device Bistable seeks to address this through the modeling and analysis of an optically-actuated, bistable MEMS switch related to bistable systems stems largely from early investigations of structural buckling and post-buckled

  14. Submitting Evaluations through E-mail Page 1 of 1

    E-print Network

    California at Santa Cruz, University of

    - mail, please see the document Submitting Evaluations through MyUCSC (http://reg.ucsc.edu/staff/ais_info/pdf/NES data · For instructions on how to properly format evaluations, go to http://reg.ucsc.edu/NES/nes@ucsc.edu. Step 7 ­ Save the document Step 8 ­ Send completed evaluations to nes@ucsc.edu. Additional online

  15. C. M. Landis e-mail: landis@rice.edu

    E-print Network

    Science, MS 321, Rice University, P.O. Box 1892, Houston, TX 77251 On the Strain Saturation Conditions, embedded in an effective polycrystalline matrix, are performed for differing loading paths in remanent (plastic) strain space. As a result of the asymmetry in the tension versus compression behavior

  16. Exploiting Concept Clumping for Efficient Incremental E-Mail Categorization

    E-print Network

    Wobcke, Wayne

    to, but is different from, concept drift, which is usually taken to be a gradual shift in the meaning of concept drift. A popular method is to use a fixed or adaptive shifting time window [7], [6], [17]. Nishida and Yamauchi [12] use statistical methods to detect concept drift by comparing two accuracy results, one recent

  17. Qiang Huang e-mail: huangq@eng.usf.edu

    E-print Network

    Huang, Qiang

    -MMS), identical work-stations are utilized at each stage to meet the productivity and line balance requirements utilizes identical work-stations at each stage. This type of systems is called Serial-Parallel MMS SP- MMS. In such a system, parts could go through different process routes and some routes may merge at certain stage(s

  18. E-Mail in Academia: Expectations, Use, and Instructional Impact

    ERIC Educational Resources Information Center

    Weiss, Meredith; Hanson-Baldauf, Dana

    2008-01-01

    The popularity of and reliance on emergent computer-mediated communication technologies such as instant messaging, blogs, and social networks have arguably widened the generation gap between faculty and traditional undergraduate students. Marc Prensky defined this generational technology divide by coining the terms "digital natives" and "digital…

  19. Ying Feng Pang e-mail: ypang@vt.edu

    E-print Network

    Thole, Karen A.

    generation of an integrated power electronics module IPEM was used as the design target of this research work Engineering, Center for Power Electronics Systems, Virginia Polytechnic Institute and State University for Power Electronics Systems, Virginia Polytechnic Institute and State University, Blacksburg, VA 24061

  20. E-Mail Lists: Selectivity Makes Lists Efficient.

    ERIC Educational Resources Information Center

    Wilson, Bradley

    2001-01-01

    Notes that email lists have become a popular way for people with similar interests to communicate. Discusses the JEAHELP email list, a private, unmoderated list owned by Candace Perkins Bowen, a past president of the Journalism Education Association. Discuses things to think about before sending a message to an email distribution list. (RS)

  1. IT . * : e-mail: neogates@sclab.yonsei.ac.kr

    E-print Network

    Cho, Sung-Bae

    *** . . . WII (Sony AIBO) HMD . Abstract As studies on more realistic human that easily recognizes user's position and gaze direction and provides remote video information through HMD) , , . , . . . . Wii LED (Device) . (Sony) AIBO HMD(Head Mounted Display) ( 1

  2. Business E-Mail Communication: Some Emerging Tendencies in Register.

    ERIC Educational Resources Information Center

    Gimenez, Julio C.

    2000-01-01

    Investigates whether the spoken nature of electronic mail messages has already started to affect business written communication. Examines register and context of the language as well as the style used in commercial electronic mail. (Author/VWL)

  3. Using E-Mail To Write about Math.

    ERIC Educational Resources Information Center

    Tichenor, Mercedes S.; Jewell, Mary Jean

    2001-01-01

    Describes a collaborative writing project between 13 college and 21 elementary students that engaged them in mathematical discourse via electronic mail. Offers recommendations for teachers wanting to replicate the program. (Contains 11 references.) (Author/JOW)

  4. Laurent Pilon* e-mail: pilon@seas.ucla.edu

    E-print Network

    Pilon, Laurent

    as S r,k,t . Let f p be the distribution function of the energy carriers in the polarization state p Los Angeles, CA 90095 Modified Method of Characteristics for Simulating Microscale Energy Transport This paper presents a new numerical scheme for simulating multidimensional transient and steady

  5. T. S. Fisher e-mail: tsfisher@purdue.edu

    E-print Network

    Walker, D. Greg

    emission from nanoscale emitters with particular focus on thermal and electrical energy transport emission is, in some respects, similar to thermoelectric and thermionic transport. How- ever of Mechanical Engineering, Box 1592, Station B, Nashville, TN 37235 Thermal and Electrical Energy Transport

  6. Marcelo Godoy Simes e-mail: msimoes@mines.edu

    E-print Network

    in English, application of induction generators for renewable energy systems (CRC Press), integration-Verlag on power electronics for integration of renewable energy systems, to be released in 2013 and he also

  7. 1956 . , , 119334, . e-mail: artemeva@psi.edu,

    E-print Network

    Belousov, Alexander

    . ( ) ( ) - ( ) ( ) . , - . #12;61 2. Kieffer S.W. Fluid dynamics of the May 18 blast at Mount St. Helens. In: Lipman P.V., Mullineaux D.R. (eds) The 1980 eruptions of Mount St. Helens, Washington // US Geol. Surv. Prof. Pap. 1981. V of Bezymianny volcano in 1956 and Mt. St. Helens in 1981 were used to determine initial conditions. Total

  8. E-Mail This Article Printer-Friendly Version

    E-print Network

    Catalysis: ......And Replacing Pt with Steel Works in Microbial Electrolysis, Penn State Team Finds UNIVERSITY PARK, PA - Making hydrogen by microbial electrolysis has come a long way in recent years. In a microbial electrolysis cell (MEC), bacteria break up fermented plant waste to form hydrogen. A couple

  9. E-Mail karger@karger.com Cytogenet Genome Res

    E-print Network

    Wendel, Jonathan F.

    chromosome sets [Stebbins, 1947; Grant, 1981; Lewis, 1980; Wendel and Doyle, 2005]. Cytogenetically, auto sets originating from the different species making up the al- lopolyploid genome [Stebbins, 1947

  10. Kathryn E. Johnson e-mail: kathrynjohnson@nrel.gov

    E-print Network

    Pao, Lucy Y.

    ­fingersh@nrel.gov National Renewable Energy Laboratory, 1617 Cole Boulevard, MS 3811, Golden, CO 80401-3393 Mark J. Balas, created us- ing the modeling software PROP, developed by Walker and Wil- son 1 , for the Controls Advanced-bladed, upwind turbine at the National Renewable Energy Laboratory's National Wind Technology Center NWTC

  11. E-Mail karger@karger.com Citation Classics

    E-print Network

    Lefebvre, Louis

    , but ob- tained very similar results from the UK and North American databases, respectively. Later papers for convergent cognitive evolution in birds and primates, and for be- havioral flexibility having important eco

  12. Ankit Kalani e-mail: axk2161@rit.edu

    E-print Network

    Kandlikar, Satish

    heat of vaporization compared to refrigerants, and lower normal boiling point compared to water Boiling With Ethanol at Subatmospheric Pressures for Electronics Cooling The growing trend in miniaturization of electronics has generated a need for efficient thermal management of these devices. Boiling has

  13. S. A. Weaver e-mail: sweaver@sandia.gov

    E-print Network

    Thole, Karen A.

    and friction factors were deduced based on mea- sured flow conditions and known boundary conditions, heat transfer was augmented by 1.1­1.2, while the friction factor was augmented significantly more by 2 perspective to use microchannels to cool components, provided that the pressure to drive the flow through

  14. Andreas A. Malikopoulos e-mail: amaliko@umich.edu

    E-print Network

    Papalambros, Panos

    criteria. This relation- ship is incorporated into the electronic control unit ECU that aims to maintain in capturing transient engine operation designated by common driving habits, e.g., stop-and-go driving, rapid

  15. Pezhman Akbari e-mail: akbari@iupui.edu

    E-print Network

    Müller, Norbert

    characteristics of a variety of engines and ma- chinery utilizing thermodynamic cycles. Although there have been efficiency Shock red is compared with compressor isentropic efficiency Compressor green and subsonic diffuser of the pressure gain p2/p1 obtained by a moving shock wave in a fric- tionless channel, by a compressor

  16. E-Mail karger@karger.com Main Report

    E-print Network

    University College of Physicians and Surgeons, New York, N.Y., USA brains of normal elderly women of reservefromitstheoreticalbasistotheimplicationofreserve for clinical practice. A distinction between brain reserve, re- ferring to individual differences study, the brains of 10 cognitively normal elderly women were found to have Alzheimer's plaques

  17. Cuneyt Sert e-mail: abeskok@mengr.tamu.edu

    E-print Network

    Beskok, Ali

    is imposed on the side boundaries, while the flow is driven by an oscillating pressure gra- dient. These sets engineering applications, including heat ex- changer design, biomedical engineering and micro-fluidics. Steady convect zero net mass. With the advent of micro- electromechanical systems MEMS and micro-fluidics

  18. Printer-friendly format E-mail this story

    E-print Network

    Ruina, Andy L.

    concerns Opinions differ on rise in marijuana treatment Jury deliberates in Blake murder trial Around The Nation Feb. 26, 2005, 9:24PM Strolling robots may signal new strides for prosthetics Latest advances let contraptions walk in a manner similar to humans By BRYN NELSON Newsday WASHINGTON - Three new robots can walk

  19. Frank E. Fresconi e-mail: fresconi@udel.edu

    E-print Network

    Prasad, Ajay K.

    Atmospheric pollutants are capable of causing diseases such as pneumoconiosis, lung cancer, bronchitis may be addressed via delivery of pharmaceutical aerosols 2 . In addition to the aerosol's chemical

  20. Grant Brandal e-mail: gbb2114@columbia.edu

    E-print Network

    Yao, Y. Lawrence

    of dissimilar metals. Due to some of its unique properties, nickel titanium (NiTi) is receiving increasing use pair is joining nickel titanium to stainless steel (SS), using stainless steel where Ni welding. This process reaches lower temperatures, and thus may help minimize intermetallic formation [6

  1. e-mail: jiaqil@uci.edu Juntao Xiong

    E-print Network

    Liu, Feng

    is used to analyze the flow field and evaluate aerodynamic performance. The optimizer is used to identifyBean Alstom Power (Switzerland), Baden 5401, Switzerland Three-Dimensional Aerodynamic Design Optimization to the aerodynamic design optimization of a turbine blade. With the adjoint method, the complete gradient informa

  2. Aravind Seshadri e-mail: aravind.seshadri@okstate.edu

    E-print Network

    Pagilla, Prabhakar R.

    @okstate.edu School of Mechanical and Aerospace Engineering, Oklahoma State University, Stillwater, OK 74078 Optimal is that the shear deformation and rotary inertia ef- fects are negligible for many thin webs. A model that includes shear and rotary effects was discussed in Refs. 1,4 ; a multiroll system was analyzed based

  3. Xiaoping Qian e-mail: xpqian@umich.edu

    E-print Network

    Qian, Xiaoping

    . They demonstrate that the physics based B-spline modeling method is a convenient, intuitive, and efficient way effective method for adhering prosthe- sis to the bone is to coat it with a porous metal because new bone ingrowth into the pores occurs after implantation. A graded layer of hydroxyapatite HAp is coated

  4. Department Name Address E-mail Phone AEM Adrienne Wilson

    E-print Network

    Keinan, Alon

    LHS32 255-2393 BIOEE Patty Jordan (1610,1780) Janeen Orr E235 Corson Corson E141 pj17 jmo10 254-3163 254-7439 EAS (EN) Pam Vitale 1123 Bradfield pmv2 255-3034 ENTOM Cheryl Gombas Comstock 2132 Cag45 255

  5. Department Name Address E-mail Phone AEM Adrienne Wilson

    E-print Network

    Keinan, Alon

    Jordan (1610,1780) Janeen Orr E235 Corson Wing E141 pj17 jmo10 254-4230 254-4210 BIOG BIOG 1500 BIOG 1105 Linda Warner Academic Surge A Academic Surge A 124 CT259 Llw2 255-3163 254-7439 EAS (EN) Pam Vitale 1123

  6. Youneng Wang e-mail: yw2119@columbia.edu

    E-print Network

    Yao, Y. Lawrence

    ­6 . Compared with shot peening, the compressive stresses extend much deeper below the surface and the resulting-Scale Laser Shock Peening Micro-scale laser shock peening LSP can potentially be applied to metallic, shock peened single crystal silicon was experimentally characterized to better understand its effects

  7. E-Mail Molecules---Individualizing the Large Lecture Class

    Microsoft Academic Search

    Carl C. Wamser

    2003-01-01

    All students in the organic chemistry class are assigned a unique set of nine molecules to report on as optional extra credit assignments. The molecules are taken from a list containing over 200 molecules on the class Web site; they represent an assortment of biologically relevant compounds, from acetaminophen to yohimbine. Once a week, students may submit information about one

  8. Matthew S. Orosz e-mail: mso@mit.edu

    E-print Network

    Entekhabi, Dara

    Organic Rankine Cycles The application of organic Rankine cycles (ORCs) for small scale power generation Rankine cycle (ORC) is an established technology for power generation from low temperature () thermal sources (e.g., geothermal, solar, and industrial). Organic Rankine cycle applications

  9. E-Mail karger@karger.com Original Article

    E-print Network

    Edwards, Scott

    -Biased Expression of Sex-Differentiating Genes FOXL2 and FGF9 in American Alligators, Alligator mississippiensis D University, Ames, Iowa, USA can alligators may inform the evolution of sex-determining and sex stages and 8 juvenile tissue types in male and fe- male American alligators, Alligator mississippiensis

  10. Statistical Anomaly Detection on Real e-Mail Traffic

    Microsoft Academic Search

    Maurizio Aiello; Davide Chiarella; Gianluca Papaleo

    There are many recent studies and proposal in Anomaly Detection Techniques, especially in worm and virus detection. In this\\u000a field it does matter to answer few important questions like at which ISO\\/OSI layer data analysis is done and which approach\\u000a is used. Furthermore these works suffer of scarcity of real data due to lack of network resources or privacy problem:

  11. E-Alerts: Energy (environmental studies). E-mail newsletter

    SciTech Connect

    NONE

    1999-04-01

    The paper discussed air, noise, water, and solid waste pollution and pollution control from energy resource development, fuel production, energy production, and energy use; and environmental impacts of energy production and use.

  12. Peter J. Blank E-mail: blankpj@gmail.com

    E-print Network

    Turner, Monica G.

    changes for conservation and restoration of forest interior habitat University of Maryland, College Park impacts of grassland bioenergy production on bird communities Designed, directed, and conducted surveys Assistant Research Topic: Bird response to Conservation Reserve Program (CRP) habitat in Maryland Designed

  13. e-mail: metzhao@ust.hk Assoc. Prof.,

    E-print Network

    Zhao, Tianshou

    -generation environmental by benign refrigerant in auto- mobile air-conditioning, railway air-conditioning, residential air- conditioning and heat pumps 1 . Since in some applications such as automobile air-conditioning and heat pump.1115/1.1423906 Keywords: Channel Flow, Convection, Heat Transfer, Microscale, Refrigeration, Super- critical Fluids

  14. E-Alerts: Material sciences. E-mail newsletter

    SciTech Connect

    NONE

    1999-04-01

    Contents contained here are: Ablative Materials and Ablation; Adhesives and Sealants; Carbon and Graphite; Ceramics, Refractories, and Glass; Coatings, Colorants, and Finishes; Composite Materials; Corrosion and Corrosion Inhibition; Elastomers; Fibers and Textiles; Iron and Iron Alloys; Lubricants and Hydraulic Fluids; Materials Degradation and Fouling; Miscellaneous Materials; Nonferrous Metals and Alloys.

  15. Dynamic SHA-2 E-mail: xuzijiewz@gmail.com

    E-print Network

    by NSA and adopted by NIST in 2000 as a standard that is intended to replace SHA-1 in 2010 [6]. Since MD5. Since the developments in the field of cryptographic hash functions, NIST decided to run a 4 year hash Preliminaries and notation In this paper I will use the same notation as that of NIST: FIPS 180-2 description

  16. Dynamic SHA E-mail: xuzijiewz@gmail.com

    E-print Network

    1 Introduction The SHA-2 family of hash functions was designed by NSA and adopted by NIST in 2000 in the field of cryptographic hash functions, NIST decided to run a 4 year hash competition for selection notation as that of NIST: FIPS 180-2 description of SHA-2 [6]. The following operations are applied to 32

  17. Hippocampus Copy of e-mail Notification za40726

    E-print Network

    Cossart, Rosa

    , and enter the following web address: http://rapidproof.cadmus.com/RapidProof/retrieval/index.jsp You and is available for user downloading at http://www.adobe.com/products/acrobat/readstep.html. Open your web browser

  18. Postdoctoal Fellow e-mail: xiaoboli.liu@utoronto.ca

    E-print Network

    that suffers from verti- cal tail damage. A novel notion of damage degree is introduced to parameterize the dam from failures. In general, there are mainly three types of failures (faults): sen- sor failure, actuator failure, and structural damage. Fault tolerant control addressing sensor failures and actuator

  19. CGS SS200: INTERNSHIP CREDIT APPLICATION Name: __________________________ E-mail: ___________________________

    E-print Network

    Goldberg, Bennett

    1 CGS SS200: INTERNSHIP CREDIT APPLICATION Name: __________________________ E ___ Summer 20___ Internship Information: Company/Location: _________________________________________________ Title/Position: _____________________________________________________ Internship Supervisor

  20. E-Alerts: Energy (geothermal energy). E-mail newsletter

    SciTech Connect

    NONE

    1999-04-01

    The paper discusses geothermal exploration and prospecting methods and equipment; Geothermal resources; Geothermal energy conversion; Geology applied to geothermal systems; Drilling; Reservoirs; Extraction; Site selection; Geothermal power plants; Corrosion studies; and Materials used in geothermal systems.

  1. E-mail: DJB@UCC.IE Jack Dangermond, President

    E-print Network

    Wright, Dawn Jeannine

    to the coast a few years later, when I was engaged as research assistant on a survey of coastal erosion's Coastal Information Services, wrote to you recently on behalf of the marine and coastal GIS community on coastal applications of the technology, and also as a member of the International Geographical Union

  2. M. A. Dawson e-mail: dawson@mit.edu

    E-print Network

    protection against ballistics. This research has culminated in highly advanced armor for defending against projectiles 1 ; however, existing armor is inefficient at protecting against the enormous pressure gradients as vehicles and structures. Recently, a novel reactive armor design to mitigate the effects of blast waves has

  3. e-mail: hxz9@psu.edu Fellow ASME

    E-print Network

    Ray, Asok

    , ships and submarines, and power plants) is to achieve high performance with increased reli- ability, availability, component durability, and maintainability. The key idea of damage-mitigating control

  4. Request for Animal Facility Access Name E-Mail Date

    E-print Network

    Arnold, Jonathan

    Request for Animal Facility Access Supervisor's Signature Submitted Occupational Health Form to Animal Care and Use 608 Boyd Graduate Studied at the information listed below. In order to work with animals at UGA, you must 1. Be listed on an AUP, 2

  5. Anas Alfaris e-mail: anas@mit.edu

    E-print Network

    de Weck, Olivier L.

    , on the one hand, a hierarchical decomposition that includes multilevel abstraction and design parameter identification, and on the other hand, a multidomain formulation, which includes param- eter dependency could even be worse 1 . This problem of "balancing" the design in a complex system has been the subject

  6. The TEXT upgrade vertical interferometer

    SciTech Connect

    Hallock, G.A.; Gartman, M.L.; Li, W.; Chiang, K.; Shin, S.; Castles, R.L.; Chatterjee, R.; Rahman, A.S. (The University of Texas at Austin, Austin, Texas 78712 (United States))

    1992-10-01

    A far-infrared interferometer has been installed on TEXT upgrade to obtain electron density profiles. The primary system views the plasma vertically through a set of large (60-cm radial{times}7.62-cm toroidal) diagnostic ports. A 1-cm channel spacing (59 channels total) and fast electronic time response is used, to provide high resolution for radial profiles and perturbation experiments. Initial operation of the vertical system was obtained late in 1991, with six operating channels.

  7. e-mail: nsimaan@cs.jhu.edu e-mail: shoham@tx.technion.ac.il

    E-print Network

    Simaan, Nabil

    to Stiffness Control This paper presents a closed-form formulation and geometrical interpretation of the de of the active stiffness control. This geometric interpretation is utilized in an example of a planar 3 degrees of the stiffness matrix that corresponds to the preload effect is a product of two matrices having line

  8. Starbase Data Tables: An ASCII Relational Database for Unix

    NASA Astrophysics Data System (ADS)

    Roll, John

    2011-11-01

    Database management is an increasingly important part of astronomical data analysis. Astronomers need easy and convenient ways of storing, editing, filtering, and retrieving data about data. Commercial databases do not provide good solutions for many of the everyday and informal types of database access astronomers need. The Starbase database system with simple data file formatting rules and command line data operators has been created to answer this need. The system includes a complete set of relational and set operators, fast search/index and sorting operators, and many formatting and I/O operators. Special features are included to enhance the usefulness of the database when manipulating astronomical data. The software runs under UNIX, MSDOS and IRAF.

  9. Primary Students and Informational Texts

    NSDL National Science Digital Library

    Hallie Kay Yopp

    2006-11-01

    Anyone who has spent time looking into science books with young children has no doubt experienced the endless questions that the information and visuals in the books can stimulate. Can snakes climb trees? How do frogs hide from predators? Why do volcanoes erupt? Books prompt questions, which can lead to further reading about and investigations of science topics. Whether from a textbook or a nonfiction trade book, informational text can be the fuel that sparks curiosity about and interest in science, thus contributing to the development of science attitudes.

  10. CELT: Corpus of Electronic Texts

    NSDL National Science Digital Library

    CELT, an "online database of contemporary and historical topics from many areas, including literature and the other arts," is aimed at the greatest possible range of readers, from academic scholars to the general public. Texts at the site can be searched, read on-screen, or downloaded. Other works available at CELT include essays by Michael Collins, the Dail debates on the 1921 Anglo-Irish Treaty, works by James Connolly and Padraic Pearse, and almost the whole corpus of Hiberno-Norman French poetry.

  11. Corpus of Electronic Texts (CELT)

    NSDL National Science Digital Library

    Developed at University College Cork, the Corpus of Electronic Texts project is intended "to bring the wealth of Irish literary and historical culture (in Irish, Latin, Anglo-Norman French, and English) to the Internet in a rigorously scholarly project." Additionally, the project is designed to be utilized by a wide group of interested parties, including students, academics, and the general public. Visitors may peruse the documents by language of original publication, or by viewing a complete list of all the works currently available (many in HTML or pdf format) from the project's website. Some of the rather compelling works available here include the complete works of Oscar Wilde, the political writings of Michael Collins, and various historical documents regarding the struggle for Irish independence. [KMG

  12. Text documents as social networks

    NASA Astrophysics Data System (ADS)

    Balinsky, Helen; Balinsky, Alexander; Simske, Steven J.

    2012-03-01

    The extraction of keywords and features is a fundamental problem in text data mining. Document processing applications directly depend on the quality and speed of the identification of salient terms and phrases. Applications as disparate as automatic document classification, information visualization, filtering and security policy enforcement all rely on the quality of automatically extracted keywords. Recently, a novel approach to rapid change detection in data streams and documents has been developed. It is based on ideas from image processing and in particular on the Helmholtz Principle from the Gestalt Theory of human perception. By modeling a document as a one-parameter family of graphs with its sentences or paragraphs defining the vertex set and with edges defined by Helmholtz's principle, we demonstrated that for some range of the parameters, the resulting graph becomes a small-world network. In this article we investigate the natural orientation of edges in such small world networks. For two connected sentences, we can say which one is the first and which one is the second, according to their position in a document. This will make such a graph look like a small WWW-type network and PageRank type algorithms will produce interesting ranking of nodes in such a document.

  13. Text2Quit: results from a pilot test of a personalized, interactive mobile health smoking cessation program.

    PubMed

    Abroms, Lorien C; Ahuja, Meenakshi; Kodl, Yvonne; Thaweethai, Lalida; Sims, Justin; Winickoff, Jonathan P; Windsor, Richard A

    2012-01-01

    Text messaging programs on mobile phones have shown some promise in helping people quit smoking. Text2Quit is an automated, personalized, and interactive mobile health program that sends text messages and e-mails timed around a participant's quit date over the course of 3 months. The text messages include pre- and post-quit educational messages, peer ex-smoker messages, medication reminders and relapse messages, and multiple opportunities for interaction. Study participants were university students (N = 23) enrolled in the Text2Quit program. Participants were surveyed at baseline and at 2 and 4 weeks after enrollment. The majority of participants agreed that they liked the program at 2 and 4 weeks after enrollment (90.5% and 82.3%, respectively). Support for text messages was found to be moderate and higher than that of the e-mail and web components. Of participants, 75% reported reading most or all of the texts. On average, users made 11.8 responses to the texts over a 4-week period, although responses declined after the quit date. The interactive feature for tracking cigarettes was the most used interactive feature, followed by the craving trivia game. This pilot test provides some support for the Text2Quit program. A future iteration of the program will include additional tracking features in both the pre-quit and post-quit protocols and an easier entry into the not-quit protocol. Future studies are recommended that identify the value of the interactive and personalized features that characterize this program. PMID:22548598

  14. Text-to-text generation for question answering Wauter Bosma, Erwin Marsi, Emiel Krahmer and Mariet Theune

    E-print Network

    Theune, Mariët

    answer (Strza- lkowski et al., 2000). Someone querying a system about RSI may be interested to know what to an arbitrary length, providing not just a direct answer but also related information so to better address if an unambiguous Wauter Bosma VU University Amsterdam, e-mail: w.bosma@let.vu.nl Erwin Marsi Norwegian University

  15. What's so Simple about Simplified Texts? A Computational and Psycholinguistic Investigation of Text Comprehension and Text Processing

    ERIC Educational Resources Information Center

    Crossley, Scott A.; Yang, Hae Sung; McNamara, Danielle S.

    2014-01-01

    This study uses a moving windows self-paced reading task to assess both text comprehension and processing time of authentic texts and these same texts simplified to beginning and intermediate levels. Forty-eight second language learners each read 9 texts (3 different authentic, beginning, and intermediate level texts). Repeated measures ANOVAs…

  16. Text Features Made Easy Using News Magazines

    NSDL National Science Digital Library

    2012-10-05

    In this lesson, students will use news magazines such as Time for Kids, Science News for Kids, or other news magazines to identify text features and explain how the text features contribute to their understanding of the informational text.

  17. Revealing Social Structure from Texts: Meta-Matrix Text Analysis as a novel method for Network Text Analysis1

    E-print Network

    Sadeh, Norman M.

    1 Revealing Social Structure from Texts: Meta-Matrix Text Analysis as a novel method for Network meaning but also social structure to be revealed through text analysis. We illustrate this approach analysis that can be used to extract the underlying social and organizational structure contained in texts

  18. Integrating Text with Video and 3D Graphics: The Effects of Text Drawing Styles on Text Readability

    Microsoft Academic Search

    Jacek Jankowski; Krystian Samp; Izabela Irzynska; Marek Jozwowicz; Stefan Decker

    2010-01-01

    There have been many studies of computer based text reading. However, only a few have considered text integrated with video and 3D graphics. This paper presents an investigation into the effects of varying (a) text drawing style (plain, billboard, Anti-Interference, shadow), (b) image polarity (positive and negative), and (c) background style (video and 3D) on text readability. Reading speed and

  19. ISSN 1990-519X, Cell and Tissue Biology, 2007, Vol. 1, No. 3, pp. 248258. Pleiades Publishing, Ltd., 2007. Original Russian Text O.V. Nevzglyadova, A.V. Artemov, V.V. Zenin, V.V. Verkhusha, M.M. Shavlovsky, O.I. Povarova, O.V. Stepanenko, I.M. Kuznetsov

    E-print Network

    Verkhusha, Vladislav V.

    Publishing, Ltd., 2007. Original Russian Text © O.V. Nevzglyadova, A.V. Artemov, V.V. Zenin, V.V. Verkhusha of actin, or F-actin). The 3-dimensional structure of actin has been deter- mined for actin complexes of Medical Sciences, St. Petersburg, Russia e-mail: kkt@mail.cytspb.rssi.ru Received September 7, 2006

  20. Tutorial: Text Analytics for Security William Enck

    E-print Network

    Xie, Tao

    Tutorial: Text Analytics for Security William Enck Department of Computer Science North Carolina our ex- periences in applying text analytics to security problems. We will also highlight the current; human expectations; text analytics 1. TEXT ANALYTICS FOR SECURITY Context is critical for making

  1. Full-Text Databases in Medicine.

    ERIC Educational Resources Information Center

    Sievert, MaryEllen C.; And Others

    1995-01-01

    Describes types of full-text databases in medicine; discusses features for searching full-text journal databases available through online vendors; reviews research on full-text databases in medicine; and describes the MEDLINE/Full-Text Research Project at the University of Missouri (Columbia) which investigated precision, recall, and relevancy.…

  2. Term statistics Zipf's law text statistics

    E-print Network

    Lu, Jianguo

    Term statistics Zipf's law text statistics October 20, 2014 text statistics 1 / 19 #12;Term statistics Zipf's law Overview 1 Term statistics 2 Zipf's law text statistics 2 / 19 #12;Term statistics Zipf's law Outline 1 Term statistics 2 Zipf's law text statistics 3 / 19 #12;Term statistics Zipf's law Model

  3. Text Complexity: Primary Teachers' Views

    ERIC Educational Resources Information Center

    Fitzgerald, Jill; Hiebert, Elfrieda H.; Bowen, Kimberly; Relyea-Kim, E. Jackie; Kung, Melody; Elmore, Jeff

    2015-01-01

    The research question was, "What text characteristics do primary teachers think are most important for early grades text complexity?" Teachers from across the United States accomplished a two-part task. First, to stimulate teachers' thinking about important text characteristics, primary teachers completed an online paired-text

  4. The Production and Consumption of Text.

    ERIC Educational Resources Information Center

    Sussex, Roland

    1996-01-01

    Examines the current state of play in text production and consumption in the specific context of electronic text production and consumption. The article points out that the key to the modern textual revolution is the captured keystroke. It is concluded that text on paper, or some synthetic equivalent, will survive, although voice-driven text

  5. TORPEDO: Networked Access to Full-Text and Page-Image Representations of Physics Journals and Technical Reports.

    ERIC Educational Resources Information Center

    Atkinson, Roderick D.; Stackpole, Laurie E.

    1995-01-01

    The Naval Research Laboratory (NRL) Library and the American Physical Society (APS) are experimenting with electronically disseminating journals and reports in a project called TORPEDO (The Optical Retrieval Project: Electronic Documents Online). Scanned journals and reports are converted to ASCII, then attached to bibliographic information, and…

  6. Freedom System Text and Graphics System (TAGS)

    NASA Technical Reports Server (NTRS)

    1989-01-01

    The Text and Graphics System (TAGS) is a high-resolution facsimile system that scans text or graphics material and converts the analog SCAN data into serial digital data. This video shows the TAGS in operation.

  7. TEMPEST -- A Template Editor for Structured Text

    E-print Network

    Sterpe, Peter

    This paper proposes an editing tool named TEMPEST (TEMPlate Editor for Structured Text) whose goal is to extend a text editing environment by using templates to incorporate into it some knowledge of the structure of the ...

  8. STA4000 Report Decrypting Classical Cipher Text

    E-print Network

    Rosenthal, Jeffrey S.

    but their positions are rearranged in a di#erent 1 #12; plain text THE PROJECT GUTENBERG EBOOK OF OLIVER TWIST key ICZNBKXGMPRQTWFDYEOLJVUAHS decrypted text THE PROJECT GUTENBERG EBOOK OF OLIVER TWIST Table 1.1a

  9. Annotating Sanskrit Texts Based on Sabdabodha Systems

    Microsoft Academic Search

    K. V. Ramkrishnamacharyulu

    2009-01-01

    Though Sanskrit has a huge repository of texts as well as well discussed grammar formalism, we still neither have a full fledged\\u000a parser for Sanskrit based on this formalism nor do we have any annotated text.

  10. You Can Say That Again!: Text Compression

    NSDL National Science Digital Library

    Tim Bell

    2005-01-01

    This activity helps students learn how computers "compress" text by identifying repeating patterns of letters, words, and phrases. Students use poems or nursery rhymes as their source text, draw boxes around repeating parts, and use arrows to point to earlier parts of the text that can be used to "uncompress" the text. The boxes and arrows are then related to the numbers that computers use in compression. An extension has students try compressing a much longer story, "The Three Little Pigs."

  11. Compressed text indexes: From theory to practice

    Microsoft Academic Search

    Paolo Ferragina; Rodrigo González; Gonzalo Navarro; Rossano Venturini

    2008-01-01

    A compressed full-text self-index represents a text in a compressed form and still answers queries efficiently. This represents a significant advancement over the (full-)text indexing techniques of the previous decade, whose indexes required several times the size of the text. Although it is relatively new, this algorithmic technology has matured up to a point where theoretical research is giving way

  12. Using Text Messages to Communicate with Patrons

    ERIC Educational Resources Information Center

    Konshak, Peter

    2009-01-01

    Text messaging is an ideal communications method for libraries, which often want to send short, concise messages to their patrons near and far. Uses for text messaging in libraries include reminders about items' due dates, hold pickup notices, program reminders, and even short messages of content. Some libraries are already using text messaging…

  13. Metacognitive Process in Online Text Construction

    ERIC Educational Resources Information Center

    Yeh, Hui-Chin; Yang, Yu-Fen

    2011-01-01

    Many studies have reported the results of how students constructed texts, yet the cognitive process of how texts were constructed by sentences and how the constructive process was formulated and reformulated have rarely been addressed. This study aims to develop a computer-aided text construction system which supports 83 English as a Foreign…

  14. Parallel Text Compression Lynn M. Stauffer

    E-print Network

    Hirschberg, Dan

    per second are described. The speed gained by parallelizing text compression schemes enhances Laboratories. 1 #12; This survey of parallel text compression considers lossless compression tech­ niques which. That is, lossless compression is completely reversible. Text compression, the focus of this survey

  15. Topic Mining over Asynchronous Text Sequences

    Microsoft Academic Search

    Xiang Wang; Xiaoming Jin; Meng-En Chen; Kai Zhang; Dou Shen

    2012-01-01

    Time stamped texts, or text sequences, are ubiquitous in real-world applications. Multiple text sequences are often related to each other by sharing common topics. The correlation among these sequences provides more meaningful and comprehensive clues for topic mining than those from each individual sequence. However, it is nontrivial to explore the correlation with the existence of asynchronism among multiple sequences,

  16. Processing Compressed Texts: A Tractability Border

    E-print Network

    Lonardi, Stefano

    equivalence [LR06], message sequence chart verification [GM02] Acceleration by text compression: HMM training equivalence [LR06], message sequence chart verification [GM02] Acceleration by text compression: HMM training equivalence [LR06], message sequence chart verification [GM02] Acceleration by text compression: HMM training

  17. Knowledge Representation for Commonsense Reasoning with Text

    Microsoft Academic Search

    Kathleen Dahlgren; Joyce P. McDowell; Edward P. Stabler Jr.

    1989-01-01

    1 INTRODUCTION 1.1 NAIVE SEMANTICS The reader of a text actively constructs a rich picture of the objects, events, and situation described. The text is a vague, insufficient, and ambiguous indicator of the world that the writer intends to depict. The reader draws upon world knowledge to disambiguate and clar-ify the text, selecting the most plausible interpretation from among the

  18. Partners: Grades K-1: text only version

    NSDL National Science Digital Library

    Jessica Fries-Gaither

    This informational text introduces students to photosynthesis and lichens-plant-like organisms resulting from a symbiotic relationship between an alga and a fungus. The text is written at a kindergarten through grade one reading level. This is a PDF containing the informational text.

  19. Generating Textual Diagrams and Diagrammatic Texts

    Microsoft Academic Search

    Donia Scott; Richard Power

    1998-01-01

    Abstract. There are obvious ways in which text and diagrams within a document should be coordinated: for instance, the placement of a diagram might influence the wording of the text. However, there is a more subtle interaction between text and diagrams, which has emerged from work on generating technical documents,that make extensive use of layout. Constituents that would normally be

  20. Mathematical Texts as Narrative: Rethinking Curriculum

    ERIC Educational Resources Information Center

    Dietiker, Leslie

    2013-01-01

    This paper proposes a framework for reading mathematics texts as narratives. Building from a narrative framework of Meike Bal, a reader's experience with the mathematical content as it unfolds in the text (the "mathematical story") is distinguished from his or her logical reconstruction of the content beyond the text (the…