Results 41 to 50 of about 856,744 (186)
Mathematical logic in the human brain: syntax. [PDF]
Theory predicts a close structural relation of formal languages with natural languages. Both share the aspect of an underlying grammar which either generates (hierarchically) structured expressions or allows us to decide whether a sentence is ...
Roland Friedrich, Angela D Friederici
doaj +1 more source
Addressing Challenges in Formal Research on Moribund Heritage Languages: A Path Forward
The substantial uptick in research on heritage languages over the past three decades has enhanced our understanding of the development of bilingual grammars throughout the lifespan.
Roberta D'Alessandro +3 more
doaj +1 more source
A Bibliography on Fuzzy Automata, Grammars and Lanuages [PDF]
This bibliography contains references to papers on fuzzy formal languages, the generation of fuzzy languages by means of fuzzy grammars, the recognition of fuzzy languages by fuzzy automata and machines, as well as some applications of fuzzy set theory ...
Asveld, Peter R.J.
core +2 more sources
Criticality in Formal Languages and Statistical Physics
We show that the mutual information between two symbols, as a function of the number of symbols between the two, decays exponentially in any probabilistic regular grammar, but can decay like a power law for a context-free grammar.
Lin, Henry W., Tegmark, Max
core +1 more source
Formal Choreographic Languages
We introduce formal choreography languages as a meta-model to study message-passing systems. This allows us to compare and generalise standard constructions and properties from the literature. In particular, we consider notions such as global view, local view, and projections from the former to the latter.
Barbanera, F, Lanese, I, Tuosto, E
openaire +4 more sources
Formal Language Identity-based Cryptography
Summary: The rapid growth of the digital economy makes finegrained access control more and more challenging. One of the most impacted areas is cloud computing, which for security purposes requires cryptographic access control. Currently, the best solution for that is the use of Attribute-based Cryptography, which allows the definition of access ...
Vécsi, Ádám, Pethő, Attila
openaire +2 more sources
Hypercompositional Algebra, Computer Science and Geometry
The various branches of Mathematics are not separated between themselves. On the contrary, they interact and extend into each other’s sometimes seemingly different and unrelated areas and help them advance. In this sense, the Hypercompositional Algebra’s
Gerasimos Massouros, Christos Massouros
doaj +1 more source
Building Domain Specific Languages for Voice Recognition Applications [PDF]
This paper presents a method of implementing the voice recognition for the control of software applications. The solutions proposed are based on transforming a subset of the natural language in commands recognized by the application using a formal ...
Cristian IONITA
doaj
The inherent risks in using a name-forming function at object language level [PDF]
The Truth problem is one of the central problems of philosophy. Nowadays, every major theory of truth that applies to formal languages utilizes devices referring to formulae. Such devices include name-forming functions.
András, Ferenc
core +1 more source
Automated Generation of OCL Constraints: NL based Approach vs Pattern Based Approach [PDF]
This paper presents an approach used for automated generations of software constraints. In this model, the SBVR (Semantics of Business Vocabulary and Rules) based semi-formal representation is obtained from the syntactic and semantic analysis of a NL ...
IMRAN SARWAR BAJWA +1 more
doaj

