Littérature scientifique sur le sujet « Lemma access »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Lemma access ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Lemma access"

1

Guerini, Federica. "APPUNTI PER UNA EDIZIONE DEL GLOSSARIO BERGAMASCO MEDIOEVALE DI ANTONIO TIRABOSCHI." Italiano LinguaDue 13, no. 2 (2022): 589–605. http://dx.doi.org/10.54103/2037-3597/17150.

Texte intégral
Résumé :
Il presente contribuito descrive la struttura e i contenuti del Glossario Bergamasco Medioevale di Antonio Tiraboschi, attualmente conservato presso la Biblioteca Civica Angelo Mai di Bergamo, e costituito da quattro quaderni manoscritti e inediti, all’interno dei quali sono registrati oltre 2000 lemmi organizzati alfabeticamente. Si descrivono le fonti, edite e inedite, dalle quali Tiraboschi attinge i frammenti citati all’interno di ciascun lemma e si propone una classificazione delle annotazioni di cui il Glossario si compone in tre sottogruppi: 
 
 note di carattere dialettologic
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lewandowski, Sharon M., W. R. Bushnell, and C. Kent Evans. "Distribution of Mycelial Colonies and Lesions in Field-Grown Barley Inoculated with Fusarium graminearum." Phytopathology® 96, no. 6 (2006): 567–81. http://dx.doi.org/10.1094/phyto-96-0567.

Texte intégral
Résumé :
External surfaces of barley florets have thick-walled epidermal cells resistant to direct penetration by the head blight pathogen, Fusarium graminearum. Surfaces within the floral cavity have thin-walled, susceptible cells. How the fungus gains access to the floral cavity, causing head blight, has not been determined. To investigate pathways of entry, field-grown plants were sprayed with macroconidial inoculum after heads emerged from the flag leaf sheath and then were mist irrigated daily in the morning and evening. On selected days, 1 to 8 days after inoculation (DAI), 80 to 190 florets per
Styles APA, Harvard, Vancouver, ISO, etc.
3

Luef, Eva Maria, and Jong-Seung Sun. "Wordform-specific frequency effects cause acoustic variation in zero-inflected homophones." Poznan Studies in Contemporary Linguistics 56, no. 4 (2020): 711–39. http://dx.doi.org/10.1515/psicl-2020-0024.

Texte intégral
Résumé :
Abstract The frequency with which a word appears in the lexicon has implications for its pronunciation. Numerous studies have shown that high-frequency lemma are characterized by more phonetic reduction than lower-frequency lemma. These findings have proven to be particularly useful in the study of homophones where frequency-related reduction processes can give insights into lexical access theories. The majority of research on homophones and frequency effects has focused on heterographic and semantically unrelated homophones (e.g., English time – thyme) or investigated zero-derived homophones
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ma, Chao, Haiying Gao, and Duo Wei. "A CP-ABE Scheme Supporting Arithmetic Span Programs." Security and Communication Networks 2020 (March 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/3265871.

Texte intégral
Résumé :
Attribute-based encryption achieves fine-grained access control, especially in a cloud computing environment. In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the ciphertexts are associated with the access policies, while the secret keys are determined by the attributes. In recent years, people have tried to find more effective access structures to improve the efficiency of encryption systems. This paper presents a ciphertext-policy attribute-based encryption scheme that supports arithmetic span programs. On the composite-order bilinear group, the security of the scheme is pr
Styles APA, Harvard, Vancouver, ISO, etc.
5

de Bot, Kees, T. Sima Paribakht, and Marjorie Bingham Wesche. "TOWARD A LEXICAL PROCESSING MODEL FOR THE STUDY OF SECOND LANGUAGE VOCABULARY ACQUISITION." Studies in Second Language Acquisition 19, no. 3 (1997): 309–29. http://dx.doi.org/10.1017/s0272263197003021.

Texte intégral
Résumé :
A major requirement for theory development in L2 vocabulary acquisition is an adequate model of L2 lexical organization and processing. At present, there is no widely accepted model of this kind, but recent research has demonstrated the potential usefulness of Levelt's (1989, 1993) L1 speech processing model (de Bot & Schreuder, 1993; Green, 1993; Poulisse, 1993). This paper explores the relevance of the model as adapted for L2 lexical processing of written texts, with particular attention to its mental lexicon components (concepts, lemmas, and lexemes) and organization. The model is first
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sivaeva, O. "SEMANTIC PROSODY OF THE LEMMA VACCINE IN THE MEDIA TEXTS." Studia Philologica 1, no. 16 (2021): 42–46. http://dx.doi.org/10.28925/2311-2425.2021.166.

Texte intégral
Résumé :
This paper discusses the results of the corpus-based analysis of the semantic prosody of collocations with VACCINE in the broadsheet ‘The Guardian’. The corpus has been processed with the help of Sketch Engine. Text passages containing collocations with VACCINE have been interpreted in order to state the prosody mode of the collocation in the context. The study mostly pays attention to the nouns modified by VACCINE as most frequently used in the me­dia texts. The dictionary definition of VACCINE defines it as a word with positive semantic prosody. The discourse analysis demonstrates that collo
Styles APA, Harvard, Vancouver, ISO, etc.
7

NiCastro, J. R. A. J. "Study of Two-Sided Similarity Methods Using a Radiation “Switch on” Imploding Shock in a Magnetic Field." Journal of Applied Mathematics 2018 (June 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/9701268.

Texte intégral
Résumé :
This paper explores aspects of two-sided similarity modeling using cylindrical geometry for radiating shock waves embedded in a medium with a magnetic field. Two-sided similarity solution techniques may be used to link states influenced by long range near instantaneous fields that continually modify the pre- and postshock zones. Emergent radiation scaling relations are immediately available from consistent homologies. For both small angle and large angle measurements, an approximate analytic technique in the vicinity of luminous fronts together with the high symmetry implications delineated in
Styles APA, Harvard, Vancouver, ISO, etc.
8

GOÑI, JOSÉ M., JOSÉ C. GONZÁLEZ, and ANTONIO MORENO. "ARIES: A lexical platform for engineering Spanish processing tools." Natural Language Engineering 3, no. 4 (1997): 317–45. http://dx.doi.org/10.1017/s1351324997001812.

Texte intégral
Résumé :
We present a lexical platform that has been developed for the Spanish language. It achieves portability between different computer systems and efficiency, in terms of speed and lexical coverage. A model for the full treatment of Spanish inflectional morphology for verbs, nouns and adjectives is presented. This model permits word formation based solely on morpheme concatenation, driven by a feature-based unification grammar. The run-time lexicon is a collection of allomorphs for both stems and endings. Although not tested, it should be suitable also for other Romance and highly inflected langua
Styles APA, Harvard, Vancouver, ISO, etc.
9

Deundyak, Vladimir M., and Denis V. Zagumennov. "On the Properties of Algebraic Geometric Codes as Copy Protection Codes." Modeling and Analysis of Information Systems 27, no. 1 (2020): 22–38. http://dx.doi.org/10.18255/1818-1015-2020-1-22-38.

Texte intégral
Résumé :
Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key and identifying word from selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users are joining into coalitions and gaining illegal access to the data by combining their keys and identifying codewords to obtain pirate key and codeword. To prevent this attacks, classes of error-correc
Styles APA, Harvard, Vancouver, ISO, etc.
10

Alshehri, Amira Abdullah. "The L1 Semantic Retrieval of L2 Words: Evidence from Advanced L2 Learners’ Reaction Times." World Journal of English Language 12, no. 1 (2022): 334. http://dx.doi.org/10.5430/wjel.v12n1p334.

Texte intégral
Résumé :
According to the first language (L1) lemma mediation hypothesis, second language learners, regardless of their level of second language (L2) proficiency, access the meaning of L2 words via their first language (Jiang, 2004). To test this hypothesis, a semantic judgment task was conducted on 30 advanced Arab speakers of English, in which they were presented with 86 pairs of English words and had to decide whether each pair was semantically related. Some semantically related pairs are classified as same translation pairs because their members share the same L1 translation, whereas others are sem
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!