نتایج جستجو برای: more correctly

تعداد نتایج: 2006848  

Journal: :Journal of Combinatorial Theory, Series A 1992

2007
Randall K. Morck Birger Wernerfelt

Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...

Journal: :The Journal of Wildlife Management 2019

Journal: :Ankara Medical Journal 2019

1987
Richard Sproat Mark Y. Liberman

We describe a program for assigning correct stress contours to nominals in English. It makes use of idiosyncratic knowledge about the stress behavior of various nominal types and general knowledge about English stress rules. We have also investigated the related issue of parsing complex nominals in English. The importance of this work and related research to the problem of text-to-speech is 'di...

Journal: :American journal of botany 2010
G Bruce Williamson Michael C Wiemann

The specific gravity (SG) of wood is a measure of the amount of structural material a tree species allocates to support and strength. In recent years, wood specific gravity, traditionally a forester's variable, has become the domain of ecologists exploring the universality of plant functional traits and conservationists estimating global carbon stocks. While these developments have expanded our...

2013
J. Ian Johnson Nicholas Labich Matthew Might David Van Horn

The technique of abstracting abstract machines (AAM) provides a systematic approach for deriving computable approximations of evaluators that are easily proved sound. This article contributes a complementary step-by-step process for subsequently going from a naive analyzer derived under the AAM approach, to an efficient and correct implementation. The end result of the process is a two to three...

2015
Richard Clayton Tyler Moore Nicolas Christin

We review the cybercrime literature to draw attention to the many occasions on which authors have identified concentrations within criminal activity. We note that the existence of concentrations often leads authors to suggest that concentrations, or ‘choke points’ are amenable to effective intervention. We then discuss the reasons that concentrations are observed – it is often the result of the...

2016
Torben Amtoft Kelly Androutsopoulos David Clark

We consider slicing extended finite state machines. Extended finite state machines (EFSMs) combine a finite state machine with a store and can model a range of computational phenomena, from high-level software to cyberphysical systems. They are essentially interactive and may be nondeterministic so standard techniques for slicing, developed for control flow graphs of programs with a functional ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید