نتایج جستجو برای: synthetic proposition

تعداد نتایج: 154430  

2011
Tianrong Lin

In a recent letter by Ying et al. [Inf. Process. Lett. 104 (2007) 152-158], it showed some sufficient conditions for commutativity of quantum weakest preconditions. This paper provides some simple characterizations for the commutativity of quantum weakest preconditions, i.e., Theorem 3, Theorem 4 and Proposition 5 in what follows. We also show that to characterize the commutativity of quantum w...

2006
Alessandro Moschitti Daniele Pighin Roberto Basili

Recent work on the design of automatic systems for semantic role labeling has shown that such task is complex from both modeling and implementation point of views. Tree kernels alleviate such complexity as kernel functions generate features automatically and require less software development for data pre-processing. In this paper, we study several tree kernel approaches for boundary detection, ...

Journal: :CoRR 2014
Ekaterina Ovchinnikova Vladimir Zaytsev Suzanne Wertheim Ross Israel

Contemporary research on computational processing of linguistic metaphors is divided into two main branches: metaphor recognition and metaphor interpretation. We take a different line of research and present an automated method for generating conceptual metaphors from linguistic data. Given the generated conceptual metaphors, we find corresponding linguistic metaphors in corpora. In this paper,...

Journal: :IJITSA 2017
Mahsa Sadat Panahandeh Bahman Zamani

Digital Library; Bacon’s Media Directory; Cabell’s Directories; Compendex (Elsevier Engineering Index); CSA Illumina; DBLP; GetCited; Google Scholar; INSPEC; JournalTOCs; Library & Information Science Abstracts (LISA); MediaFinder; Norwegian Social Science Data Services (NSD); SCIRUS; SCOPUS; The Index of Information Systems Journals; The Standard Periodical Directory; Ulrich’s Periodicals Dire...

2006
Thanh-Ha Le Jessy Clédière Cécile Canovas Bruno Robisson Christine Servière Jean-Louis Lacoume

Cryptographic devices are vulnerable to the nowadays well known side channel leakage analysis. Secret data can be revealed by power analysis attacks such as Simple Power Analysis (SPA), Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). First, we give an overview of DPA in mono-bit and multi-bit cases. Next, the existing multi-bit DPA methods are generalized into the propos...

2014
Cendrine Moskalenko

Résumé: Recent progresses in the characterization of physical properties of viruses allows for the first time to investigate distinct virus cycle events at the single particle level [1]. Using an original combination of experimental approaches based on Atomic Force Microscopy (AFM) and statistical physics modelization, we propose to study the physical properties of Adeno-Associated Virus (AAV) ...

Journal: :Journal of health care finance 2003
G Landon Feazell John P Marren

Powerful forces are converging in US health care to finally cause recognition of the inherently logical relationship between quality and money. The forces, or marketplace "drivers," which are converging to compel recognition of the relationship between cost and quality are: (1) the increasing costs of care; (2) the recurrence of another medical malpractice crisis; and (3) the recognition inside...

2010
Godfried Toussaint

There has been considerable interest during the past 2300 years in comparing different models of geometric computation in terms of their computing power. One of the most well-known results is Mohr's proof in 1672 that all constructions that can be executed with straightedge and compass can be carried out with compass alone. The earliest such proof of the equivalence of models of computation is ...

2003
Stephen P. Nicholson

Studies that examine whether voters make informed decisions on direct legislation and whether direct legislation enhances civic engagement presume a basic awareness of ballot propositions, yet little is known about why some ballot propositions are more widely known than others. Despite the fact that research on awareness of ballot propositions and political awareness focus on individual factors...

2012
Sidi Ahmed DJENNAS Fethi Tarik BENDIMERAD

Continual growth in number of telecommunication network users encourages engineers to bring solutions to avoid overload and conflict. The situation is remedied by multiple access techniques and protocols. In fact, several ideas were applied with success to overcome difficulties. Basically, these ideas are based on discrimination in time, frequency, space and modulating code or time management. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید