نتایج جستجو برای: inapplicability of existing graphical rules
تعداد نتایج: 21178284 فیلتر نتایج به سال:
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
Comics and programs both are static representations of something dynamic. While a comic book almost looks and feels like an animated cartoon, the source code of a program seldom resembles the visible runtime behaviour. By using comic strips to represent concurrent events, graphical programs that feature interactive, animated characters and objects can be expressed in a visually direct way, maki...
The number of companies, institutions, and individuals competing for attention in the World-Wide Web is growing exponentially. This makes designing informative, easy-to-grasp, and visually appealing documents not only important for userfriendly information presentation, but also the key to success for any information provider. In this paper, we present layout guidelines for textual and graphica...
This document describes the University of Texas at Austin 2013 system for the Knowledge Base Population (KBP) English Slot Filling (SF) task. The UT Austin system builds upon the output of an existing relation extractor by augmenting relations that are explicitly stated in the text with ones that are inferred from the stated relations using probabilistic rules that encode commonsense world know...
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically exhibit patterns, they are exploitable by brute-force password crackers using attack dictionaries. This leads us to ask what classes of graphical passwords users find memorable. We postulate one such class supported by a collection of cognitive studies on visual recall, w...
Linked Data can be generated by applying mapping rules on existing (semi-)structured data. The manual creation of these rules involves a costly process for users. Therefore, (semi-)automatic approaches have been developed to assist users. Although, they provide promising results, in use cases where examples of the desired Linked Data are available they do not use the knowledge provided by these...
Unconformity with the financial rules, and the way in which the resources stemmed from oil export are introduced into government budget are two crucial issues which has been turned to be a sever impediment with respect to stabilization of financial policy. Majority of studies demonstrate the necessity for designing the fiscal rules to prevent the oversizing of government as well as to hinder t...
In this paper, the MagnetoHydroDynamic (MHD) boundary layer flow over a nonlinear porous stretching sheet is investigated by employing the Homotopy Perturbation Transform Method (HPTM) and the Pade´ approximation. The numerical solution of the governing non-linear problem is developed. Comparison of the present solution is made with the existing solution and excellent agreement is noted. Gr...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید