Results 21 to 30 of about 16,004 (212)

Verifying Security Policies Using Host Attributes [PDF]

open access: yes, 2014
In FORTE - 34th IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems, Berlin, Germany, June ...
Diekmann, Cornelius   +5 more
openaire   +3 more sources

Descripciones definidas y negociación del significado : un punto de vista conversacional

open access: yesCuadernos de Investigación Filológica, 2013
In this paper, the reader will find a critical review of Donnellan's well-known distinction between the 'referential' and the 'attributive' uses of definite descriptions. In this respect, Kripke's (1979) and Searle's (1979) proposals are examined.
Francisco José Ruiz de Mendoza Ibáñez
doaj   +1 more source

The adjective: an eminently syncategorematic part of speech

open access: yesKalbotyra, 2021
In this article we propose an alternative to the theories which subdivide the adjective into three major types (qualifier, relational, adjective of the third type), themselves subdivided into several subclasses.
Jan Goes
doaj   +1 more source

Authorisation Using Attributes from Multiple Authorities [PDF]

open access: yes15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06), 2006
As attribute based authorisation infrastructures such as XACML gain in popularity, linking together user attributes from multiple attribute authorities (AAs) is becoming a pressing problem. Current models and mechanisms do not support this linking, primarily because the user is known by different names in the different AAs.
openaire   +2 more sources

From proper name to epithet: motivation and change in the fashion industry

open access: yesLexis: Journal in English Lexicology, 2022
The purpose of this paper is to investigate English terms and, more precisely, nominal constructs (Booij [2010]) with proper names as modifiers, in the changing history of fashion and customs. Starting on the assumption that proper names and common nouns
Silvia Cacchiani
doaj   +1 more source

European Union Terminology Unification - Directions for the Contrastive Study of Two Slavic and Two Non-Slavic Languages (Bulgarian, Polish, Modern Greek and English) [PDF]

open access: yes, 2011
This study attempts to characterize terminology unification in the European Union legislation, regarding both content and form. It analyzes terms related to the thematic field of environmental law in four official EU languages: two Slavic (Bulgarian and ...
Genew-Puhalewa, Iliana
core   +2 more sources

Chylothorax: complication attributed to dasatinib use

open access: yesBMJ Case Reports, 2019
A 63-year-old woman with a medical history of chronic myelogenous leukaemia treated with dasatinib, chronic obstructive pulmonary disease and heart failure with preserved ejection fraction presented with difficulty in breathing. Chest X-ray showed large right-sided pleural effusion, which was confirmed on a CT angiogram of the chest.
Abdullah, Al-Abcha   +3 more
openaire   +3 more sources

A Stylistic Analysis of Adjectives in Selected Political and Religious Speeches

open access: yesمجلة الآداب, 2018
Politicians and religious figures usually rely heavily on their linguistic abilities to persuade their audience with their allegations because only through language can they shape their audience thoughts.
خولة شكر محمود
doaj   +1 more source

Gender assignment and gender agreement in advanced French interlanguage: a cross-sectional study [PDF]

open access: yes, 2001
An analysis of 519 gender errors (out of 9,378 modifiers) in the advanced French interlanguage of 27 Dutch L1 speakers confirms earlier findings that gender assignment and/or agreement remain problematic for learners at all levels.
Dewaele, Jean-Marc, Véronique, D.
core   +1 more source

Using Attribute-Based Access Control to Enable Attribute-Based Messaging [PDF]

open access: yes2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006
Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted messaging can reduce unnecessary communications and enhance privacy, but faces challenges in access control.
Rakesh Bobba   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy