نتایج جستجو برای: inapplicability of existing graphical rules

تعداد نتایج: 21178284  

پایان نامه :0 1374

to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...

2005
Mikael Kindborg Kevin McGee

Comics and programs both are static representations of something dynamic. While a comic book almost looks and feels like an animated cartoon, the source code of a program seldom resembles the visible runtime behaviour. By using comic strips to represent concurrent events, graphical programs that feature interactive, animated characters and objects can be expressed in a visually direct way, maki...

Journal: :Computers & Graphics 1996
Jan O. Borchers Oliver Deussen Arnold Klingert Clemens Knörzer

The number of companies, institutions, and individuals competing for attention in the World-Wide Web is growing exponentially. This makes designing informative, easy-to-grasp, and visually appealing documents not only important for userfriendly information presentation, but also the key to success for any information provider. In this paper, we present layout guidelines for textual and graphica...

2013
Yinon Bentor Amelia Harrison Shruti Bhosale Raymond J. Mooney

This document describes the University of Texas at Austin 2013 system for the Knowledge Base Population (KBP) English Slot Filling (SF) task. The UT Austin system builds upon the output of an existing relation extractor by augmenting relations that are explicitly stated in the text with ones that are inferred from the stated relations using probabilistic rules that encode commonsense world know...

2004
Julie Thorpe Paul C. van Oorschot

In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force password crackers using attack dictionaries. This leads us to ask what classes of graphical passwords users find memorable. We postulate one such class supported by a collection of cognitive studies on visual recall, w...

2017
Pieter Heyvaert Anastasia Dimou Ruben Verborgh Erik Mannens

Linked Data can be generated by applying mapping rules on existing (semi-)structured data. The manual creation of these rules involves a costly process for users. Therefore, (semi-)automatic approaches have been developed to assist users. Although, they provide promising results, in use cases where examples of the desired Linked Data are available they do not use the knowledge provided by these...

 Unconformity with the financial rules, and the way in which the resources stemmed from oil export are introduced into government budget are two crucial issues which has been turned to be a sever impediment with respect to stabilization of financial policy. Majority of studies demonstrate the necessity for designing the fiscal rules to prevent the oversizing of government as well as to hinder t...

Ahmet Yildirim M.A Abdou Naeem Faraz Q. Wu, Yasir Khan,

In this paper, the MagnetoHydroDynamic (MHD) boundary layer flow over a nonlinear porous stretching sheet is investigated by employing the Homotopy Perturbation Transform Method (HPTM) and the Pade´ approximation. The numerical solution of the governing non-linear problem is developed. Comparison of the present solution is made with the existing solution and excellent agreement is noted. Gr...

Journal: :Buhalterinės apskaitos teorija ir praktika 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید