To Script or Not to Script: Rethinking Pseudolus as Playwright
نویسندگان
چکیده
منابع مشابه
Script Templates: A Practical Approach to Script Training in Aphasia.
PURPOSE Script training for aphasia involves repeated practice of relevant phrases and sentences that, when mastered, can potentially be used in other communicative situations. Although an increasingly popular approach, script development can be time-consuming. We provide a detailed summary of the evidence supporting this approach. We then describe a method in which scripts at various levels of...
متن کاملGurmukhi Script To Braille Code
Braille is the language used by the blind people for developing their learning and writing skills. Braille code is widely used by the blind people all over the world to become educated and led their life successfully. In this paper I presented the development of the whole system which converts Gurmukhi to braille.
متن کاملScript Induction as Language Modeling
The narrative cloze is an evaluation metric commonly used for work on automatic script induction. While prior work in this area has focused on count-based methods from distributional semantics, such as pointwise mutual information, we argue that the narrative cloze can be productively reframed as a language modeling task. By training a discriminative language model for this task, we attain impr...
متن کاملScript Identification – A Han & Roman Script Perspective
All Han-based scripts (Chinese, Japanese, and Korean) possess similar visual characteristics. Hence system development for identification of Chinese, Japanese and Korean scripts from a single document page is quite challenging. It is noted that a Han-based document page might also have Roman script in them. A multi-script OCR system dealing with Chinese, Japanese, Korean, and Roman scripts, dem...
متن کاملDefeating Cyber Attacks Due to Script Injection
Offensive operations have been promoted by the aggressors using computer as a tool or target, resulting, a cyber attack in web-applications of an organization or the infrastructure of entire nation. Depending upon the attacker’s target, one can classify some of the mostly occurred cyber attacks into five broad categories. It reports some of the common methods adopted in conducting these attacks...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Helios
سال: 2014
ISSN: 1935-0228
DOI: 10.1353/hel.2014.0003