14,473 research outputs found
Processing of regular and irregular past tense morphology in highly proficient second language learners of English: a self-paced reading study
Dual-system models suggest that English past tense morphology involves two processing routes: rule application for regular verbs and memory retrieval for irregular verbs (Pinker, 1999). In second language (L2) processing research, Ullman (2001a) suggested that both verb types are retrieved from memory, but more recently Clahsen and Felser (2006) and Ullman (2004) argued that past tense rule application can be automatised with experience by L2 learners. To address this controversy, we tested highly proficient Greek-English learners with naturalistic or classroom L2 exposure compared to native English speakers in a self-paced reading task involving past tense forms embedded in plausible sentences. Our results suggest that, irrespective to the type of exposure, proficient L2 learners of extended L2 exposure apply rule-based processing
L’analyse d’images au service du végétal
Détection précoce du stress hydrique du forsythia. Automatisation de l\u27analyse des paramètres morphométriques indicateurs précoces du stress. Automatisation de la quantification des agrégats polyphénoliques dans des coupes histologiques de baies de raisin. Relations avec la typicitéMesure automatisée de la cinétique de germination de lots de semences dans un incubateur de Jacobsen
Automatisation of intonation modelling and its linguistic anchoring
This paper presents a fully machine-driven approach for intonation description and its linguistic interpretation. For this purpose,a new intonation model for bottom-up F0 contour analysis and synthesis is introduced, the CoPaSul model which is designed in the tradition of parametric, contour-based, and superpositional approaches. Intonation is represented by a superposition of global and local contour classes that are derived from F0 parameterisation. These classes were linguistically anchored with respect to information status by aligning them with a text which had been coarsely analysed for this purpose by means of NLP techniques. To test the adequacy of this data-driven interpretation a perception experiment was carried out, which confirmed 80% of the findings
A study into the feasibility of generic programming for the construction of complex software
A high degree of abstraction and capacity for reuse can be obtained in software design through the use of Generic Programming (GP) concepts. Despite widespread use of GP in computing, some areas such as the construction of generic component libraries as the skeleton for complex computing systems with extensive domains have been neglected. Here we consider the design of a library of generic components based on the GP paradigm implemented with Java. Our aim is to investigate the feasibility of using GP paradigm in the construction of complex computer systems where the management of users interacting with the system and the optimisation of the system’s resources is required.Postprint (author's final draft
Advanced Students’ Oral Fluency: The Neglected Component in the CLT Classroom?
Udostępnienie publikacji Wydawnictwa Uniwersytetu Łódzkiego finansowane w ramach projektu „Doskonałość naukowa kluczem do doskonałości kształcenia”. Projekt realizowany jest ze środków Europejskiego Funduszu Społecznego w ramach Programu Operacyjnego Wiedza Edukacja Rozwój; nr umowy: POWER.03.05.00-00-Z092/17-00
Vulnerability analysis of three remote voting methods
This article analyses three methods of remote voting in an uncontrolled
environment: postal voting, internet voting and hybrid voting. It breaks down
the voting process into different stages and compares their vulnerabilities
considering criteria that must be respected in any democratic vote:
confidentiality, anonymity, transparency, vote unicity and authenticity.
Whether for safety or reliability, each vulnerability is quantified by three
parameters: size, visibility and difficulty to achieve. The study concludes
that the automatisation of treatments combined with the dematerialisation of
the objects used during an election tends to substitute visible vulnerabilities
of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page
Recent Progress in the Golem Project
We report on the current status of the Golem project which aims at the
construction of a general one-loop evaluator for matrix elements. We construct
the one-loop matrix elements from Feynman diagrams in a highly automated way
and provide a library for the reduction and numerically stable evaluation of
the tensor integrals involved in this approach. Furthermore, we present
applications to physics processes relevant for the LHC.Comment: 7 pages, 4 figures, contrib. to proceedings of "Loops and Legs in
Quantum Field Theory", 10th DESY Workshop on Elementary Particle Theory,
25-30 April 2010, Woerlitz, German
- …
