نتایج جستجو برای: language access

تعداد نتایج: 733516  

Journal: :J. Philosophical Logic 2015
Daniel Rothschild

The project of giving an account of meaning in natural languages goes largely by assigning truth-conditional content to sentences. I will call the view that sentences have truth-conditional content propositionalism as it is common to identify the truth-conditional content of a sentence with the proposition it expresses. This content plays an important role in our explanations of the speech-acts...

Journal: :Psychological science 2005
Robin Thompson Karen Emmorey Tamar H Gollan

The "tip of the fingers" phenomenon (TOF) for sign language parallels the "tip of the tongue" phenomenon (TOT) for spoken language. During a TOF, signers are sure they know a sign but cannot retrieve it. Although some theories collapse semantics and phonology in sign language and thus predict that TOFs should not occur, TOFs were elicited in the current study. Like TOTs, TOFs often resolve spon...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1391

with the introduction of communicative language teaching, a large number of studies have concerned with students’ oral participation in language classrooms. although the importance of classroom participation is evident, some language learners are unwilling to engage in oral activities. this passivity and unwillingness to participate in language classroom discussions is known as “reticence”. rev...

1983
S. Jerrold Kaplan

This is perhaps the broadest category. Among Ehe particular demands of natural language access are: treatment of lexicon and lexical ambiguities; use of parenthetical expressions which may require simultaneous update and query; support for the generation of natural language responses; storage of discourse information; representation of text structure models; accurate processing of natural langu...

2011
Yun Bai Khaled M. Khan

As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the system security agent. Authorization specification has been extensively studied and a variety of approaches have been investigated. In this paper, we propose a knowledge oriented formal language to specify the sys...

2008
Christiano Braga

Security is among the most successful applications of aspectoriented concepts. In particular, in role-based access control, aspects capture access conditions in a quite modular way. The question we address in this paper is how can aspects be generated from access control policies under a validated process? We present a metamodel-based transformation from SecureUML, a rolebased access control la...

2000
Claus Pahl

Security services in a multi-user environment are often based on access control mechanisms. Static aspects of an access control policy can be formalised using abstract algebraic models. We integrate these static aspects into a dynamic framework considering requesting access to resources as a process aiming at the prevention of access control violations when a program is executed. We use another...

Journal: :پژوهش های زبانی 0
آرزو نجفیان استادیار دانشگاه پیام نور تهران

one of the basic questions in the domain of lexical access and the process of word recognition in mental lexicon is how the native speaker can access the meaning of new complex words in his/her language and what factors affect  its speed? the aim of this study was to investigate empirically effective factors on the speed of lexical access to the derived words in persian mental lexicon. if we kn...

2009
Kevin Livingston Christopher Riesbeck

Learning by reading systems, designed to acquire episodic (instance based) knowledge, ultimately have to integrate that knowledge into an underlying memory. In order to effectively integrate new knowledge with existing knowledge such a system needs to be able to resolve references to the instances (agents, locations, events, etc.) it is reading about with those already existing in memory. This ...

2015
Lars Hamann Karsten Sohr Martin Gogolla

Role-based access control (RBAC) is widely used in organizations for access management. While basic RBAC concepts are present in modern systems, such as operating systems or database management systems, more advanced concepts like history-based separation of duty are not. In this work, we present an approach that validates advanced organizational RBAC policies using a model-based approach again...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید