Littérature scientifique sur le sujet « Lemma access »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Lemma access ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Lemma access"

1

Guerini, Federica. "APPUNTI PER UNA EDIZIONE DEL GLOSSARIO BERGAMASCO MEDIOEVALE DI ANTONIO TIRABOSCHI." Italiano LinguaDue 13, no. 2 (2022): 589–605. http://dx.doi.org/10.54103/2037-3597/17150.

Texte intégral
Résumé :
Il presente contribuito descrive la struttura e i contenuti del Glossario Bergamasco Medioevale di Antonio Tiraboschi, attualmente conservato presso la Biblioteca Civica Angelo Mai di Bergamo, e costituito da quattro quaderni manoscritti e inediti, all’interno dei quali sono registrati oltre 2000 lemmi organizzati alfabeticamente. Si descrivono le fonti, edite e inedite, dalle quali Tiraboschi attinge i frammenti citati all’interno di ciascun lemma e si propone una classificazione delle annotazioni di cui il Glossario si compone in tre sottogruppi: 
 
 note di carattere dialettologico, riguardanti gli esiti di forme latine o proto-romanze in italiano e nei dialetti gallo-italici (bergamasco, in primis) o relative alle particolari sfumature semantiche osservabili nel lessico del bergamasco;
 annotazioni di natura linguistica sulla comparsa di costruzioni romanze in sostituzione delle costruzioni latine, e sulle innovazioni semantiche romanze ravvisabili all’interno dei frammenti citati ad esemplificazione di ciascun lemma;
 osservazioni di carattere onomastico, relative a toponimi, microtoponimi e – più raramente – nomi personali.
 
 L’analisi condotta rappresenta un passo preliminare alla realizzazione di una edizione digitale (consultabile in modalità Open access a partire dalla home page della Biblioteca Civica Angelo Mai) dei preziosi materiali linguistici di cui il Glossario si compone e di una corrispondente edizione cartacea, che favoriscano valorizzazione e la fruizione del lavoro svolto dallo studioso bergamasco.
 
 Notes for an edition of Glossario Bergamasco Medioevale by Antonio Tiraboschi
 This paper describes the structure and the content of Antonio Tiraboschi's Glossario Bergamasco Medioevale, currently preserved at the Biblioteca Civica Angelo Mai in Bergamo, consisting of four manuscripts and unpublished notebooks containing more than 2000 alphabetically organized headwords. The sources, both published and unpublished, from which Tiraboschi drew the fragments cited as part of each lemma are described and a classification of the annotations into three subgroups is proposed: 
 
 notes of a dialectological nature, concerning either Latin or proto-Roman forms in Italian as well as in the Gallo-Italic dialects (Bergamasque, in primis) or relating to particular semantic nuances observable in the lexicon of Bergamasque;
 linguistic notes on the appearance of Romance constructions replacing Latin constructions and questionable Romance semantic innovations in the fragments cited as examples of each lemma;
 onomastic observations, concerning toponyms, microtoponyms and - more rarely - personal names.
 
 This analysis is preliminary step towards creating a digital edition (available in Open access mode from the home page of the Biblioteca Civica Angelo Mai) of the precious linguistic materials which compose the Glossary and a corresponding paper edition, which will favor the valorization and fruition of the work carried out by the Bergamasque scholar.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Lewandowski, Sharon M., W. R. Bushnell, and C. Kent Evans. "Distribution of Mycelial Colonies and Lesions in Field-Grown Barley Inoculated with Fusarium graminearum." Phytopathology® 96, no. 6 (2006): 567–81. http://dx.doi.org/10.1094/phyto-96-0567.

Texte intégral
Résumé :
External surfaces of barley florets have thick-walled epidermal cells resistant to direct penetration by the head blight pathogen, Fusarium graminearum. Surfaces within the floral cavity have thin-walled, susceptible cells. How the fungus gains access to the floral cavity, causing head blight, has not been determined. To investigate pathways of entry, field-grown plants were sprayed with macroconidial inoculum after heads emerged from the flag leaf sheath and then were mist irrigated daily in the morning and evening. On selected days, 1 to 8 days after inoculation (DAI), 80 to 190 florets per day were harvested, dissected, and examined for presence and location of mycelial colonies. At 1 to 12 DAI, 57 to 100 florets likewise were examined for lesions. Patterns of colonization indicated that the fungus entered florets principally through crevices between the overlapping lemma and palea or through the apical floret mouth. The crevices were open for entry until ≈8 days after heads emerged. Most florets had mycelial colonies on the external surface in a sheltered pocket near the base of the ventral furrow of the palea. Mycelia spread laterally from the furrow to the crevice between lemma and palea. Anther colonization had only a minor role in invasion of florets. Hyphal penetration of stomates was not seen. Lesions usually developed first within 3 mm of the floret apex or 3 mm of the floret base. Within florets, lesions often were contiguous between lemma and palea, palea and caryopsis, or in all three floret parts. However, lesions in the caryopsis developed later and were fewer in number than in the lemma and palea and always were associated with lesions in the palea. The results show the importance of initial mycelial colonization of floret outer surfaces, pathways of entry via lemma or palea crevices or floret mouth, and spread of lesions within the floret at interfaces between lemma, palea, and caryopsis.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Luef, Eva Maria, and Jong-Seung Sun. "Wordform-specific frequency effects cause acoustic variation in zero-inflected homophones." Poznan Studies in Contemporary Linguistics 56, no. 4 (2020): 711–39. http://dx.doi.org/10.1515/psicl-2020-0024.

Texte intégral
Résumé :
Abstract The frequency with which a word appears in the lexicon has implications for its pronunciation. Numerous studies have shown that high-frequency lemma are characterized by more phonetic reduction than lower-frequency lemma. These findings have proven to be particularly useful in the study of homophones where frequency-related reduction processes can give insights into lexical access theories. The majority of research on homophones and frequency effects has focused on heterographic and semantically unrelated homophones (e.g., English time – thyme) or investigated zero-derived homophones (e.g., English the cut, noun – to cut, verb). Here, zero inflection in German pluralization (e.g., ein Würfel ‘one die’– zwei Würfel ‘two dice’) was investigated to determine if and how frequency effects impact on the acoustic realization of the homophonous singular-plural word pairs. The findings indicate that the number-specified wordforms show acoustic variation related to wordform frequency and the relative frequency of the singular to plural inflected forms. Results differ for durations of wordforms, stem vowels, and final phonemes. Our findings have implications for lexical access theories and can inform about ‘frequency inheritance’ across the singular and plural homophones of the zero-inflected plurals.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Ma, Chao, Haiying Gao, and Duo Wei. "A CP-ABE Scheme Supporting Arithmetic Span Programs." Security and Communication Networks 2020 (March 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/3265871.

Texte intégral
Résumé :
Attribute-based encryption achieves fine-grained access control, especially in a cloud computing environment. In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the ciphertexts are associated with the access policies, while the secret keys are determined by the attributes. In recent years, people have tried to find more effective access structures to improve the efficiency of encryption systems. This paper presents a ciphertext-policy attribute-based encryption scheme that supports arithmetic span programs. On the composite-order bilinear group, the security of the scheme is proven by experimental sequence based on the combination of composite-order bilinear entropy expansion lemma and subgroup decision (SD) assumption. And, it is an adaptively secure scheme with constant-size public parameters.
Styles APA, Harvard, Vancouver, ISO, etc.
5

de Bot, Kees, T. Sima Paribakht, and Marjorie Bingham Wesche. "TOWARD A LEXICAL PROCESSING MODEL FOR THE STUDY OF SECOND LANGUAGE VOCABULARY ACQUISITION." Studies in Second Language Acquisition 19, no. 3 (1997): 309–29. http://dx.doi.org/10.1017/s0272263197003021.

Texte intégral
Résumé :
A major requirement for theory development in L2 vocabulary acquisition is an adequate model of L2 lexical organization and processing. At present, there is no widely accepted model of this kind, but recent research has demonstrated the potential usefulness of Levelt's (1989, 1993) L1 speech processing model (de Bot & Schreuder, 1993; Green, 1993; Poulisse, 1993). This paper explores the relevance of the model as adapted for L2 lexical processing of written texts, with particular attention to its mental lexicon components (concepts, lemmas, and lexemes) and organization. The model is first discussed in terms of its relevance to L2 lexical access, retrieval, and acquisition processes. Findings of an introspective L2 vocabulary study follow, detailing how university ESL learners reported dealing with unfamiliar words while carrying out L2 reading tasks. The information provided on their lexical inferencing strategy and varied knowledge sources used in the process provide support for the lexical components and organization proposed by Levelt. It is argued in this paper that the process of inferring the features of unknown words in a reading passage can be described in terms of lemma construction, as defined in the model.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sivaeva, O. "SEMANTIC PROSODY OF THE LEMMA VACCINE IN THE MEDIA TEXTS." Studia Philologica 1, no. 16 (2021): 42–46. http://dx.doi.org/10.28925/2311-2425.2021.166.

Texte intégral
Résumé :
This paper discusses the results of the corpus-based analysis of the semantic prosody of collocations with VACCINE in the broadsheet ‘The Guardian’. The corpus has been processed with the help of Sketch Engine. Text passages containing collocations with VACCINE have been interpreted in order to state the prosody mode of the collocation in the context. The study mostly pays attention to the nouns modified by VACCINE as most frequently used in the me­dia texts. The dictionary definition of VACCINE defines it as a word with positive semantic prosody. The discourse analysis demonstrates that collocations containing the lemma VACCINE can have positive, negative or neutral semantic colouring, which depends on the contextual meaning of the analyzed passage and which is also based on the semantic prosody mode of other words in the passage, which actually designates and presupposes the mode of the collocations in question. The nouns supply, safety, mask, uptake, access, protection, production, certification used in ‘The Guardian’ articles, having positive semantic prosody in the pattern noun + VACCINE, in general create a positive metaphorical image and defense from Covid-19. However, the nouns hesitancy, misinformation, avail­ability and skepticism possessing negative semantic prosody, are mostly used to describe people’s unwillingness to get vaccinated and their doubts about the effectiveness of the procedure. Collocations with type, mechanism, distribution, usage and VACCINE have a neutral semantic prosody, which shows that such collocations are used in text passages in the surrounding of neither positive nor negative words and the whole passage serves as a state­ment of some facts without being evaluated.
Styles APA, Harvard, Vancouver, ISO, etc.
7

NiCastro, J. R. A. J. "Study of Two-Sided Similarity Methods Using a Radiation “Switch on” Imploding Shock in a Magnetic Field." Journal of Applied Mathematics 2018 (June 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/9701268.

Texte intégral
Résumé :
This paper explores aspects of two-sided similarity modeling using cylindrical geometry for radiating shock waves embedded in a medium with a magnetic field. Two-sided similarity solution techniques may be used to link states influenced by long range near instantaneous fields that continually modify the pre- and postshock zones. Emergent radiation scaling relations are immediately available from consistent homologies. For both small angle and large angle measurements, an approximate analytic technique in the vicinity of luminous fronts together with the high symmetry implications delineated in Lemma provides direct access to the homology parameters. The parameters obtained using this process can augment the constraint relations and contribute to establishing relevant similarity homologies.
Styles APA, Harvard, Vancouver, ISO, etc.
8

GOÑI, JOSÉ M., JOSÉ C. GONZÁLEZ, and ANTONIO MORENO. "ARIES: A lexical platform for engineering Spanish processing tools." Natural Language Engineering 3, no. 4 (1997): 317–45. http://dx.doi.org/10.1017/s1351324997001812.

Texte intégral
Résumé :
We present a lexical platform that has been developed for the Spanish language. It achieves portability between different computer systems and efficiency, in terms of speed and lexical coverage. A model for the full treatment of Spanish inflectional morphology for verbs, nouns and adjectives is presented. This model permits word formation based solely on morpheme concatenation, driven by a feature-based unification grammar. The run-time lexicon is a collection of allomorphs for both stems and endings. Although not tested, it should be suitable also for other Romance and highly inflected languages. A formalism is also described for encoding a lemma-based lexical source, well suited for expressing linguistic generalizations: inheritance classes, lemma encoding, morpho-graphemic allomorphy rules and limited type-checking. From this source base, we can automatically generate an allomorph indexed dictionary adequate for efficient retrieval and processing. A set of software tools has been implemented around this formalism: lexical base augmenting aids, lexical compilers to build run-time dictionaries and access libraries for them, feature manipulation libraries, unification and pseudo-unification modules, morphological processors, a parsing system, etc. Software interfaces among the different modules and tools are cleanly defined to ease software integration and tool combination in a flexible way. Directions for accessing our e-mail and web demonstration prototypes are also provided. Some figures are given, showing the lexical coverage of our platform compared to some popular spelling checkers.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Deundyak, Vladimir M., and Denis V. Zagumennov. "On the Properties of Algebraic Geometric Codes as Copy Protection Codes." Modeling and Analysis of Information Systems 27, no. 1 (2020): 22–38. http://dx.doi.org/10.18255/1818-1015-2020-1-22-38.

Texte intégral
Résumé :
Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key and identifying word from selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users are joining into coalitions and gaining illegal access to the data by combining their keys and identifying codewords to obtain pirate key and codeword. To prevent this attacks, classes of error-correcting codes with special c-FP and c-TA properties are used. In particular, c -FP codes are codes that make direct compromise of scrupulous users impossible and c -TA codes are codes that make it possible to identify one of the a‹ackers. We are considering the problem of evaluating the lower and the upper boundaries on c, within which the L-construction algebraic geometric codes have the corresponding properties. In the case of codes on an arbitrary curve the lower bound for the c-TA property was obtained earlier; in this paper, the lower bound for the c-FP property was constructed. In the case of curves with one infinite point, the upper bounds for the value of c are obtained for both c-FP and c-TA properties. During our work, we have proved an auxiliary lemma and the proof contains an explicit way to build a coalition and a pirate identifying vector. Methods and principles presented in the lemma can be important for analyzing broadcast encryption schemes robustness. Also, the c-FP and c-TA boundaries monotonicity by subcodes are proved.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Alshehri, Amira Abdullah. "The L1 Semantic Retrieval of L2 Words: Evidence from Advanced L2 Learners’ Reaction Times." World Journal of English Language 12, no. 1 (2022): 334. http://dx.doi.org/10.5430/wjel.v12n1p334.

Texte intégral
Résumé :
According to the first language (L1) lemma mediation hypothesis, second language learners, regardless of their level of second language (L2) proficiency, access the meaning of L2 words via their first language (Jiang, 2004). To test this hypothesis, a semantic judgment task was conducted on 30 advanced Arab speakers of English, in which they were presented with 86 pairs of English words and had to decide whether each pair was semantically related. Some semantically related pairs are classified as same translation pairs because their members share the same L1 translation, whereas others are semantically related but do not share the same L1 translation, hence they are classified as different translation pairs. Two instruments were used to record the reaction times and determine accuracy: DMDX and Gorilla. The results revealed that the highly proficient L2 speakers rated same translation pairs as semantically related significantly faster than their responses to different translation pairs. When compared with the 28 native speakers’ results, there was a significant difference in the reaction times of the two groups. This provides evidence that the underlying processes of L1 and L2 vocabulary acquisition is substantially different: L2 learners rely on their well-established conceptual system to access the meaning of L2 words.
Styles APA, Harvard, Vancouver, ISO, etc.
Plus de sources
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie