نتایج جستجو برای: aptness
تعداد نتایج: 185 فیلتر نتایج به سال:
Since the appearance of Android, its permission system was central to many studies of Android security. For a long time, the description of the architecture provided by Enck et al. in [31] was immutably used in various research papers. The introduction of highly anticipated runtime permissions in Android 6.0 forced us to reconsider this model. To our surprise, the permission system evolved with...
We examine several formulations of the common practice of jumping to conclusions when actions demand decisions but solid knowledge fails. This practice permeates artificial intelligence, where systems assume many conclusions automatically as defaults simply because the questions they decide are known to occur frequently, and where other assumptions are formulated and adopted only when ignorance...
The quality of the material collected by a context-based Web search systems is highly dependant on the vocabulary used to generate the search queries. This paper proposes to apply a semi-supervised algorithm to incrementally learn terms that can help bridge the terminology gap existing between the user’s information needs and the relevant documents’ vocabulary. The learning strategy uses an inc...
The incorporation of widespread, high-quality prevention campaigns and health communication is an integral part universally accessible healthcare systems. Importantly, in the context COVID-19, effective public has proven a key mitigating factor. Considering global differences countries' universal coverage, scope this study to formally compare how governments around globe communicated at onset p...
Article 247 of the Revised Penal Code is Philippine version honor-based legislation. This study aimed to analyze and examine daughter clause article. The delved into legislative intent behind this as well its conformability harmony with Constitution, international conventions treaties, local legislations through blackletter methodology. By use a socio-legal method, it also examined contestation...
Existing mobile agent-enabled anomaly detection schemes have not considered temporal behavior for their correct functioning and detection of temporal anomalies. This study employs a holistic system approach to design an Enhanced mobile Agent-enabled Anomaly Detection System (EAADS) by designing two new algorithms. The proposed algorithms are not only important for the completeness of the EAADS,...
We propose a new computational model for the resolution of metonymies, a particular type of figurative language. Typically, metonymies are considered as a violation of semantic constraints (e.g., those expressed by selectional restrictions) that require some repair mechanism (e.g., type coercion) for proper interpretation. We reject this view, arguing that it misses out on the interpretation of...
The first need of the risk analyst is the availability of pertinent software to assess, in a realistic way, the maximum effects of possible accidents such as pressure pulses, thermal fluxes, accidental missiles formation and projection and toxic releases of gases, vapours, mists, soots or dusts. To be useful to risk management, this approach has to be quite simple but also as realistic as possi...
The paper proposes that Language Awareness cannot be fully developed if it rests on a view of language from within. The proposal made here is that language is always one of a number of semiotic (communication/representational) modes in use in any act of communication, and that language may not be the central mode. The relations which language contracts have effect language ‘itself’. The fact th...
In this contribution, we report on a diploma thesis project which combined two major aims: (1) to try out UML as a specification language for a specific software process model, and (2) to study the general aptness of UML for the software process modelling task. Due to the limited space we can only sketch our work and results here, for a longer version of this article cf. [BH03], for the diploma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید