PIM for Mobility
Abstract
Most office workers today use multiple channels of
communication, including email, cell and desk phones, instant
messaging and SMS/MMS. They send and receive large volumes
of information through these channels. Only some of this
information requires urgent action. While there are many channels
to send and receive information, the availability of these channels
changes depending on the user’s context. User context includes
the activity they are involved in (meetings, classes, conferences
etc), the date, time, and location, the devices they have access to
(smart phones, cell phone, laptops etc), and the mode in which the
devices are available (muted or not). For mobile workers, their
context plays a key role in keeping them in touch with urgent
information.
Description
Personal Information Management - A SIGIR 2006 Workshop
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Performance analysis of certain components of fire control equipment for bombing aircraft
Yates, Alan H.; Schneider, Raymond J.; Blough, I. Kinter; Yates, Alan H.; Schneider, Raymond J.; Blough, I. Kinter (1946-08);This paper deals with the 2CH101 computer used in the Central Fire Station System as installed in the U.S. Army Air Force's heavy bomber, type B-29. Essentially, the computer consists of six servomechanisms which position ... -
Application of the community radiative transfer model to evaluate satellite-based measurements across the African Easterly Jet over Western Africa
Ernest, Richard D. (Monterey, California. Naval Postgraduate School, 2007-03);The Community Radiative Transfer Model (CRTM) has been used to determine which polar-orbiter satellite channels are best suited to remotely sense in a cloud-free environment the lower-tropospheric temperature and moisture ... -
A study of covert channels in a trusted UNIX system
DeJong, Ronald Johannes (Monterey, California. Naval Postgraduate School, 1995-03);Analysis and identification of potential channels for illicit information flow is not required for Class Bi trusted systems such as the Sun Microsystems Trusted Solaris 1.1 trusted computing base. When used in a multilevel ...