منابع مشابه
VP Ellipsis and Semantic Identity
While it is generally agreed that an elliptical Verb Phrase must be identical to its antecedent, the precise formulation of the identity condition is controversial. I present a semantic identity condition on VP ellipsis: the elided VP must have the same meaning as its antecedent. I argue that a semantic identity condition is superior to a syntactic condition on both empirical and theoretical gr...
متن کاملAutomatic Identity Recognition in The Semantic Web
The OKKAM initiative has recently highlighted the need of moving from the traditional web towards a “web of entities”, where real-world objects descriptions could be retrieved, univocally identified, and shared over the web. In this paper, we propose our vision of the entity recognition problem and, in particular, we propose methods and techniques to capture the “identity” of a real entity in t...
متن کاملSemantic Integration of Identity Data Repositories
With the continuously growing number of distributed and heterogeneous IT systems there is the need for structured and efficient identity management (IdM) processes. This implies that new users are created once and then the information is distributed to all applicable software systems same as if changes on existing user objects occur. The central issue is that there is no generally accepted stan...
متن کاملculture, identity, and language education: home culture attachment, social/cultural capital, demographic factors and self-identity changes among iranian efl teachers
: در تحقیقی که پیش روی دارید ابتدا سعی شده است که نقش میزان بهره مندی مدرسان زبان انگلیسی از سرمایه های فرهنگی و اجتماعی در چارچوب نظریه بوردیو(1986) بر میزان وابستگی آن ها به فرهنگ خودی بررسی شود. لذا دو پرسشنامه به طورهمزمان بین 342 مدرس زبان انگلیسی در بیش از 25 موسسه ی خصوصی زبان انگلیسی در سطح شهر مشهد توزیع شد. رابطه ی بین میزان دسترسی به سرمایه فرهنگی و اجتماعی و وابستگی به فرهنگ خودی از...
15 صفحه اولRelations between semantic security and anonymity in identity-based encryption
Semantic security and anonymity are the two main properties that an identity-based encryption scheme can satisfy. Such properties can be defined in either an adaptive or a selective scenario, which differ on the moment where the attacker chooses the identity/ies that are the target of the attack. There are well-known separations between selective and adaptive semantic security on the one hand, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ENGLISH LINGUISTICS
سال: 2013
ISSN: 0918-3701,1884-3107
DOI: 10.9793/elsj.30.2_643