منابع مشابه
Analyse de dépendances ML pour les évaluateurs de logiciels critiques
Critical software needs to obtain an assessment before commissioning in order to ensure compliance with standards. This assessment is given after a long task of software analysis performed by assessors. They may be helped by tools, used interactively, to build models using information-flow analyses. Tools like SPARK-Ada exist for Ada subsets used for critical software. But some emergent languag...
متن کاملberman et les instruments critiques de traduction
pour la première fois un philosophe traductologue, antoine berman, offre ses expériences basées sur l‟école de la traduction des romantiques allemands. ses cours sont publiés plus tard dans un livre intitulé la traduction et la lettre ou l’auberge du lointain (1999). au contraire des théoriciens traditionnels qui voulaient la restitution embellissant du sens et les analystes de certaines traduc...
متن کاملSen’s Entitlement Approach: Critiques and Counter-critiques
Twenty years after Poverty and Famines elaborated the entitlement approach as an innovative and holistic approach to famine analysis, debates about some of its fundamental assertions remain unresolved. This paper examines four limitations acknowledged by Sen himself: starvation by choice, disease-driven rather than starvation-driven mortality, ambiguities in entitlement speci cation and extra-...
متن کاملEmerging Therapy Critiques
Symptomatic intracranial stenoses are an important cause of stroke and have a high risk of recurrent stroke with medical therapy. The Stenting and Aggressive Medical Management for Preventing Recurrent Stroke in Intracranial Arterial Stenosis (SAMMPRIS) trial unexpectedly showed a higher-than-expected rate of complications with intracranial stenting and a lower-than-expected recurrence rate wit...
متن کاملCPSC 502: Paper Critiques
WebIQ uses a three-fold, query-based approach to the problem: First, it discovers data instances from the “Surface Web” (the part of the World Wide Web that can be accessed using regular search engines such as Google). This is done by formulating extraction queries, posing them to a search engine, extracting data instances from the results, and then validating them. Second, it borrows already e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Histoire & mesure
سال: 2009
ISSN: 0982-1783,1957-7745
DOI: 10.4000/histoiremesure.3869