3,864 research outputs found

    Mundari: The myth of a language without word classes

    Get PDF
    Mundari, an Austroasiatic language of India (Munda family), has often been cited as an example of a language without word classes, where a single word can function as noun, verb, adjective, etc. according to the context. These claims, originating in a 1903 grammar by the missionary John Hoffmann, have recently been repeated uncritically by a number of typologists. In this article we review the evidence for word class fluidity, on the basis of a careful analysis of Hoffmann's corpus as well as substantial new data, including a large lexical sample at two levels of detail. We argue that in fact Mundari does have clearly definable word classes, with distinct open classes of verb and noun, in addition to a closed adjective class, though there are productive possibilities for using all as predicates. Along the way, we elaborate a series of criteria that would need to be met before any language could seriously be claimed to lack a noun-verb distinction: most importantly strict compositionality, bidirectional flexibility, and exhaustiveness through the lexicon

    Decentralization of Multiagent Policies by Learning What to Communicate

    Full text link
    Effective communication is required for teams of robots to solve sophisticated collaborative tasks. In practice it is typical for both the encoding and semantics of communication to be manually defined by an expert; this is true regardless of whether the behaviors themselves are bespoke, optimization based, or learned. We present an agent architecture and training methodology using neural networks to learn task-oriented communication semantics based on the example of a communication-unaware expert policy. A perimeter defense game illustrates the system's ability to handle dynamically changing numbers of agents and its graceful degradation in performance as communication constraints are tightened or the expert's observability assumptions are broken.Comment: 7 page

    The Semantics of Purity in the Ancient Near East: Lexical Meaning as a Projection of Embodied Experience

    Get PDF
    This article analyzes the primary terms for purity in Biblical Hebrew, Ugaritic, Sumerian, Akkadian and Hittite. Building on insights from cognitive linguistics and embodiment theory, this study develops the premise that semantic structure – even of seemingly abstract concepts– is grounded in real-world bodily experience. An examination of purity terms reveals that all of them can be related to a concrete sense pertaining to radiance (brilliance, brightness, shininess). The article traces the semantic development of purity terms in distinct experiential contexts and shows how semantic analysis can elucidate the inner logic of fundamental religious concepts

    Beyond XSPEC: Towards Highly Configurable Analysis

    Full text link
    We present a quantitative comparison between software features of the defacto standard X-ray spectral analysis tool, XSPEC, and ISIS, the Interactive Spectral Interpretation System. Our emphasis is on customized analysis, with ISIS offered as a strong example of configurable software. While noting that XSPEC has been of immense value to astronomers, and that its scientific core is moderately extensible--most commonly via the inclusion of user contributed "local models"--we identify a series of limitations with its use beyond conventional spectral modeling. We argue that from the viewpoint of the astronomical user, the XSPEC internal structure presents a Black Box Problem, with many of its important features hidden from the top-level interface, thus discouraging user customization. Drawing from examples in custom modeling, numerical analysis, parallel computation, visualization, data management, and automated code generation, we show how a numerically scriptable, modular, and extensible analysis platform such as ISIS facilitates many forms of advanced astrophysical inquiry.Comment: Accepted by PASP, for July 2008 (15 pages

    Data generator for evaluating ETL process quality

    Get PDF
    Obtaining the right set of data for evaluating the fulfillment of different quality factors in the extract-transform-load (ETL) process design is rather challenging. First, the real data might be out of reach due to different privacy constraints, while manually providing a synthetic set of data is known as a labor-intensive task that needs to take various combinations of process parameters into account. More importantly, having a single dataset usually does not represent the evolution of data throughout the complete process lifespan, hence missing the plethora of possible test cases. To facilitate such demanding task, in this paper we propose an automatic data generator (i.e., Bijoux). Starting from a given ETL process model, Bijoux extracts the semantics of data transformations, analyzes the constraints they imply over input data, and automatically generates testing datasets. Bijoux is highly modular and configurable to enable end-users to generate datasets for a variety of interesting test scenarios (e.g., evaluating specific parts of an input ETL process design, with different input dataset sizes, different distributions of data, and different operation selectivities). We have developed a running prototype that implements the functionality of our data generation framework and here we report our experimental findings showing the effectiveness and scalability of our approach.Peer ReviewedPostprint (author's final draft

    Analytic real-time analysis and timed automata: a hybrid methodology for the performance analysis of embedded real-time systems

    Get PDF
    This paper presents a compositional and hybrid approach for the performance analysis of distributed real-time systems. The developed methodology abstracts system components by either flow-oriented and purely analytic descriptions or by state-based models in the form of timed automata. The interaction among the heterogeneous components is modeled by streams of discrete events. In total this yields a hybrid framework for the compositional analysis of embedded systems. It supplements contemporary techniques for the following reasons: (a) state space explosion as intrinsic to formal verification is limited to the level of isolated components; (b) computed performance metrics such as buffer sizes, delays and utilization rates are not overly pessimistic, because coarse-grained analytic models are used only for components that conform to the stateless model of computation. For demonstrating the usefulness of the presented ideas, a corresponding tool-chain has been implemented. It is used to investigate the performance of a two-staged computing system, where one stage exhibits state-dependent behavior that is only coarsely coverable by a purely analytic and stateless component abstraction. Finally, experiments are performed to ascertain the scalability and the accuracy of the proposed approac
    • …
    corecore