نتایج جستجو برای: differential adpositional case marking dacm
تعداد نتایج: 1617356 فیلتر نتایج به سال:
The Distributed Denial-of-Service attack is a serious threat in Internet and an effective method is needed for distinguishing the attack traffic from the legitimate traffic. We propose the concept of bit marking to identify and drop the attack packets. Bit marking is a variation of packet marking technique that modifies the packet header at each router. However bit marking differs from packet m...
Computational complexity of the sub-tasks appearing in the symmetry reduction method for Place/Transition-nets is studied. The first task of finding the automorphisms (symmetries) of a net is shown to be polynomial time many-one equivalent to the problem of finding the automorphisms of a graph. The problem of deciding whether two markings are symmetric is shown to be equivalent to the graph iso...
A commonly made cross-linguistic generalization is that languages with extensive case-marking tend also to have greater freedom of word order than languages without. Explicit statements to this effect can be found in Sapir (1921, pp. 66, 177ff.), Jakobson (1936, p. 28) and more recently in Blake (2001, p. 15), but the idea goes back to the beginning of comparative studies of language. Thus on t...
Languages around the world share a number of commonalities known as language universals. We investigate whether the existence of some recurrent patterns can be explained by the learner’s preference to balance the amount of information provided by the cues to sentence meaning. In an artificial language learning paradigm, we expose learners to two languages with optional case-marking – one with f...
Previewing distracters enhances the efficiency of visual search. Watson and Humphreys (1997) proposed that the preview benefit rests on visual marking, a mechanism which actively encodes distracter locations at preview and inhibits them afterwards at search. As Watson and Humphreys did, we used a letter-color search task to study constraints of visual marking in conjunction search and near-effi...
Differential privacy (DP) was introduced as a measure of confidentiality protection by Dwork et al. (2006b) and Dwork (2006). Designed to guarantee confidentiality even in a worst-case scenario, differential privacy protects the information of any individual in the database even against an adversary with complete knowledge of the rest of the dataset. This strong guarantee is achieved by limitin...
In Petri net systems, liveness is an important property capturing the idea of no transition (action) becoming non-fireable (unattainable). Additionally, in some situations it is particularly interesting to check if the net system is (marking) monotonically live, i.e., it remains live for any marking greater than the initial one. In this paper, we discuss structural conditions preserving livenes...
Boundary layer problems (Singular perturbation problems) more have been applied for ordinary differential equations. While this theory for partial differential equations have many applications in several fields of physics and engineering. Because of complexity of limit and boundary behavior of the solutions of partial differential equations these problems considered less than ordinary case. In ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید