نتایج جستجو برای: its divided to many criteria

تعداد نتایج: 10982868  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

this study was conducted to investigate the impact of podcasts as a learning and teaching tool on iranian efl learners’ motivation for listening as well as on their listening comprehension ability. the study also investigated the learners’ perception towards listening to podcasts and examined whether the learners were likely to accept podcasts. out of fifty-five intermediate learners studying e...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1390

abstract the variables affecting the nature of reading comprehension can be classified into two general categories: reader’s variables, and text variables (alderson, 2000). despite the wave of research on vocabulary knowledge as reader’s variable, the role of this knowledge in c-test as a text-dependent test and its interaction with lexical cohesion of the test as a text feature has remained a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1388

since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...

1997
Luca Becchetti Carlo Gaibisso

In this paper we deal with the problem of designing virtual path layouts in ATM networks with given hop-count and minimum load, for which we prove a lower bound with respect to networks with arbitrary topology. The result is then applied to derive a tight lower bound for the one-to-many communication pattern in networks with arbitrary topology, and for the many-to-many communication pattern in ...

2002
Iyad Rahwan Ryszard Kowalczyk H. H. Pham

Negotiation is a process in which two or more parties with different criteria, constraints, and preferences, jointly reach an agreement on the terms of a transaction. Many current automated negotiation systems support one-to-one negotiation. One-to-many negotiation has been mostly automated using various kinds of auction mechanisms, which have a number of limitations such as the lack of the abi...

2015
Zhenhua Jiao Guoqiang Tian

This paper considers group strategy-proofness in many-to-many two-sided matching problems. We first show that the Blocking Lemma holds for a many-to-many matching model under quota-saturability condition and max-min preference criterion that is stranger than substitutability of preferences. This result extends the Blocking Lemma for one-to-one matching and for many-to-one matching to many-to-ma...

1998
Erik D. Demaine

In this paper, we propose several deadlock-free protocols for implementing the generalized alternative construct, where a process non-deterministically chooses between sending or receiving among various synchronous channels. We consider general many-to-many channels and examine in detail the special case of fan (many-toone and one-to-many) channels, which are common and can be implemented much ...

2009
Lorenzo Cioni

The paper presents some models involving a pair of actors that aim at bartering the goods from two privately owned pools of heterogeneous goods. In the models we discuss in the paper the barter can occur only once and can involve either a single good or a basket of goods from each actor/player. In the paper we examine both the basic symmetric model (one-to-one barter) as well as some other vers...

2007
Milan Simek Radim Burget Dan Komosny

Any Source Multicast (ASM) called Internet Standard Multicast (ISM) and its extension, Specific Source Multicast (SSM), are two known multicast technologies for delivering a data flow to a great number of customers over IP networks without cumulative bandwidth consumption. ASM technology is suitable for the many-to-many delivering model such as videoconferencing, where more sources are sending ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید