Academic literature on the topic 'Assertion mining'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Assertion mining.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Assertion mining"

1

Cagliero, Luca, Tania Cerquitelli, and Paolo Garza. "Semi-Automatic Ontology Construction by Exploiting Functional Dependencies and Association Rules." International Journal on Semantic Web and Information Systems 7, no. 2 (April 2011): 1–22. http://dx.doi.org/10.4018/jswis.2011040101.

Full text
Abstract:
This paper presents a novel semi-automatic approach to construct conceptual ontologies over structured data by exploiting both the schema and content of the input dataset. It effectively combines two well-founded database and data mining techniques, i.e., functional dependency discovery and association rule mining, to support domain experts in the construction of meaningful ontologies, tailored to the analyzed data, by using Description Logic (DL). To this aim, functional dependencies are first discovered to highlight valuable conceptual relationships among attributes of the data schema (i.e., among concepts). The set of discovered correlations effectively support analysts in the assertion of the Tbox ontological statements (i.e., the statements involving shared data conceptualizations and their relationships). Then, the analyst-validated dependencies are exploited to drive the association rule mining process. Association rules represent relevant and hidden correlations among data content and they are used to provide valuable knowledge at the instance level. The pushing of functional dependency constraints into the rule mining process allows analysts to look into and exploit only the most significant data item recurrences in the assertion of the Abox ontological statements (i.e., the statements involving concept instances and their relationships).
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Chi-Hsin, and Hsin-Hsi Chen. "Commonsense Knowledge Mining from the Web." Proceedings of the AAAI Conference on Artificial Intelligence 24, no. 1 (July 5, 2010): 1480–85. http://dx.doi.org/10.1609/aaai.v24i1.7505.

Full text
Abstract:
Good and generous knowledge sources, reliable and efficient induction patterns, and automatic and controllable quality assertion approaches are three critical issues to commonsense knowledge (CSK) acquisition. This paper employs Open Mind Common Sense (OMCS), a volunteers-contributed CSK database, to study the first and the third issues. For those stylized CSK, our result shows that over 40% of CSK for four predicate types in OMCS can be found in the web, which contradicts to the assumption that CSK is not communicated in texts. Moreover, we propose a commonsense knowledge classifier trained from OMCS, and achieve high precision in some predicate types, e.g., 82.6% in HasProperty. The promising results suggest new ways of analyzing and utilizing volunteer-contributed knowledge to design systems automatically mining commonsense knowledge from the web.
APA, Harvard, Vancouver, ISO, and other styles
3

Iwanowicz, Tomasz. "The identification of risks of material misstatement based on key audit matters in line with International Standard on Auditing 701." Zeszyty Teoretyczne Rachunkowości 2019, no. 105 (161) (December 22, 2019): 17–30. http://dx.doi.org/10.5604/01.3001.0013.6053.

Full text
Abstract:
The purpose of this paper is to determine what key audit matters (KAM) have been identified by statutory auditors from various audit firms in companies from various industries, which assertions appeared most often in the audit reports, and what the links were between the auditing company, KAM, the assertion and the market sector. The research sample consisted of 317 companies listed on the Warsaw (158 companies) and London (159 companies) stock exchanges. The analysis was divided into companies from the following ten market sectors: construction, chemicals, energy, mining, IT, media, automotive, real estate, oil & gas and food. The research was executed based on the analysis of annual financial statements (annual reports) and independent auditor reports that were published by in-scope entities for the latest twelve-month period available as at the date of the research (the twelve-month periods ended on December 31, 2017, and March 31, 2018). The auditors of the tested companies identified a total of 793 unique KAMs. Based on their detailed descriptions, they were then divided into 36 categories (including the cate-gory ‘none’), and they were finally mapped with a total of 2,094 assertions from 7 types. All analyses and developed charts were supported by the Microsoft Power BI data analysis tool.
APA, Harvard, Vancouver, ISO, and other styles
4

Baker-Médard, Merrill S. A. "Conflicting Treasures: contrasting resource use governance in two artisanal gemstone mining sites in Madagascar." Journal of Political Ecology 19, no. 1 (December 1, 2012): 221. http://dx.doi.org/10.2458/v19i1.21728.

Full text
Abstract:
Conflict over property and resource rights is a common product of the convergence of biodiversity conservation and natural resource extraction and is especially pronounced in resource rich developing countries. Madagascar, a country well known for its unique and threatened biodiversity as well as its wealth of mineral resources is under great pressure to reconcile the conflict between these two treasures. This article, utilizing research conducted from 2004-2008, explores how resource claims are exercised, by whom, and by what means in two artisanal gemstone mining sites in Madagascar. It argues that the practices and discourses associated with conservation intervention have influenced both the way in which people understand as well as act upon their property rights. The alienation and dispossession accompanying a fortress modeled state-managed protected area is contrasted with a decentralized self-governing communitymanaged model and are posited as key drivers of observed differences in people's claims to resources in two gemstone mining sites. The research shows that community-managed conservation had an unexpected influence on a community's assertion of greater authority over gem resources. Key words: Community management, conservation, mining, Madagascar, governance
APA, Harvard, Vancouver, ISO, and other styles
5

Amiri, Esmaeil, Prashant Waiker, Olav Rueppell, and Prashanti Manda. "Using Manual and Computer-Based Text-Mining to Uncover Research Trends for Apis mellifera." Veterinary Sciences 7, no. 2 (May 6, 2020): 61. http://dx.doi.org/10.3390/vetsci7020061.

Full text
Abstract:
Honey bee research is believed to be influenced dramatically by colony collapse disorder (CCD) and the sequenced genome release in 2006, but this assertion has never been tested. By employing text-mining approaches, research trends were tested by analyzing over 14,000 publications during the period of 1957 to 2017. Quantitatively, the data revealed an exponential growth until 2010 when the number of articles published per year ceased following the trend. Analysis of author-assigned keywords revealed that changes in keywords occurred roughly every decade with the most fundamental change in 1991–1992, instead of 2006. This change might be due to several factors including the research intensification on the Varroa mite. The genome release and CCD had quantitively only minor effects, mainly on honey bee health-related topics post-2006. Further analysis revealed that computational topic modeling can provide potentially hidden information and connections between some topics that might be ignored in author-assigned keywords.
APA, Harvard, Vancouver, ISO, and other styles
6

Palmer, David, and Carolyn Dillian. "Preliminary investigations into the source of brick clay, Brookgreen Plantation, Georgetown County, South Carolina." North American Archaeologist 39, no. 1 (January 2018): 3–24. http://dx.doi.org/10.1177/0197693117749659.

Full text
Abstract:
Brookgreen Gardens, Georgetown County, South Carolina, includes the remains of Brookgreen Plantation and other historic rice plantations. The property contains archeological resources associated with enslaved African, African-American, and Native American people. Visitors are told that the piers and chimneys of the homes of the enslaved were made of local brick, from clay dug, processed, and fired on-site. The clay mining allegedly formed the ponds and water features still visible today. To test that assertion, the authors conducted experiments, including collecting and geochemically analyzing local clays from these water features, to better understand the brick-making practices of Brookgreen's enslaved workers. Using X-ray fluorescence spectrometry, we determined that these ponds were not the source of clay used for bricks. Instead, a deposit of clay located closer to the historic rice fields, where much of the work on the plantation occurred, was geochemically consistent with the archeological bricks.
APA, Harvard, Vancouver, ISO, and other styles
7

Keerthi, V., and T. Anuradha. "A Generator Based Polynomial with Secret Encryption Scheme for Secure Data Sharing and Privacy in Multi-Party/Federated-Cloud Computation." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (December 10, 2020): 78–82. http://dx.doi.org/10.35940/ijitee.b8270.1210220.

Full text
Abstract:
Now a days exploring and analyzing or mining data in various ways give insights into future for invention and plays a critical role in decision making. For accurate analytical assertion of data, accurate results is essential. So hiding data and at the same time preserving data privacy is necessary to protect externals from attacks. An successful process for sharing sensitive information for data processing, validation and publication should then be deducted. In this paper Polynomial Based Encryption Secret Sharing Scheme (PBESSS) for Multi-Party mechanism is proposed that allows multiple parties to exchange secret data between them at the same time secret data is encrypted so as to protect from untrusted parties. Each party will have stronger protection by selected own polynomial with primitive root number ‘generator’ and the secret data will be in cryptic form and it can be found by each party after final computation of polynomials. This multi-party mechanism can be applied to federated cloud for computation securely.
APA, Harvard, Vancouver, ISO, and other styles
8

Ireland-Piper, Danielle, and Steven Freeland. "Human Rights and Space: Reflections on the Implications of Human Activity in Outer Space on Human Rights Law." Groningen Journal of International Law 9, no. 1 (September 28, 2021): 101–27. http://dx.doi.org/10.21827/grojil.9.1.101-127.

Full text
Abstract:
What are the implications of human activity in outer space for international human rights law? In this article, we reflect on these questions with a view to advancing dialogue on the intersection between space law and human rights. We do so by considering the impact of extra-terrestrial human activities such as access to space and remote-sensing activities, space debris, space mining, the weaponisation and militarization of space, and the assertion of criminal jurisdiction extra-terrestrially. Ultimately, we conclude that human activity in space has significant consequences for the advancement of human rights. While, in our view, existing legal frameworks on international human rights law apply extra-terrestrially, there is still scope for specialist frameworks guarding human rights law in the context of human activity in outer space. "To confine our attention to terrestrial matters would be to limit the human spirit." ~ Stephen Hawking, Astrophysicist "Space is for everybody. It's not just for a few people in science or math, or for a select group of astronauts. That's our new frontier out there, and it's everybody's business to know about space." ~ Christa McAuliffe, Teacher and Challenger Astronaut
APA, Harvard, Vancouver, ISO, and other styles
9

Laurance, William F., Ana K. M. Albernaz, and Carlos Da Costa. "Is deforestation accelerating in the Brazilian Amazon?" Environmental Conservation 28, no. 4 (December 2001): 305–11. http://dx.doi.org/10.1017/s0376892901000339.

Full text
Abstract:
Recent studies suggest that deforestation rates in the Brazilian Amazon could increase sharply in the future as a result of over US$ 40 billion in planned investments in highway paving and major new infrastructure projects in the region. These studies have been challenged by several Brazilian ministries, which assert that recent improvements in environmental laws, enforcement and public attitudes have fundamentally reduced the threat posed to forests by such projects. The notion that hazards to Amazonian forests have declined over the last decade was assessed using available data on deforestation rates from 1978 to 2000. Although the alarmingly high rate of forest loss during 1978–1989 (1.98 million ha yr−1) declined somewhat in 1990–1994 (1.38 million ha yr−1), it rebounded to a high level in the period 1995–2000 (1.90 million ha yr−1). Moreover, correlation and regression analyses reveal that both absolute and per caput rates of forest loss accelerated significantly over the last decade. These trends fail to support the assertion that deforestation pressure in Amazonian forests has been brought under control. Poor enforcement of existing environmental laws, rapidly expanding logging and mining industries, increasing population pressure and other challenges are greatly hindering efforts to limit the environmental impacts of development activities in Brazilian Amazonia.
APA, Harvard, Vancouver, ISO, and other styles
10

Vallée, Marc A., William A. Morris, Stéphane Perrouty, Robert G. Lee, Ken Wasyliuk, Julia J. King, Kevin Ansdell, et al. "Geophysical inversion contributions to mineral exploration: lessons from the Footprints project." Canadian Journal of Earth Sciences 56, no. 5 (May 2019): 525–43. http://dx.doi.org/10.1139/cjes-2019-0009.

Full text
Abstract:
Magnetic and gravity inversions are used to create 2D or 3D models of the magnetic susceptibility and density, respectively, using potential field data. Unconstrained inversions generate an output based on mathematical constraints imposed by the inversion algorithm. Constrained inversions integrate lithological, structural, and petrophysical information in the inversion process to produce more geologically meaningful results. This study analyses the validity of this assertion in the context of the NSERC-CMIC Mineral Exploration Footprints project. Unconstrained and constrained geophysical inversions were computed for three mining sites: a gold site (Canadian Malartic, Québec), a copper site (Highland Valley, British Columbia), and a uranium site (Millennium – McArthur River, Saskatchewan). After initially computing unconstrained inversions, constrained inversions were developed using physical property measurements, which directly link geophysics to geology, and lithological boundaries extracted from an interpreted geological model. While each derived geological model is consistent with the geophysical data, each site exhibited some magnetic complexity that confounded the inversion. The gold site includes regions with a strong magnetic signature that masks the more weakly magnetic zone, thereby hiding the magnetic signature associated with the ore body. Initial unconstrained inversions for the copper site yielded solutions with invalid depth extent. A consistency between the constrained model and the geological model is reached with iterative changes to the depth extent of the model. At the uranium site, the observed magnetic signal is weak, but the inversion provided some insights that could be interpreted in terms of an already known complexly folded geological model.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Assertion mining"

1

Skeppstedt, Maria. "Extracting Clinical Findings from Swedish Health Record Text." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-109254.

Full text
Abstract:
Information contained in the free text of health records is useful for the immediate care of patients as well as for medical knowledge creation. Advances in clinical language processing have made it possible to automatically extract this information, but most research has, until recently, been conducted on clinical text written in English. In this thesis, however, information extraction from Swedish clinical corpora is explored, particularly focusing on the extraction of clinical findings. Unlike most previous studies, Clinical Finding was divided into the two more granular sub-categories Finding (symptom/result of a medical examination) and Disorder (condition with an underlying pathological process). For detecting clinical findings mentioned in Swedish health record text, a machine learning model, trained on a corpus of manually annotated text, achieved results in line with the obtained inter-annotator agreement figures. The machine learning approach clearly outperformed an approach based on vocabulary mapping, showing that Swedish medical vocabularies are not extensive enough for the purpose of high-quality information extraction from clinical text. A rule and cue vocabulary-based approach was, however, successful for negation and uncertainty classification of detected clinical findings. Methods for facilitating expansion of medical vocabulary resources are particularly important for Swedish and other languages with less extensive vocabulary resources. The possibility of using distributional semantics, in the form of Random indexing, for semi-automatic vocabulary expansion of medical vocabularies was, therefore, evaluated. Distributional semantics does not require that terms or abbreviations are explicitly defined in the text, and it is, thereby, a method suitable for clinical corpora. Random indexing was shown useful for extending vocabularies with medical terms, as well as for extracting medical synonyms and abbreviation dictionaries.
APA, Harvard, Vancouver, ISO, and other styles
2

Danese, Alessandro. "System-level functional and extra-functional characterization of SoCs through assertion mining." Doctoral thesis, 2018. http://hdl.handle.net/11562/979447.

Full text
Abstract:
Virtual prototyping is today an essential technology for modeling, verification, and re-design of full HW/SW platforms. This allows a fast prototyping of platforms with a higher and higher complexity, which precludes traditional verification approaches based on the static analysis of the source code. Consequently, several technologies based on the analysis of simulation traces have proposed to efficiently validate the entire system from both the functional and extra-functional point of view. From the functional point of view, different approaches based on invariant and assertion mining have been proposed in literature to validate the functionality of a system under verification (SUV). Dynamic mining of invariants is a class of approaches to extract logic formulas with the purpose of expressing stable conditions in the behavior of the SUV. The mined formulas represent likely invariants for the SUV, which certainly hold on the considered traces. A large set of representative execution traces must be analyzed to increase the probability that mined invariants are generally true. However, this is extremely time-consuming for current sequential approaches when long execution traces and large set of SUV's variables are considered. Dynamic mining of assertions is instead a class of approaches to extract temporal logic formulas with the purpose of expressing temporal relations among the variables of a SUV. However, in most cases, existing tools can only mine assertions compliant with a limited set of pre-defined templates. Furthermore, they tend to generate a huge amount of assertions, while they still lack an effective way to measure their coverage in terms of design behaviors. Moreover, the security vulnerability of a firmware running on a HW/SW platforms is becoming ever more critical in the functional verification of a SUV. Current approaches in literature focus only on raising an error as soon as an assertion monitoring the SUV fails. No approach was proposed to investigate the issue that this set of assertions could be incomplete and that different, unusual behaviors could remain not investigated. From the extra-functional point of view of a SUV, several approaches based on power state machines (PSMs) have been proposed for modeling and simulating the power consumption of an IP at system-level. However, while they focus on the use of PSMs as the underlying formalism for implementing dynamic power management techniques of a SoC, they generally do not deal with the basic problem of how to generate a PSM. In this context, the thesis aims at exploiting dynamic assertion mining to improve the current approaches for the characterization of functional and extra-functional properties of a SoC with the final goal of providing an efficient and effective system-level virtual prototyping environment. In detail, the presented methodologies focus on: efficient extraction of invariants from execution traces by exploiting GP-GPU architectures; extraction of human-readable temporal assertions by combining user-defined assertion templates, data mining and coverage analysis; generation of assertions pinpointing the unlike execution paths of a firmware to guide the analysis of the security vulnerabilities of a SoC; and last but not least, automatic generation of PSMs for the extra-functional characterization of the SoC.
APA, Harvard, Vancouver, ISO, and other styles
3

GHASEMPOURI, TARA. "Improving ABV by generation and abstraction of PSL assertions." Doctoral thesis, 2016. http://hdl.handle.net/11562/939548.

Full text
Abstract:
Lo scopo di questa tesi è quello di fornire le metodologie efficienti per migliorare ABV in tre settori della generazione, astrazione e qualificazione delle asserzioni PSL. I principali contributi di questa tesi possono essere riassunti come segue: 1- una metodologia di estrazione automatica è stato proposta, per catturare le descrizioni del comportamento di un sistema in grado di generare un insiemi di asserzioni temporali da tracce di esecuzione. L'approccio è particolarmente adatto per asserzioni minerarie che descrive le relazioni aritmetiche tra ingressi e uscite secondo un insieme di pattern temporali. In comparazione con lo stato dell'arte, l'affermazione minatore proposto in questa metodologia, genera una serie di affermazioni di qualità più compatti e più alti. 2- una metodologia automatica astrazione che riutilizzare asserzioni originariamente definite per un dato IP RTL, per verificare il modello TLM corrispondente. La metodologia può essere diviso in due fasi principali, innanzitutto, asserzioni sintetizzate in metodi C ++ e in secondo luogo, inseriti nel modello TLM. I risultati mostrano che la metodologia può astrarre e riutilizzare le asserzioni da RTL a TLM ed evitare ridefinizione delle affermazioni che sono già esistenti a RTL. 3- una metodologia automatica qualificazione è stata proposta per valutare la qualità di asserzioni e per misurare la interestingness di asserzioni. L'approccio ri-adatta metriche da data mining per misurare la qualità delle asserzioni in base alla sua frequenza di attivazione durante simulazioni e la correlazione tra antecedente e conseguente. risultato sperimentale descrive la metodologia proposta fornisce una migliore stima di asserzioni interestingness.
The aim of this thesis is to provide efficient methodologies to improve ABV in three domains of generation, abstraction and qualification of PSL assertions. The main contributions of this thesis can be summarized as follows: 1- An automatic mining methodology has been proposed, for capturing behavioral descriptions of a system that can generate set of temporal assertions from execution traces. The approach is particularly suited for mining assertions that describes arithmetic relations between inputs and outputs according to a set of temporal patterns. In comparation with state of the art, assertion miner proposed in this methodology, generates a set of more compact and higher quality assertions. 2- An automatic abstraction methodology has been proposed to reuse assertions originally defined for a given RTL IP, to verify the corresponding TLM model. The methodology can be divided into two main phases, firstly, assertions synthesized into C++ methods and secondly, inserted in the TLM model. The results show that the methodology can abstract and reuse assertions from RTL to TLM and avoid redefinition of assertions which are already exist at RTL. 3- An automatic qualification methodology has been proposed to evaluate the quality of assertions to measure the interestingness of assertions. The approach re-adapts metrics from data mining to measure the quality of assertions based on its activation frequency during simulation runs and the correlation between antecedent and consequent. Experimental result depicts the proposed methodology provides a better estimation of assertions interestingness.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Assertion mining"

1

Legal Rights and Natural Resources Center (Philippines), ed. Asserting autonomy: LGUs' right to veto mining. Quezon City, Philippines: Legal Rights and Natural Resources Center-Kasama sa Kalikasan, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fricker, Elizabeth. Inference to the Best Explanation and the Receipt of Testimony. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198746904.003.0017.

Full text
Abstract:
The chapter develops a local reductionist account of what is required for testimonial beliefs to be justified, and argues that human recipients of testimony typically form their beliefs in accordance with these requirements. Recipients estimate the trustworthiness of a speaker’s assertion by constructing a mini-psychological theory of her, arriving at this by inference to the best explanation, and accept what they are told only if this theory has it that the speaker is expressing her knowledge. The existence of a social norm governing assertion, the knowledge norm, is a key factor making such an explanation accessible to recipients. This local reductionism supports explanationism as a general account of the justification of empirical beliefs.
APA, Harvard, Vancouver, ISO, and other styles
3

Pelkmans, Mathijs. Introduction. Cornell University Press, 2017. http://dx.doi.org/10.7591/cornell/9781501705137.003.0001.

Full text
Abstract:
This book examines ideational power by focusing on the energy and momentum that are built into “flashes of conviction.” The discussion centers on the affective dimension of collective ideas and on how ideology comes to matter in the lives of people. Using the concept of conviction, the book analyzes the fluctuating intensity and quality of attitudes, motivations, and beliefs. It looks at different examples of conviction with particular emphasis on the impulses and resonances generated by assertions of truth. These topics are explored in the context of post-Soviet Kyrgyzstan, and particularly in the mining town of Kokjangak, at a time of economic collapse and political turmoil. This introduction explains how the concepts of conviction and ideology are employed in order to lay the foundations for the conceptual framework developed in this book.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Assertion mining"

1

Vasudevan, Shobha, Lingyi Liu, and Samuel Hertz. "A Comparative Study of Assertion Mining Algorithms in GoldMine." In Machine Learning in VLSI Computer-Aided Design, 609–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-04666-8_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Assertion." In Encyclopedia of Machine Learning and Data Mining, 70. Boston, MA: Springer US, 2017. http://dx.doi.org/10.1007/978-1-4899-7687-1_37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cagliero, Luca, Tania Cerquitelli, and Paolo Garza. "Semi-Automatic Ontology Construction by Exploiting Functional Dependencies and Association Rules." In Semantic Web, 76–96. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3610-1.ch004.

Full text
Abstract:
This paper presents a novel semi-automatic approach to construct conceptual ontologies over structured data by exploiting both the schema and content of the input dataset. It effectively combines two well-founded database and data mining techniques, i.e., functional dependency discovery and association rule mining, to support domain experts in the construction of meaningful ontologies, tailored to the analyzed data, by using Description Logic (DL). To this aim, functional dependencies are first discovered to highlight valuable conceptual relationships among attributes of the data schema (i.e., among concepts). The set of discovered correlations effectively support analysts in the assertion of the Tbox ontological statements (i.e., the statements involving shared data conceptualizations and their relationships). Then, the analyst-validated dependencies are exploited to drive the association rule mining process. Association rules represent relevant and hidden correlations among data content and they are used to provide valuable knowledge at the instance level. The pushing of functional dependency constraints into the rule mining process allows analysts to look into and exploit only the most significant data item recurrences in the assertion of the Abox ontological statements (i.e., the statements involving concept instances and their relationships).
APA, Harvard, Vancouver, ISO, and other styles
4

Butler, Mark. "‘Mines come to bring poverty’: extractive industry in the life of the people in KwaZulu-Natal, South Africa." In Environmental Justice, Popular Struggle and Community Development, 101–16. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447350835.003.0007.

Full text
Abstract:
Communities who happen to live where there is potential for big money to be made from mining the resources from under their feet, face a daunting set of challenges. Many people are saying ‘No’ to mining capital, and many communities are divided. We consider the thinking and praxis of militants from a number of areas in the province of KwaZulu-Natal (South Africa) who are thinking resistance to a wave of real and prospective new coal mining initiatives. We conclude that this irruption of the “No” is simultaneously powerful and fragile. It is the assertion of the human life of the people against the forces of death. Provided the struggle that unfolds remains faithful to the fundamental 'No' that originated it, then it stops simply reproducing or modestly-reforming that world as-it-is, but instead marks out an emancipatory future of what could be.
APA, Harvard, Vancouver, ISO, and other styles
5

Baldwin, Nicholas, and Amy Lynn Fletcher. "Asteroid Futures." In Advances in Human and Social Aspects of Technology, 291–301. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6772-2.ch020.

Full text
Abstract:
This chapter evaluates the emerging industry of asteroid mining and the pivotal role of the United States in shaping the new rules for an extra-terrestrial economy. The Outer Space Treaty 1967 (OST) governs the use of space, with over 100 signatories, including the United States and China. However, as space exploration expands to encompass both public and private stakeholders, there is a growing international debate about whether the OST's provisions prohibit the assertion of sovereignty and, hence, property rights, in outer space. With the Commercial Space Launch Competitiveness Act (2015), the United States has pursued a legal framework that facilitates commercial asteroid mining and a political strategy that focuses on bilateral space exploration agreements with countries such as Luxembourg, Italy, and the United Arab Emirates. Due to its dominant position in the space sector, the United States will strongly influence the regulatory roadmap for the era of Space 2.0.
APA, Harvard, Vancouver, ISO, and other styles
6

Wahlang, Maranatha G. T., and Bengt G. Karlsson. "The Body of the Land." In Vernacular Politics in Northeast India, 289–310. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780192863461.003.0012.

Full text
Abstract:
What is the position of women in Khasi society? Does the institution of matrilineal kinship offer women any advantages? We pose these questions in relation to the controversial Lineage Amendment Bill (LAB), 2018, passed by the Khasi Hills Autonomous District Council, holding that women that marry non-Khasis will lose their rights and full membership in the community. The bill has been heavily criticized, especially by younger women who assert their right to freely choose whom to marry. Those in favour of the bill present it as a defence of indigenous lands, yet, as we suggest, it has more to do with resource extraction. In this chapter, we point to how matrilineal descent, land ownership, environmental stewardship, and indigenous sovereignty are intertwined. As we suggest, through the refusal to partake in mining, indigenous sovereignty becomes something quite different from the dominant ethno-nationalist assertion where self-determination has been reduced to the right to freely exploit the natural resources of the claimed homeland. Matriliny is a critical feature of this alternative imaginary, building on ongoing relations to and care for the ancestral lands passed on by generations of women.
APA, Harvard, Vancouver, ISO, and other styles
7

Cressy, David. "Lundy." In England's Islands in a Sea of Troubles, 27–36. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198856603.003.0003.

Full text
Abstract:
This chapter serves as a micro-history of a little-known island, and as a prologue to the main account. The questions of ownership and jurisdiction, defence and occupation, piracy, dependence, and independence that troubled this small outpost in the Bristol Channel prefigured the problems of the rest of England’s island fringe. Colourful occupiers of Lundy Island included the pirate king Thomas Salkeld, the mining entrepreneur Thomas Bushell, and the puritan politician Lord Saye and Sele. Long held by the Grenville family, Lundy saw a civil war in microcosm in the mid-seventeenth century, as royalist and parliamentary forces vied for control. It then suffered long periods of neglect, interspersed by attempts at pasturage, occasional raids by marauders, and short-lived assertions of sovereignty.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Assertion mining"

1

Danese, Alessandra, Jacopo Mocci, and Graziano Pravadelli. "Fault model qualification by assertion mining." In 2016 17th Latin-American Test Symposium (LATS). IEEE, 2016. http://dx.doi.org/10.1109/latw.2016.7483338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Danese, Alessandro, Valeria Bertacco, and Graziano Pravadelli. "Symbolic assertion mining for security validation." In 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2018. http://dx.doi.org/10.23919/date.2018.8342262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghasempouri, Tara, Alessandro Danese, Graziano Pravadelli, Nicola Bombieri, and Jaan Raik. "RTL Assertion Mining with Automated RTL-to-TLM Abstraction." In 2019 Forum for Specification and Design Languages (FDL). IEEE, 2019. http://dx.doi.org/10.1109/fdl.2019.8876941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghasempouri, Tara, Jan Malburg, Alessandro Danese, Graziano Pravadelli, Goerschwin Fey, and Jaan Raik. "Engineering of an Effective Automatic Dynamic Assertion Mining Platform." In 2019 IFIP/IEEE 27th International Conference on Very Large Scale Integration (VLSI-SoC). IEEE, 2019. http://dx.doi.org/10.1109/vlsi-soc.2019.8920331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Lingyi, Chen-Hsuan Lin, and Shobha Vasudevan. "Word level feature discovery to enhance quality of assertion mining." In the International Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2429384.2429424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vasudevan, Shobha, David Sheridan, Sanjay Patel, David Tcheng, Bill Tuohy, and Daniel Johnson. "GoldMine: Automatic assertion generation using data mining and static analysis." In 2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010). IEEE, 2010. http://dx.doi.org/10.1109/date.2010.5457129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Po-Hsien, and Li C. Wang. "Automatic assertion extraction via sequential data mining of simulation traces." In 2010 15th Asia and South Pacific Design Automation Conference ASP-DAC 2010. IEEE, 2010. http://dx.doi.org/10.1109/aspdac.2010.5419813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Heidari Iman, Mohammad Reza, Jaan Raik, Maksim Jenihhin, Gert Jervan, and Tara Ghasempouri. "A Methodology for Automated Mining of Compact and Accurate Assertion Sets." In 2021 IEEE Nordic Circuits and Systems Conference (NorCAS). IEEE, 2021. http://dx.doi.org/10.1109/norcas53631.2021.9599865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boldo, Michele, Nicola Bombieri, Mirco De Marchi, Luca Geretti, Samuele Germiniani, and Graziano Pravadelli. "Risk Assessment and Prediction in Human-Robot Interaction Through Assertion Mining and Pose Estimation." In 2022 IEEE 23rd Latin American Test Symposium (LATS). IEEE, 2022. http://dx.doi.org/10.1109/lats57337.2022.9936899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Costa, Antonio Anastasio Bruto da, Shriya Dharade, Sudipa Mandal, and Pallab Dasgupta. "AMS-Miner: Mining AMS Assertions Using Interval Arithmetic." In 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID). IEEE, 2018. http://dx.doi.org/10.1109/vlsid.2018.98.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography