نتایج جستجو برای: referential operations in fact
تعداد نتایج: 16995448 فیلتر نتایج به سال:
Simplifying the Mapping from Referring Expression to Referent in a Conceptual Semantics of Reference
In Jackendoff’s Conceptual Semantics, reference to objects, situations, places, directions, times, manners, and measures is supported, but reference is limited to instances of these conceptual categories. This paper proposes an extension of Jackendoff’s referential types along an orthogonal dimension of reference which is cognitively motivated in suggesting the possibility of referring to types...
This paper proposes a new query pattern-based relational schema-to-XML schema translation (QP-T) algorithm to resolve implicit referential integrity issue. Various translation methods have been introduced on structural aspects and/or semantic aspects. However, most of conventional methods consider only explicit referential integrities specified by relational schema. It causes several problems s...
Two experiments examined the restriction of referential domains during unscripted conversation by analyzing the modification and on-line interpretation of referring expressions. Experiment 1 demonstrated that from the earliest moments of processing, addressees interpreted referring expressions with respect to referential domains constrained by the conversation. Analysis of eye movements during ...
Research into human communication has been grouped under two traditions: referential and sociolinguistic. The study of a communication behavior simultaneously from both paradigms appears to be absent. Basically, this paper analyzes the use of private and social speech, through both a referential task (Word Pairs) and a naturalistic dyadic setting (Lego-set) administered to a sample of 64 childr...
information security is one of the most important enterprise assets. for any organization, information is valuable and should be appropriately protected. also, security is to combine systems, operations, and internal controls to ensure the integrity and confidentiality of data and operation procedures in an organization. knowing the fact that with serious threat of unauthorized users on the int...
In recent years, the methods of formal semantics and pragmatics have been fruitfully applied to analysis primate communication systems. Most analyses therein appeal a division labor between which has following three features: (F1) calls are given referential meanings (they provide information about world rather than just an action be taken), (F2) some general meaning, (F3) in context enriched b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید