نتایج جستجو برای: cross reference

تعداد نتایج: 747557  

Journal: :Linguistics vanguard 2022

Abstract Numerous studies have found evidence of a speech community’s referential practices in discourse being predictive its members’ behavior nonverbal tasks. In this article, we discuss series exceptions to alignment pattern, drawing on data from eleven populations Asia, Europe, the Middle East, North and Central America, Oceania. These not been discussed conjunction with one another strikin...

2010
George Anadiotis Panos Alexopoulos Konstantinos Mpaslis Aristotelis Zosakis Kostas Kafentzis Konstantinos Kotis

In this paper we describe the application of various Semantic Web technologies and their combination with emerging Web2.0 use patterns in the eParticipation domain and show how they have been used in a pilot system for the Regional Government of the Prefecture of Samos, Greece. We present the parts of the system that are based on Semantic Web technology and how they are merged with a Web2.0 phi...

1991
Charles P. Dolan Thomas V. Cuda Seth R. Goldman Alan M. Nakamura

TTS-MUC3 incorporates semi-automated lexicon generation and almost fully automated phras e pattern generation. Associative retrieval from a case memory provides raw data for computing se t fills and string fills . TTS-MUC3's modular process model integrates the results of case memor y retrieval over sentences from multiple stories, extracts the date and location of incidents, an d computes cros...

2012
Mishari Al Mishari Gene Tsudik

Large numbers of people all over the world read and contribute to various review sites. Many contributors are understandably concerned about privacy in general and, specifically, about linkability of their reviews (and accounts) across multiple review sites. In this paper, we study linkability of community-based reviewing and try to answer the question: to what extent are ”anonymous” reviews li...

Journal: :Computers & Security 2003
Seny Kamara Sonia Fahmy E. Eugene Schultz Florian Kerschbaum Michael Frantzen

Firewalls protect a trusted network from an untrusted network by filtering traffic according to a specified security policy. A diverse set of firewalls is being used today. As it is infeasible to examine and test each firewall for all possible potential problems, a taxonomy is needed to understand firewall vulnerabilities in the context of firewall operations. This paper describes a novel metho...

2009
Pontus Fryk Einar Iveroth Olle Persson

This paper explores the degree and nature of the research interaction between the academic fields of Information Technology, Organization, and Organizational Change. This is done so as to see if, and how, the highly digitized modern business world is reflected in related research. The paper analyses 9.669 articles published in 1995-2006 that are derived from major journals within each field. Th...

1993
David Carrington Ian Hayes Jim Welsh

As part of a project investigating modularity in the formal development of software , we have investigated approaches for deriving a set of module interfaces from a formal speciication. Rather than base this design on any structure explicit in the speciication, we utilise the implicit structure formed by patterns of reference between state variables and operations. Our work has involved speciic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید