Widening the Church's Invitation

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Widening the Evaluation Net

Intelligent Virtual Agent (IVA) systems are notoriously difficult to evaluate, particularly due to the subjectivity involved. From the various efforts to develop standard evaluation schemes for IVA systems the scheme proposed by Isbister & Doyle, which evaluates systems across five categories, seems particularly appropriate. To examine how these categories are being used, the evaluations presen...

متن کامل

The Widening Cultural Divide

The notion that economic integration will bring cultural integration in its train is only partly valid. As I describe in this article, economic development does make societies less nationalistic and more tolerant, trusting, and democratic. But the broad cultural heritage of a society— Protestant, Roman Catholic, Orthodox, Confucian, or Communist—leaves a lasting imprint on values that endures d...

متن کامل

Invitation to the RNA Community

Affiliations: Department of Chemistry and Center for Biomolecular Sciences, Bowling Green State University, Bowling Green, OH 43402, USA. Stanford Medical Informatics, Stanford University Medical Center, Stanford, CA 94305, USA. Department of Chemistry and Chemical Biology, Rutgers The State University of New Jersey, Piscataway, NJ 08854, USA. Department of Plant & Microbial Biology, 111 Koshla...

متن کامل

Generalized Widening

We present a new threat based search algorithm that outperforms other threat based search algorithms and selective knowledge-based for open life and death problem solving in the game of Go. It generalizes the Iterative Widening algorithm which consists in iteratively increasing the threat searched at the root. The main idea of Generalized Widening is to perform Iterative Widening at all max nod...

متن کامل

Widening Sharing

We study the problem of an efficient and precise sharing analysis of (constraint) logic programs. After recognizing that neither plain Sharing nor its non-redundant (but equivalent) abstraction scale well to real programs, we consider the domain proposed by C. Fecht [11, 12]. This domain consists of a combination of Pos with a quite weak abstraction of Sharing. While verifying that this domain ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The American Journal of Theology

سال: 1914

ISSN: 1550-3283

DOI: 10.1086/479344