Listing 1 - 7 of 7 |
Sort by
|
Choose an application
This article proposes a classification of speech functions of variable tag questions in British English conversations. Based on intonational, conversational and formal criteria the analysis shows that tag questions can not only function as questions and statements, but also as responses, commands and offers. A large group of tag questions cannot be captured by any of the traditional speech functions and are classified instead as Statement-Question blends. The article investigates the impact of the LLC and COLT corpora, and features such as gender, age and social roles, on the distribution of t
Mathematical linguistics --- Grammar --- English language --- Pragmatics --- Lexicology. Semantics --- 519.76 --- 801.56 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Syntaxis. Semantiek --- Conferences - Meetings --- Engels. --- Grammaticale figuren. --- Corpuslinguïstiek. --- 801.56 Syntaxis. Semantiek --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Computational linguistics --- Data processing --- Research --- Discourse analysis --- Germanic languages
Choose an application
Mathematical linguistics --- 519.76 --- 519.688 --- 681.3:80 --- Computational linguistics --- Automatic language processing --- Language and languages --- Language data processing --- Linguistics --- Natural language processing (Linguistics) --- Applied linguistics --- Cross-language information retrieval --- Multilingual computing --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Programs and algorithms for computer solution of specific problems --- Computerwetenschap-:-?80 --- Data processing --- 519.688 Programs and algorithms for computer solution of specific problems --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics
Choose an application
Programming --- cryptografie --- computerbeveiliging --- Computer architecture. Operating systems --- 519.72 --- 091.14:003.26 --- 519.76 --- 681.3 --- Computerbeveiligingssystemen --- Cryptography (Cryptografie, Netwerkbeveiliging) --- databeveiliging (informatiebeveiliging) --- elektronisch geld --- internet --- Information theory: mathematical aspects --- Codices--Geheimschrift, cryptografie --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- 091.14:003.26 Codices--Geheimschrift, cryptografie --- 519.72 Information theory: mathematical aspects
Choose an application
This book provides the first comprehensive account of temporal deixis in English printed and online news texts. Linking the characteristic usage of tenses with the projection of deictic centres, it notes how conventional tenses, particularly in headlines, are affected by heteroglossia arising from various accessed voices. The resulting tense shifts are interpreted pragmatically as a conventional reader-oriented strategy that creates the impression of temporal co-presence. It is argued that since different tense choices systematically correlate with the three main textual segments of news texts
Pragmatics --- 82:659.3 --- 519.76 --- 801.56 --- Mass media and language. --- Mass media --- Speech acts (Linguistics) --- Internet --- Illocutionary acts (Linguistics) --- Speech act theory (Linguistics) --- Speech events (Linguistics) --- Language and languages --- Linguistics --- Speech --- 801.56 Syntaxis. Semantiek --- Syntaxis. Semantiek --- Language and mass media --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- 82:659.3 Literatuur en massacommunicatie --- Literatuur en massacommunicatie --- Pragmalinguistics --- General semantics --- Logic, Symbolic and mathematical --- Semantics (Philosophy) --- Data processing. --- Social aspects. --- Philosophy --- Mass communications --- Mathematical linguistics --- Mass media and language --- Data processing --- Social aspects
Choose an application
Nonlinear programming. --- 519.8 --- 519.2 --- Nonlinear programming --- Mathematical optimization --- 519.76 --- Optimization (Mathematics) --- Optimization techniques --- Optimization theory --- Systems optimization --- Mathematical analysis --- Maxima and minima --- Operations research --- Simulation methods --- System analysis --- Programming (Mathematics) --- Operational research --- Probability. Mathematical statistics --- 519.2 Probability. Mathematical statistics --- 519.8 Operational research --- Programmation non linéaire. --- Programmation non linéaire.
Choose an application
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. About the first edition: It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." -Neal Koblitz, The American Mathematical Monthly.
Coding theory --- Cryptography --- Codage --- Cryptographie --- 519.76 --- 519.711 --- 519.72 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- General questions of control theory. Models. Modelling. Coding. Theory of nets --- Information theory: mathematical aspects --- 519.72 Information theory: mathematical aspects --- 519.711 General questions of control theory. Models. Modelling. Coding. Theory of nets --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- Number theory. --- Data structures (Computer science). --- Number Theory. --- Data Structures and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Number study --- Numbers, Theory of --- Algebra
Choose an application
Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.
Listing 1 - 7 of 7 |
Sort by
|