نتایج جستجو برای: csrossover sign
تعداد نتایج: 55599 فیلتر نتایج به سال:
The Central Computing services at the Universiteit van Amsterdam (UvA) [17] have deployed an instance of the JASIG Uportal [18] system for use by a student audience of around 22,000. To achieve the requirement of a homogenous experience for the end user required a transition to a more consistent and unified Single Sign-On (SSO) and Single Sign-Off interaction with the underlying diverse infrast...
we give further results for perron-frobenius theory on the numericalrange of real matrices and some other results generalized from nonnegative matricesto real matrices. we indicate two techniques for establishing the main theorem ofperron and frobenius on the numerical range. in the rst method, we use acorresponding version of wielandt's lemma. the second technique involves graphtheory.
how to cite this article: karimzadeh p. juvenile type of niemann-pick type c disease and our study in iranian npc patients. iran j child neurol. 201 5 autumn;9:4(suppl.1): 5-6. pls see pdf.
This paper lays out the components of a language acquisition model, the interconnections among the components, and the differing stances of nativism and empiricism about syntax. After demonstrating that parsimony cannot decide between the two stances, the paper analyzes nine examples of evidence that have been used to argue for or against nativism, concluding that most pieces of evidence are ei...
© 2003 Giga Research, a wholly owned subsidiary of Forrester Research, Inc. All rights reserved. Reproduction or redistribution in any form without the prior permission of Forrester Research, Inc. is expressly prohibited. This information is provided on an “as is” basis and without express or implied warranties. Although this information is believed to be accurate at the time of publication, Fo...
Für Benutzer ist es im Allgemeinen nicht möglich, für jeden Dienst ein unabhängiges, starkes Passwort zu wählen. Diese Situation legt es nahe, den Nutzern ein Single Sign-on (SSO) anzubieten, das es erlaubt, sich mit nur noch einem Passwort an mehreren Diensten anzumelden. Pseudo-SSO-Systeme müssen nicht vom Dienstanbieter unterstütz werden, und sind daher für den Nutzer sofort nützlich, bei ih...
The purpose of this study was to determine the nature and efficiency of the strategies used by prelingually deafened native signers for the temporary retention of written words with reference to a primary language-coding hypothesis (M. A. Shand, 1982). For the gathering of the data, participants were shown lists of serially presented written target words that they were asked to recognize accord...
Linguistic and psycholinguistic evidence is presented to support the use of structure-mapping theory as a framework for understanding effects of iconicity on sign language grammar and processing. The existence of structured mappings between phonological form and semantic mental representations has been shown to explain the nature of metaphor and pronominal anaphora in sign languages. With respe...
This paper proposes an alternative approach to the examination of artifacts whose contents must be traceable to promote software quality. The approach places emphasis on media use and media transformations. We suggest that one cannot begin to assign and sustain traceability relations at a micro-level between units of content if the sign systems that have been created and transformed to represen...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید