PIM for Mobility
MetadataShow full item record
Most office workers today use multiple channels of communication, including email, cell and desk phones, instant messaging and SMS/MMS. They send and receive large volumes of information through these channels. Only some of this information requires urgent action. While there are many channels to send and receive information, the availability of these channels changes depending on the user’s context. User context includes the activity they are involved in (meetings, classes, conferences etc), the date, time, and location, the devices they have access to (smart phones, cell phone, laptops etc), and the mode in which the devices are available (muted or not). For mobile workers, their context plays a key role in keeping them in touch with urgent information.
Personal Information Management - A SIGIR 2006 Workshop
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Yates, Alan H.; Schneider, Raymond J.; Blough, I. Kinter; Yates, Alan H.; Schneider, Raymond J.; Blough, I. Kinter (1946-08);This paper deals with the 2CH101 computer used in the Central Fire Station System as installed in the U.S. Army Air Force's heavy bomber, type B-29. Essentially, the computer consists of six servomechanisms which position ...
Application of the community radiative transfer model to evaluate satellite-based measurements across the African Easterly Jet over Western Africa Ernest, Richard D. (Monterey, California. Naval Postgraduate School, 2007-03);The Community Radiative Transfer Model (CRTM) has been used to determine which polar-orbiter satellite channels are best suited to remotely sense in a cloud-free environment the lower-tropospheric temperature and moisture ...
DeJong, Ronald Johannes (Monterey, California. Naval Postgraduate School, 1995-03);Analysis and identification of potential channels for illicit information flow is not required for Class Bi trusted systems such as the Sun Microsystems Trusted Solaris 1.1 trusted computing base. When used in a multilevel ...