• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 258
  • 67
  • 64
  • 48
  • 45
  • 26
  • 20
  • 13
  • 7
  • 7
  • 7
  • 6
  • 3
  • 2
  • 2
  • Tagged with
  • 649
  • 194
  • 119
  • 101
  • 83
  • 83
  • 70
  • 62
  • 53
  • 53
  • 52
  • 50
  • 47
  • 46
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

The implemenation [sic] and diffusion of voice mail in a small company / Implementation and diffusion of voice mail in a small company.

Fiechter, Carol M. January 1995 (has links)
Voice mail is a computer-aided telephone system which is capable of storing and forwarding spoken messages. The voice mail market has been and is still focused on larger companies since they comprise a sizable amount of the installed base of voice processing systems (Radisich, 1994). Consequently, all voice mail research has been centered on the large company and concentrates on advantages or disadvantages found in these substantial companies.This study focused on the implementation and diffusion of a relatively new communication technology and its consequences in an unresearched arena--the small company. Also a comparatively new methodology in the field of communications research, grounded theory, was used to explore the impact of a new technology, thus possibly advancing the credibility of this research methodology.The results of this pilot study on voice mail in a small company found diffusion to be extremely successful, even to the point of surprising some of the subjects with their total acceptance of the technology.The study results indicated that the small company can benefit from voice mail usage in similar ways to the large company, especially if the company has travelers or off-site locations. The results implied that there are some ways that voice mail can assist in the small company where it has not previously had a reported effect in the large company---as a negotiating, organizing, and delegating tool.The results of the study could provide insights for other small companies concerned with successful usage of the voice mail technology in similar environments. Several concepts on novel uses of voice mail surfaced as a result of this study. These concepts could provide hypothesis for empirical testing to further voice mail investigation.The study concluded that voice mail is a communication technology that is an accepted and beneficial tool which offered several major advantages that the subject small company was able to successfully utilize. / Department of Journalism
162

A spam-detecting artificial immune system /

Oda, Terri January 1900 (has links)
Thesis (M.C.S.)--Carleton University, 2005. / Includes bibliographical references (p. 115-123). Also available in electronic format on the Internet.
163

Zur strafrechtlichen Bewältigung des Spamming /

Frank, Thomas, January 2004 (has links) (PDF)
Universiẗat, Diss.-2004--Würzburg, 2003. / Literaturverz. S. XXIII - LI. Verzeichnis zitierten Internetquellen S. LII - LVI.
164

Transactional behaviour based spam detection /

Choi, Thomas, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 119-126). Also available in electronic format on the Internet.
165

A dimensional category-based email management system /

Lu, Peng. January 1900 (has links)
Thesis (M.C.S.) - Carleton University, 2007. / Includes bibliographical references (p. 87-90). Also available in electronic format on the Internet.
166

Visuelle Analyse von E-mail-Verkehr

Mansmann, Florian. January 2003 (has links)
Konstanz, Univ., Diplomarb., 2003.
167

The Panama route, 1848-1869

Kemble, John Haskell, January 1943 (has links)
Based on Thesis (Ph. D.)--University of California, 1937. / Bibliography: p. [289]-304.
168

E-mail spam filtering solution for the Western Interstate Commission for Higher Education (WICHE)

Worley, Jerry A. January 2005 (has links) (PDF)
Thesis (M.S.C.I.T.)--Regis University, Denver, Colo., 2005. / Title from PDF title page (viewed Nov. 23, 2005). Includes bibliographical references.
169

A organização lingüística do espaço nos e-mails pessoais: um estudo da dêixis espacial / The linguistic organization of space in the personal e-mails: a study of spatial deixis.

Oliveira, Elaine Lima de January 2009 (has links)
OLIVEIRA, Elaine Lima de. A organização lingüística do espaço nos e-mails pessoais: um estudo da dêixis espacial. 2009. 183f. Dissertação (Mestrado em Linguística) – Universidade Federal do Ceará, Departamento de Letras Vernáculas, Programa de Pós-Graduação em Linguística, Fortaleza-CE, 2009. / Submitted by nazareno mesquita (nazagon36@yahoo.com.br) on 2012-07-09T15:28:34Z No. of bitstreams: 1 2009_diss_ELOliveira.pdf: 1088729 bytes, checksum: 7298f10db72047b313ed72516e99c5f6 (MD5) / Approved for entry into archive by Maria Josineide Góis(josineide@ufc.br) on 2012-08-03T16:31:57Z (GMT) No. of bitstreams: 1 2009_diss_ELOliveira.pdf: 1088729 bytes, checksum: 7298f10db72047b313ed72516e99c5f6 (MD5) / Made available in DSpace on 2012-08-03T16:31:57Z (GMT). No. of bitstreams: 1 2009_diss_ELOliveira.pdf: 1088729 bytes, checksum: 7298f10db72047b313ed72516e99c5f6 (MD5) Previous issue date: 2009 / This research focuses on spatial deixis in personal emails. Our aim is to find out where to point the deictic spatial coordinates, and investigate how these coordinates are constructed in discourse and seek to draw a profile of these coordinates as a function of spatial distance of the interlocutors. To address the phenomenon under study, we focus our research on three pillars: the study of referral, which includes the study of spatial deixis we refer to us, especially the work of Dubois and Mondada (2003), Lyons (1977) Levinson (2007 ), the phenomenon of the construction of referring expressions, we consider very pertinent studies of Ariel (1996, 1998 and 2001) and his theory of accessibility, the semantics of space, we make use of the observations of Lyons (1977) and Saeed (2003) . With the theoretical completed, we analyzed 80 personal emails, 40 interactions and their interviews. The interviews helped to know a little more about the production situation of the messages and also helped to separate the messages into two major groups depending on the spatial distance is established between the interlocutors. Separate groups, marked the deictic and studied the conditions of production and semantics of deictic spaces, we come to several considerations, among which we point out the following: speakers who have significant spatial distance feel a greater need to address the space and it is located, factors diverse nature justifying the emergence of such coordinates in discourse, spaces are mainly metaphorical sense of time and now that point to a type of e-mail; speakers who present a short space feel little need to depict the space, the space depicted, in general, will be shared soon, so the more detail of such marks, the criterion morphosyntactic and first mention of justifying the provision of the coordinates in this block, the spaces have metaphorical idea of time, but point to a later. / Esta pesquisa foca a dêixis espacial nos e-mails pessoais. Nosso intuito é descobrir para onde apontam as coordenadas dêiticas espaciais, bem como investigar como são construídas tais coordenadas no discurso e buscar traçar um perfil dessas coordenadas em função da distância espacial dos interlocutores. Para contemplar o fenômeno em estudo, centramos nossa investigação em três pilares: o estudo da referenciação, que inclui o estudo da dêixis espacial, reportamo-nos, principalmente, aos trabalhos de Mondada e Dubois (2003), Lyons (1977) Levinson (2007); o fenômeno da construção das expressões referenciais, consideramos bastante pertinente os estudos de Ariel (1996, 1998 e 2001) e sua Teoria da Acessibilidade; a semântica dos espaços, valemo-nos das observações de Lyons (1977) e Saeed (2003). Com o referencial teórico concluído, analisamos 80 e-mails pessoais, 40 interações e suas respectivas entrevistas. As entrevistas ajudaram a conhecer um pouco mais da situação de produção das mensagens e também ajudaram a separar as mensagens em dois grandes blocos em função da distância espacial estabelecida entre os interlocutores. Separados os grupos, marcados os dêiticos e estudadas as condições de produção e a semântica dos espaços dêiticos, chegamos a várias considerações, dentre elas apontamos as seguintes: interlocutores que apresentam significativa distância espacial sentem maior necessidade de tratar do espaço e nele se situar, fatores de naturezas diversas justificam o surgimento de tais coordenadas no discurso, espaços metaforizados apresentam principalmente a noção de tempo e apontam para um agora nesse tipo de e-mail; interlocutores que apresentam uma curta distância espacial sentem pouca necessidade de retratarem o espaço, os espaços retratados, em geral, serão compartilhados em breve, por isso, o maior detalhamento de tais marcas, o critério morfossintático e os de primeira menção justificam a disposição das coordenadas neste bloco, os espaços metaforizados apresentam idéia de tempo, mas apontam para um depois.
170

E-Mail Header Injections - An Analysis of the World Wide Web

January 2016 (has links)
abstract: E-Mail header injection vulnerability is a class of vulnerability that can occur in web applications that use user input to construct e-mail messages. E-Mail injection is possible when the mailing script fails to check for the presence of e-mail headers in user input (either form fields or URL parameters). The vulnerability exists in the reference implementation of the built-in “mail” functionality in popular languages like PHP, Java, Python, and Ruby. With the proper injection string, this vulnerability can be exploited to inject additional headers and/or modify existing headers in an e-mail message, allowing an attacker to completely alter the content of the e-mail. This thesis develops a scalable mechanism to automatically detect E-Mail Header Injection vulnerability and uses this mechanism to quantify the prevalence of E- Mail Header Injection vulnerabilities on the Internet. Using a black-box testing approach, the system crawled 21,675,680 URLs to find URLs which contained form fields. 6,794,917 such forms were found by the system, of which 1,132,157 forms contained e-mail fields. The system used this data feed to discern the forms that could be fuzzed with malicious payloads. Amongst the 934,016 forms tested, 52,724 forms were found to be injectable with more malicious payloads. The system tested 46,156 of these and was able to find 496 vulnerable URLs across 222 domains, which proves that the threat is widespread and deserves future research attention. / Dissertation/Thesis / Masters Thesis Computer Science 2016

Page generated in 0.0147 seconds