نتایج جستجو برای: elan
تعداد نتایج: 411 فیلتر نتایج به سال:
We show how to add Input/Output capabilities to the ELAN rewriting interpreter using a rewrite speciication of-calculus. This I/O system has the advantage of being totally explicit and t in the same semantic framework than any other \application program". An actual implementation shows the eeectiveness of this approach.
پدیدة چندنمایی چند سالی است که توجه پژوهشگران زبان را به خود جلب کرده و چشم انداز نوینی به سوی تعامل حوزه های مختلف زبان گشوده است. elan نرم افزاری است که در موسسه روانشناسی زبان ماکس پلانک و با هدف ایجاد پیکره های چندنما و مطالعة پدیدة چندنمایی در زبان طراحی شده است. این نرم افزار قابلیت های منحصربفردی را در ایجاد ساختارهای سلسله مراتبی داراست و به کاربر این امکان را می دهد با توجه به نیاز خود...
Several software systems have been developed recently for the automated generation of combustion reactions kinetic mechanisms using different representations of species and reactions and different generation algorithms. In parallel, several software systems based on rewriting have been developed for the easy modeling and prototyping of systems using rules controlled by strategies. This paper pr...
Utilization of computer tools in linguistic research has gained importance with the maturation of media frameworks for the handling of digital audio and video. The increased use of these tools in gesture, sign language and multimodal interaction studies has led to stronger requirements on the flexibility, the efficiency and in particular the time accuracy of annotation tools. This paper describ...
ELAN is a multimedia annotation tool developed by “The Language Archive” [1, 2], a unit of the Max Planck Institute for Psycholinguistics. It is applied in a variety of research areas in which audio and/or video recordings are the basis for qualitative and/or quantitative analysis of different modalities of communication. This paper aims at presenting a general overview of the tool with an emph...
The Needham-Schroeder public-key protocol [NS78] has been already analyzed using several methodologies from model-checkers like FDR [Ros94] to approaches based on theorem proving like NRL [Mea96]. Although this protocol is simple it has been proved insecure only in 1995 by G. Lowe [Low95]. After the discover of the security problem and the correctness proof of a modified version in [Low96] seve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید