Results 21 to 30 of about 287,181 (286)

Loanwords in Cilubà

open access: yesLexikos, 2012
<p>The present study examines loanwords in Cilubà from both a phonological and a morphological point of view. Two large categories of loanwords can be distinguished: on the one hand those which are entirely integrated and on the other hand more ...
Ngo Semzara Kabuta
doaj   +1 more source

CONSTRUCTIONS WITH NEGATIVE PREFIX at IN THE COPTIC LANGUAGE [PDF]

open access: yesJournal of the General Union of Arab Archaeologists, 2021
( Ar) التراكيب ذات البادئة النافية فى اللغة القبطية تتناول هذه الورقة البحثية البادئة النافية at التي تدخل علي الأسماء والأفعال لتكوّن اسمًا مجردًا منفيًا (صفة منفية) حيث إنه يوجد العديد من الأسماء المجردة تتكون من البادئة النافية at . علاوة على ذلك،
Shaimaa Abdelsttar Ahmed
doaj   +1 more source

Existential Second-Order Logic Over Graphs: A Complete Complexity-Theoretic Classification [PDF]

open access: yes, 2014
Descriptive complexity theory aims at inferring a problem's computational complexity from the syntactic complexity of its description. A cornerstone of this theory is Fagin's Theorem, by which a graph property is expressible in existential second-order ...
Tantau, Till
core   +2 more sources

PREFIXES, SUFFIXES, AND INFIXESES IN KURMANJI (ZAZAKI) (Comparative descriptive study)

open access: yesگۆڤارا زانستێن مرۆڤایەتی یا زانكۆیا زاخۆ, 2017
This research "Prefixes, Suffixes, and Infixeses in Kurmanjki (Zazaki) is prepared on the basis of comparison to other dialects. The materials are taken from oral and written Kurmanjki resources.
Mehmet T. Malmîsanîj   +1 more
doaj   +1 more source

Normal, Abby Normal, Prefix Normal

open access: yes, 2014
A prefix normal word is a binary word with the property that no substring has more 1s than the prefix of the same length. This class of words is important in the context of binary jumbled pattern matching.
A. Amir   +14 more
core   +1 more source

ARTEMIS: Real-Time Detection and Automatic Mitigation for BGP Prefix Hijacking

open access: yes, 2017
Prefix hijacking is a common phenomenon in the Internet that often causes routing problems and economic losses. In this demo, we propose ARTEMIS, a tool that enables network administrators to detect and mitigate prefix hijacking incidents, against their ...
Chaviaras, Gavriil   +3 more
core   +1 more source

Prefix Codes for Power Laws with Countable Support

open access: yes, 2007
In prefix coding over an infinite alphabet, methods that consider specific distributions generally consider those that decline more quickly than a power law (e.g., Golomb coding).
Baer, Michael B.
core   +1 more source

Morphological Analysis of Derivational Affixes in Brothers Grimm’s the Story of Rapunzel

open access: yesEnglish Franca: Academic Journal of English Language and Education, 2020
This paper aimed to explore derivational affixes, more specifically the types of derivational affixes and the functions of the derivational affixes in the story of Rapunzel, which was written by the Brothers Grimm.
Efrika Siboro, Barli Bram
doaj   +1 more source

Is the cyclic prefix necessary?

open access: yes, 2006
We show that one can do away with the cyclic prefix (CP) for SC-FDE and OFDM at the cost of a moderate increase in the complexity of a DFT-based receiver.
Sharma, Naresh, Tikku, Ashok Armen
core   +2 more sources

An adaptive prefix-assignment technique for symmetry reduction

open access: yes, 2018
This paper presents a technique for symmetry reduction that adaptively assigns a prefix of variables in a system of constraints so that the generated prefix-assignments are pairwise nonisomorphic under the action of the symmetry group of the system.
A Itzhakov   +27 more
core   +1 more source

Home - About - Disclaimer - Privacy