نتایج جستجو برای: token frequency

تعداد نتایج: 489948  

2010
Kira Gor Svetlana Cook Scott Jackson Jennifer Koran Tatyana Vdovina

There is little agreement on the mechanisms involved in second language (L2) processing of regular and irregular inflectional morphology and on the exact role of age, amount, and type of exposure to L2 resulting in differences in L2 input and use. The article contributes to the ongoing debates by reporting the results of two experiments on Russian verb generation and recognition in a lexical de...

Journal: :Discussiones Mathematicae Graph Theory 2023

The $k$-token graph $T_k(G)$ is the whose vertices are $k$-subsets of a $G$, with two adjacent if their symmetric difference an edge $G$. We explore when well-covered graph, that is, all its maximal independent sets have same cardinality. For bipartite graphs we classify well-covered. arbitrary show $T_2(G)$ well-covered, then girth $G$ at most four. include upper and lower bounds on independen...

2002
Art Kazmierczak

The Institute of Electrical and Electronic Engineers 802.5 (1) standard has become a widely accepted protocol for token ring local area networks (LANs). A major part of its success is the advantages it offers over other network architectures. These advantages include its reliability and simplicity of hardware interfacing the transmission medium to the stations’ electronics. Because each station...

2017
Felix Engelmann Joanna Kolak Sonia Granlund Ben Ambridge Julian M. Pine Anna L. Theakston Elena Lieven

Usage-based approaches suggest that language acquisition is a function of the statistical properties of the input. We compare predictions from neural network models with results of two elicited-production experiments on verb inflection with children in the morphologically complex languages Polish and Finnish. Three-layer neural networks were trained to produce person/number-inflected present-te...

2017
Summer Laura Ann Wade

Introduction The Token Economy Advantages of Token Economies Problems of Token Economies Management/Control Goals Disruptive Behavior Ward Care Behavior Self-care Behavior Therapeutic/Educative Goals Verbal Behaviors Social Behaviors Implementation of the Token Economy Staff Training Backup Reinforcers Social Reinforcement Economic Balance and Savings Intermittant Reinforcement Su~ary and Concl...

2007
Delbert Hart Mihail Tudoreanu Gruia-Catalin Roman

Monitoring distributed computations provides a practical way of learning about and coming to understand a class of applications that are becoming increasingly common. The beneets of distribution arise from processes cooperating together to achieve a common goal. Coordination among the processes is a fundamental ingredient for the cooperation to occur both correctly and eeciently. One common for...

Journal: :Behavior research methods 2013
Andrew Duchon Manuel Perea Nuria Sebastián-Gallés Antonia Martí Manuel Carreiras

This article introduces EsPal: a Web-accessible repository containing a comprehensive set of properties of Spanish words. EsPal is based on an extensible set of data sources, beginning with a 300 million token written database and a 460 million token subtitle database. Properties available include word frequency, orthographic structure and neighborhoods, phonological structure and neighborhoods...

2004
Jean Vroomen Sabine van Linden Béatrice de Gelder Paul Bertelson

Recent work from our group has demonstrated that visual speech can recalibrate auditory speech identification [1]. Repeated exposure to an ambiguous auditory token (one intermediate between /aba/ and /ada/), combined with the sight of a face articulating one of the end-point tokens (/aba/ or /ada/), increased during subsequent unimodal auditory identification tests the frequency of responses co...

1995
Ching-Chih Han Kang G. Shin

There has been an increasing need of timely and predictable communication services for embedded real-time systems in automated factories and industrial process controls. Work has been done on real-time communication with deadline guarantees in point-to-point, token bus/token ring/FDDI, and DQDB (Distributed Queue Dual Bus) networks. However, due to the random access nature of the CSMA/CD type m...

2012
Ami Patel Sanjay Patel

This paper presents a framework for token based mutual exclusion algorithms in distributed systems. Their exists some traditional token based mutual exclusion algorithm. Some new algorithms are proposed in order to increase fault tolerance, minimize message complexity and decrease synchronization delay. In this paper, some new approaches are used, like Token ring algorithm with centralized appr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید