• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,439
Next 10 →

Inappropriate Use of Cell Phones

by Jami Mcauley, Jami L , 2011
"... School counselors face the ongoing complexity of trying to inform students and educators about the appropriate use of cell phones at school. With almost 75 percent of all school age students having cell phones, the use of them in and outside of school is increasing. Situations regarding the misuse o ..."
Abstract - Add to MetaCart
School counselors face the ongoing complexity of trying to inform students and educators about the appropriate use of cell phones at school. With almost 75 percent of all school age students having cell phones, the use of them in and outside of school is increasing. Situations regarding the misuse

Use of Cell phones in Classroom

by Teaching Boon Or Bane, Dr. Reena Mittal
"... There is always a debate amongst educationists about students being allowed to bring cell phones in classrooms. But recent studies and my own exposure to Oxford make me think about this issue. ELT also need a lot of technological upheaval and I think use of cell phones can make it fruitful and inter ..."
Abstract - Add to MetaCart
There is always a debate amongst educationists about students being allowed to bring cell phones in classrooms. But recent studies and my own exposure to Oxford make me think about this issue. ELT also need a lot of technological upheaval and I think use of cell phones can make it fruitful

Source Cell-phone Identification

by unknown authors
"... The techniques to validate the authenticity of digital images are rather limited. In this paper, we focus on blind source cell-phone identification problem. The main idea is that proprietary interpolation algorithm (involved due to the structure of color filter array [CFA]) leaves footprints in the ..."
Abstract - Add to MetaCart
The techniques to validate the authenticity of digital images are rather limited. In this paper, we focus on blind source cell-phone identification problem. The main idea is that proprietary interpolation algorithm (involved due to the structure of color filter array [CFA]) leaves footprints

317.710.1500 (cell phone)

by Christopher Vallee, Lisa Bennett, John Anderson, Michelle Kish, Phil Pierce, Derek Daly, Larry Lambert, Mike Baker, Dave White
"... 727.742.1001 (cell phone) 941.981.9128 (home phone) ..."
Abstract - Add to MetaCart
727.742.1001 (cell phone) 941.981.9128 (home phone)

North Koreans Have Cell Phones

by unknown authors
"... Why cell phones won’t lead to revolution and how they strengthen the regime. ..."
Abstract - Add to MetaCart
Why cell phones won’t lead to revolution and how they strengthen the regime.

CELL PHONES: PRECAUTIONS RECOMMENDED

by Janet Raloff
"... ions_recommended Several government bodies around the world suggest that anyone who uses a cell phone (and these days, who doesn’t) would be well advised to keep a little distance between that phone and their body. And when people need to make a call, they should minimize radiation exposures by phon ..."
Abstract - Add to MetaCart
ions_recommended Several government bodies around the world suggest that anyone who uses a cell phone (and these days, who doesn’t) would be well advised to keep a little distance between that phone and their body. And when people need to make a call, they should minimize radiation exposures

through Cell Phone Cameras

by Rich Gossweiler, Joshua Tyler, Rich Gossweiler, Joshua Tyler , 2005
"... digital story telling, awareness, cell phone, rss, weblog, time clustering, ease-of-use, ubiquitous computing, authorby-playing, browsing With a cell phone camera a person can take pictures and immediately transmit them to larger repositories using telecommunication channels. This provides the poten ..."
Abstract - Add to MetaCart
digital story telling, awareness, cell phone, rss, weblog, time clustering, ease-of-use, ubiquitous computing, authorby-playing, browsing With a cell phone camera a person can take pictures and immediately transmit them to larger repositories using telecommunication channels. This provides

Cell-phone-induced driver distraction.

by David L Strayer , Frank A Drews - Current Directions in Psychological Science 16, , 2007
"... ABSTRACT-Our research examined the effects of handsfree cell-phone conversations on simulated driving. We found that even when participants looked directly at objects in the driving environment, they were less likely to create a durable memory of those objects if they were conversing on a cell phon ..."
Abstract - Cited by 26 (5 self) - Add to MetaCart
ABSTRACT-Our research examined the effects of handsfree cell-phone conversations on simulated driving. We found that even when participants looked directly at objects in the driving environment, they were less likely to create a durable memory of those objects if they were conversing on a cell

THE CELL PHONE AND THE CELL

by Andrew Goldsworthy
"... Electromagnetic fields have effects at the cell level Weak non-ionising radiation, such as that from mobile (cell) phones has biological effects, ranging from changes in brain function to the exacerbation of allergies and the induction and promotion of cancer. There have been many attempts to find t ..."
Abstract - Add to MetaCart
Electromagnetic fields have effects at the cell level Weak non-ionising radiation, such as that from mobile (cell) phones has biological effects, ranging from changes in brain function to the exacerbation of allergies and the induction and promotion of cancer. There have been many attempts to find

Guidelines on Cell Phone and PDA Security (Draft)

by Guidelines On Cell Phone, Wayne Jansen, Karen Scarfone, Recommendations Of The National, Karen Scarfone, Carlos M. Gutierrez, James M. Turner, Deputy Director , 2008
"... ii GUIDELINES ON CELL PHONE AND PDA SECURITY (DRAFT) ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
ii GUIDELINES ON CELL PHONE AND PDA SECURITY (DRAFT)
Next 10 →
Results 1 - 10 of 3,439
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University