746 resultados para Syntax


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Georg-Augusts-Universitat, Gottingen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Universitat Greifswald.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Universitat Jena.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Universitat Leipzig.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thesis (doctoral)--Rostock.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Programm der Staats-Ober-realschule, Brünn, am Schlusse des Schuljahres 1880-

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the article, we have reviewed the means for visualization of syntax, semantics and source code for programming languages which support procedural and/or object-oriented paradigm. It is examined how the structure of the source code of the structural and object-oriented programming styles has influenced different approaches for their teaching. We maintain a thesis valid for the object-oriented programming paradigm, which claims that the activities for design and programming of classes are done by the same specialist, and the training of this specialist should include design as well as programming skills and knowledge for modeling of abstract data structures. We put the question how a high level of abstraction in the object-oriented paradigm should be presented in simple model in the design stage, so the complexity in the programming stage stay low and be easily learnable. We give answer to this question, by building models using the UML notation, as we take a concrete example from the teaching practice including programming techniques for inheritance and polymorphism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stanley Fish in his monumental study argued that the reader of Paradise Lost is “surprised by sin” as he or she in the course of engaging with the text falls, like Adam and Eve, into sin and error and is brought up short. Through a “programme of reader harassment” the experience of the fall is re-enacted in the process of reading, wherein lies the poem’s meaning. And reader response criticism was born. But if for Fish the twentieth-century reader is “surprised by sin,” might not the twenty-first century reader, an all too frequently Latinless reader, be surprised by syntax, a syntax which despite of (or maybe because of) its inherent Latinity and associated linguistic alterity functions as a seductively attractive other? The reader, like Eve, is indeed surprised: enchanted, bemused, seduced by the abundant classicism, by the formal Latinate rhetoric achieved by a Miltonic unison of “Voice and Verse” and also by the language of a Satanic tempter who is—in the pejorative sense of the Latin adjective bilinguis—“double-tongued, deceitful, treacherous.” It is hardly an accident that this adjective (with which Milton qualifies hellish betrayal in his Latin gunpowder epic) was typically applied to the forked tongue of a serpent. This study argues that key to the success of the double-tongued Miltonic serpens bilinguis, is his use and abuse of Latinate language and rhetoric. It posits the possible case that this is mirrored in the linguistic methodology of the poeta bilinguis, the geminus Miltonus? For if, like Eve, the twenty-first century reader of Paradise Lost is surprised by syntax, by the Miltonic use and the Satanic abuse of a Latinate voice, might not he or she also be surprised by the text’s bilingual speaking voice?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We frequently experience and successfully process anomalous utterances. Here we examine whether people do this by ‘correcting’ syntactic anomalies to yield well-formed representations. In two structural priming experiments, participants’ syntactic choices in picture description were influenced as strongly by previously comprehended anomalous (missing-verb) prime sentences as by well-formed prime sentences. Our results suggest that comprehenders can reconstruct the constituent structure of anomalous utterances – even when such utterances lack a major structural component such as the verb. These results also imply that structural alignment in dialogue is unaffected if one interlocutor produces anomalous utterances.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report on a robust symmetry between the Polish and the Japanese sequence of syntactic projections in what superficially looks like different domains, namely verbal prefixes (Polish) and multiple verbs (Japanese). This paralellism strongly supports the thesis about the finegrained sequence of positions in syntax, namely that there exists the functional sequence of syntactic heads (fseq) which is invariantly ordered by UG (see e.g. Cinque (1999)) and the surface differences among particular langauges in the order of elements that instantiate this fseq result solely from movement (not from the variation in fseq itself).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On the one hand it has been advanced that remnant movement (RM) serves as a replacement for head movement and leads to certain permutations in word order while it disallows some others (e.g. Cinque (2005)), on the other hand, little attention has been devoted to the consequences RM has for clausal syntax. In this work, I illustrate one such consequence, namely the rise of crossing and nesting movement dependencies and their reflexes. In particular, I make a case for the existence of massive RM that involves entire clausal subtrees in Polish. The analysis provides a uniform solution to three robust puzzles in the Polish OVS construction in a straightforward way.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper outlines results from the long-term deployment of a system for mobile group socialization which utilizes a variety of mundane technologies to support cross-media notifications and messaging. We focus here on the results as they pertain to usage of mundane technologies, particularly the use of such technologies within the context of a cross-media system. We introduce “Rhub”, our prototype, which was designed to support coordination, communication and sharing amongst informal social groups. We also describe and discuss the usage of the “console,” a text-based syntax to enable consistent use across text messaging, instant messaging, email and the web. The prototype has been in active use for over 18 months by over 170 participants, who have used it on an everyday basis for their own socializing requirements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.