Spelling suggestions: "subject:"message""
21 |
Secure Instant Messaging : the Jabber protocolAlmanei, Saleh 03 June 2003 (has links)
Instant Messaging (IM) has grown rapidly among network users. It has even
become a very important tool for the industry around the world. It is used in scheduling
meetings, exchanging business information and clients information, and so on. Instant
Messaging has been developed by private sectors or providers such as America Online
Instant Messenger (AIM), MSN, and Yahoo; however, in 1998 a new protocol has seen
the light as an open source Instant Messaging protocol and had the name of Jabber and
thanks to Jeremie Miller the founder of the Jabber protocol.
The project gathered wide public attention when it was discussed on the popular
developer discussion website Slashdot in January 1999. In May 2000, the core Jabber
protocols were released as open source reference server and it have not been changed to
this day. Jabber uses client-server architecture, not a direct peer-to-peer architecture
as some other messaging systems do. It is actually an Extensible Markup Language
(XML) messaging protocol. It relies on XML document format in every aspect of the
communication. [1]
Jabber Protocol have gone a long way to be one of the most attractive protocol
because of its open source and extensibility. Anyone can build or extend the jabber
protocol functionality without actually modifying the core protocol and still maintain
interoperability with other IM clients such as Yahoo and MSN. Moreover, as the usage of
Jabber Instant Messaging technology increases, the need for information protection in the
Jabber messaging medium also increases. This thesis will explore the Jabber protocol
and the ability to secure a Jabber based communication over the network using third
party cryptographic libraries. / Graduation date: 2003
|
22 |
Energy Consumption of 3G Transmissions for Instant Messaging on Mobile DevicesAndersson, Simon January 2013 (has links)
A recent surge in the usage of instant messaging (IM) applications on mobile devices has brought the energy efficiency of those applications into the light. We are entering an era where IM applications are changing the message communication on mobile devices, beginning to overtake SMS messages and even phone calls in some cases. Smartphones experience a tremendous increase of data transmissions through wireless interfaces. As illustrated in this work, today's IM applications differ vastly in energy consumption when using the third generation (3G) cellular communication. This thesis focuses on studying the 3G transmission energy footprint of IM applications at the handset level. The energy cost of a common feature used in IM applications that informs that the user is currently typing a response ('typing notify'), is evaluated. The feature is shown to incur a great increase in energy cost compared to the base chat function, ranging from an increase of 43 % to 117 %. The work also proposes a bundle technique that aggregates chat messages over time reducing the energy consumption at the cost of delay for the user. The results show that the bundle technique can save up to 47 % in energy consumption while still keeping the chat function. For the evaluation, conversations collected from a popular IM application are used.
|
23 |
Improving availability awareness with relationship filteringDavis, Scott M. 06 January 2006
Awareness servers provide information about a person to help observers determine whether a person is available for contact. A trade -off exists in these systems: more sources of information, and higher fidelity in those sources, can improve peoples decisions, but each increase in information reduces privacy. In this thesis, we look at whether the type of relationship between the observer and the person being observed can be used to manage this trade-off. We conducted a survey that asked people what amount of information from different sources that they would disclose to seven different relationship types. We found that in more than half of the cases, people would give
different amounts of information to different relationships. We then constructed a prototype system and conducted a Wizard of Oz experiment where we took the system into the real world and observed individuals using it. Our results suggest that awareness servers can be improved by allowing finer-grained control than what is currently available.
|
24 |
Technological Advancements in CommunicationRamnaraine, Jankie 15 December 2009 (has links)
Faculty of Criminology, Justice and Policy Studies
|
25 |
Improving availability awareness with relationship filteringDavis, Scott M. 06 January 2006 (has links)
Awareness servers provide information about a person to help observers determine whether a person is available for contact. A trade -off exists in these systems: more sources of information, and higher fidelity in those sources, can improve peoples decisions, but each increase in information reduces privacy. In this thesis, we look at whether the type of relationship between the observer and the person being observed can be used to manage this trade-off. We conducted a survey that asked people what amount of information from different sources that they would disclose to seven different relationship types. We found that in more than half of the cases, people would give
different amounts of information to different relationships. We then constructed a prototype system and conducted a Wizard of Oz experiment where we took the system into the real world and observed individuals using it. Our results suggest that awareness servers can be improved by allowing finer-grained control than what is currently available.
|
26 |
Anomaly Based Malicious URL Detection in Instant MessagingLin, Jia-bin 15 July 2009 (has links)
Instant messaging (IM) has been a platform of spreading malware for hackers due to its popularity and immediacy. To evade anti-virus detection, hacker might send malicious URL message, instead of malicious binary file. A malicious URL is a link pointing to a malware file or a phishing site, and it may then propagate through the victim's contact list. Moreover, hacker sometimes might use social engineering tricks making malicious URLs hard to be identified. The previous solutions are improper to detect IM malicious URL in real-time. Therefore, we propose a novel approach for detecting IM malicious URL in a timely manner based on the anomalies of URL messages and sender's behavior. Malicious behaviors are profiled as a set of behavior patterns and a scoring model is developed to evaluate the significance of each anomaly. To speed up the detection, the malicious behavior patterns can identify known malicious URLs efficiently, while the scoring model is used to detect unknown malicious URLs. Our experimental results show that the proposed approach achieves low false positive rate and low false negative rate.
|
27 |
Perceptions and practices of code-mixing in MSN among secondary school students in Hong KongLee, Ely. January 2009 (has links)
Thesis (M.A.)--University of Hong Kong, 2009. / Includes bibliographical references (p. 64-66).
|
28 |
Lights, camera, environmental action : messages in youth environmental videosBarwin, Alan 16 March 2010 (has links)
An Inconvenient Truth was a catalyst for change in the way many adults think about the
environment. North American youth are perpetuating the dominant consumerist
paradigm, and will need to change their attitudes and behaviour to restore the health of
the planet in the future. This study identifies the content and messaging that youth see as
effective to engage their peers in pro-environmental attitudes and actions. Middle school
participants created environmental videos following a Participatory Video methodology.
A content analysis of the videos revealed that youth are optimistic and advocate
grassroots community action to “save the world.” The dominant messaging in the videos
is “peer talk,” characterized by youth language and diction, youth speaking directly to the
youth audience, youth talking to youth on screen, and content that is relevant to youth.
These findings are recommended in a grounded theory of effective environmental
education for youth through video.
|
29 |
Guaranteed delivery of multimodal semi-synchronous IP-based communication.Julius, Elroy Peter January 2005 (has links)
<p>This thesis explored how hearing and deaf users are brought together into one communication space where interaction between them is a semi-synchronous form of message exchange. The focus of this thesis was the means by which message delivery between two e</p>
|
30 |
Automatic instant messaging dialogue using statistical models and dialogue actsIvanovic, Edward January 2008 (has links)
Instant messaging dialogue is used for communication by hundreds of millions of people worldwide, but has received relatively little attention in computational linguistics. We describe methods aimed at providing a shallow interpretation of messages sent via instant messaging. This is done by assigning labels known as dialogue acts to utterances within messages. Since messages may contain more than one utterance, we explore automatic message segmentation using combinations of parse trees and various statistical models to achieve high accuracy for both classification and segmentation tasks. Finally, we gauge the immediate usefulness of dialogue acts in conversation management by presenting a dialogue simulation program that uses dialogue acts to predict utterances during a conversation. The predictions are evaluated via qualitative means where we obtain very encouraging results.
|
Page generated in 0.0681 seconds