نتایج جستجو برای: more correctly
تعداد نتایج: 2006848 فیلتر نتایج به سال:
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...
We describe a program for assigning correct stress contours to nominals in English. It makes use of idiosyncratic knowledge about the stress behavior of various nominal types and general knowledge about English stress rules. We have also investigated the related issue of parsing complex nominals in English. The importance of this work and related research to the problem of text-to-speech is 'di...
The specific gravity (SG) of wood is a measure of the amount of structural material a tree species allocates to support and strength. In recent years, wood specific gravity, traditionally a forester's variable, has become the domain of ecologists exploring the universality of plant functional traits and conservationists estimating global carbon stocks. While these developments have expanded our...
The technique of abstracting abstract machines (AAM) provides a systematic approach for deriving computable approximations of evaluators that are easily proved sound. This article contributes a complementary step-by-step process for subsequently going from a naive analyzer derived under the AAM approach, to an efficient and correct implementation. The end result of the process is a two to three...
We review the cybercrime literature to draw attention to the many occasions on which authors have identified concentrations within criminal activity. We note that the existence of concentrations often leads authors to suggest that concentrations, or ‘choke points’ are amenable to effective intervention. We then discuss the reasons that concentrations are observed – it is often the result of the...
We consider slicing extended finite state machines. Extended finite state machines (EFSMs) combine a finite state machine with a store and can model a range of computational phenomena, from high-level software to cyberphysical systems. They are essentially interactive and may be nondeterministic so standard techniques for slicing, developed for control flow graphs of programs with a functional ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید