Uma Avaliação do Conceito de Regência e Transitividade na Tradição Gramatical do Português

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uma Avaliação sobre Rastreabilidade de Software no Contexto do MPS.BR

The need to increase the productivity and competitiveness among software development organizations has demanded additional quality from these companies. Thus, the adoption of a processes quality model is a growing activity, mainly with the creation of the MPS.BR model, the Brazilian program for software process improvement. In this context, an activity that increases the quality and is basic is...

متن کامل

Técnicas de Avaliação de Usabilidade do Tipo Do-It Yourself e seus Impactos no Processo de Desenvolvimento de uma Rede Social na Web

This paper presents a case study on application of usability evaluation techniques like do-it yourself (DIY) in the development of a social network on the web. Through hybrid techniques of qualitative data collection was possible to understand some aspects about the quality of the software interface in development. Usability tests like DIY, after the initial software design, have provided usefu...

متن کامل

O Conceito de Operação Estabelecedora na Análise do Comportamento

In general terms, establishing operations can be defined as environmental events that alter the reinforcing effectiveness of a stimulus, as well as evoke all behavior that, in the past, has been followed by such a stimulus. The concept seems to describe, in behavioral terms, what is usually called motivation. The present paper is an attempt to didactically present the theoretical development of...

متن کامل

Uma Avaliação do Esquema de Gerenciamento de Chave Baseado em Identidade Identity Key Management

Security is one of the main issues in Mobile Ad Hoc Networks (MANETs). MANETs natural features make them highly vulnerable to several attacks ranging from the physical up to the application layer. There are several algorithms and protocols to deal with these threats. All of them have a common element, the use of cryptography. Among the cryptographic systems found in the literature, the identity...

متن کامل

Um Modelo de Avaliação de Especificações Semi-Formais de Requisitos de Software Baseado na Teoria do

Resumo. O objetivo deste trabalho é apresentar um modelo de avaliação de especificações semi-formais de requisitos de software baseado na Teoria dos Conjuntos Nebulosos. Especificações semi-formais normalmente são apresentadas como um conjunto de diagramas onde os requisitos do software são declarados. Especialistas do domínio do problema e engenheiros de requisitos devem conjuntamente avaliar ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Todas as Letras: Revista de Língua e Literatura

سال: 2014

ISSN: 1980-6914

DOI: 10.15529/1980-6914/letras.v16n1p34-47