منابع مشابه
Typologie des risques pour une analyse éthique de l'impact des technologies du TAL
This paper details a typology of risk factors that should concern digital technologies and more specifically NLP. It aims at providing an evaluation grid for an ethical assessment of researches and applications. MOTS-CLÉS : éthique, analyse du risque, facteur de risque, vulnérabilité, criticité, risque professionnel, commande vocale, aide au handicap.
متن کاملUne assistance pour l'évolution des logiciels à base de composants
Among all the stages which constitute the maintenance process, the comprehension of an application before its evolution, and regression testing after its evolution are by far the most expensive. We present an approach which helps to reduce the costs associated with these two stages for component-based software. It proposes to formally document at each stage of the software life cycle the links ...
متن کاملPour une histoire des sciences à part entière
Jacques Roger (1920-1990) was one of the leading French historians of science of the twentieth century, noted for the definitive studies of his countryman Buffon. As professor at the Sorbonne and Director of the Ecole des Hautes Etudes en Sciences Sociales, the Centre Internationale de Synthese, and the Centre Alexandre Koyre, Roger was unquestionably a force to be reckoned with amongst French ...
متن کاملtypologie des erreurs orthographiques des étudiants iraniens en langue française
etant donné l’importance d’une orthographe correcte dans l’écriture du français, cette étude s’est penchée sur la typologie des erreurs orthographiques des étudiants iraniens en langue française selon les grilles typologiques de l’équipe c.n.r.s.-h.e.s.o. tout en précisant la répartition de chaque type d’erreur. notre étude, réalisée sur 85 étudiants iraniens en langue française dans trois univ...
متن کاملUne plate-forme dynamique pour l'évaluation des performances des bases de données à objets
In object-oriented or object-relational databases such as multimedia databases or most XML databases, access patterns are not static, i.e., applications do not always access the same objects in the same order repeatedly. However, this has been the way these databases and associated optimisation techniques such as clustering have been evaluated up to now. This paper opens up research regarding t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Voix Plurielles
سال: 2009
ISSN: 1925-0614
DOI: 10.26522/vp.v6i1.185