نتایج جستجو برای: aptness

تعداد نتایج: 185  

2016
Yury Zhauniarovich Olga Gadyatskaya

Since the appearance of Android, its permission system was central to many studies of Android security. For a long time, the description of the architecture provided by Enck et al. in [31] was immutably used in various research papers. The introduction of highly anticipated runtime permissions in Android 6.0 forced us to reconsider this model. To our surprise, the permission system evolved with...

1983
Jon Doyle

We examine several formulations of the common practice of jumping to conclusions when actions demand decisions but solid knowledge fails. This practice permeates artificial intelligence, where systems assume many conclusions automatically as defaults simply because the questions they decide are known to occur frequently, and where other assumptions are formulated and adopted only when ignorance...

2008
Carlos M. Lorenzetti Ana G. Maguitman

The quality of the material collected by a context-based Web search systems is highly dependant on the vocabulary used to generate the search queries. This paper proposes to apply a semi-supervised algorithm to incrementally learn terms that can help bridge the terminology gap existing between the user’s information needs and the relevant documents’ vocabulary. The learning strategy uses an inc...

Journal: :Frontiers in Communication 2022

The incorporation of widespread, high-quality prevention campaigns and health communication is an integral part universally accessible healthcare systems. Importantly, in the context COVID-19, effective public has proven a key mitigating factor. Considering global differences countries' universal coverage, scope this study to formally compare how governments around globe communicated at onset p...

Journal: :International journal of law and politics studies 2023

Article 247 of the Revised Penal Code is Philippine version honor-based legislation. This study aimed to analyze and examine daughter clause article. The delved into legislative intent behind this as well its conformability harmony with Constitution, international conventions treaties, local legislations through blackletter methodology. By use a socio-legal method, it also examined contestation...

Journal: :JNW 2015
Muhammad Usman Vallipuram Muthukkumarasamy Xin-Wen Wu

Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS,...

Journal: :Artif. Intell. 2002
Katja Markert Udo Hahn

We propose a new computational model for the resolution of metonymies, a particular type of figurative language. Typically, metonymies are considered as a violation of semantic constraints (e.g., those expressed by selectional restrictions) that require some repair mechanism (e.g., type coercion) for proper interpretation. We reject this view, arguing that it misses out on the interpretation of...

2017
Guy Mavrothalassitis Philippe Pons G. Mavrothalassitis P. Pons

The first need of the risk analyst is the availability of pertinent software to assess, in a realistic way, the maximum effects of possible accidents such as pressure pulses, thermal fluxes, accidental missiles formation and projection and toxic releases of gases, vapours, mists, soots or dusts. To be useful to risk management, this approach has to be quite simple but also as realistic as possi...

2004
Gunther Kress Jon Ogborn Isabel Martins

The paper proposes that Language Awareness cannot be fully developed if it rests on a view of language from within. The proposal made here is that language is always one of a number of semiotic (communication/representational) modes in use in any act of communication, and that language may not be the central mode. The relations which language contracts have effect language ‘itself’. The fact th...

2004
Mario Beyer Wolfgang Hesse

In this contribution, we report on a diploma thesis project which combined two major aims: (1) to try out UML as a specification language for a specific software process model, and (2) to study the general aptness of UML for the software process modelling task. Due to the limited space we can only sketch our work and results here, for a longer version of this article cf. [BH03], for the diploma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید