Search results for "General Computer Science"
showing 10 items of 895 documents
Les apports du modèle de recherches d'expériences à l'analyse du comportement dans le domaine culturel Une exploration conceptuelle et méthodologique
1995
International audience; Le modèle de recherche d'expériences de Holbrook et Hirschman a été présenté par ses auteurs comme un cadre conceptuel bien adapté à l'analyse des comportements dans le domaine culturel. Cette recherche analyse la capacité de variables explicatives des différences interindividuelles retenues par ce modèle à expliquer des différences dans les évocations affectives du théâtre par le public. La méthodologie mise en œuvre s'appuie sur l'analyse statistique de données textuelles recueillies auprès des différents segments de spectateurs.
On the relation of irony, understatement, and litotes
2016
The aim of this paper is to clarify the distinctive and the shared features of the three phenomena: irony, understatement, and litotes. These rhetorical figures have been defined as synonymous, distinct or overlapping in various accounts. This indicates an interrelation but also a need for clearer definitions. Here, each of these rhetorical figures is defined via two jointly necessary conditions. This approach sharpens the categories, enables clear-cut distinctions and helps to explain cases of overlap. German corpus data and examples from the literature as a basis, allow differentiating between cases of understatement as a means of irony, and cases of litotes as a means of understatement. …
Aspects of a theory of bullshit
2016
This paper addresses the question whetherbullshitis a reasonable pragmatic category. In the first part of the paper, drawing on the insights of Harry Frankfurt’s seminal essay, bullshit is defined as an act of insincere asserting where the speaker shows (a) a loose concern for the truth, and (b) does not want the addressee to become aware of condition (a). The author adds to this definition the condition (c) requiring that the bullshitter expresses morecertaintythan is adequate with respect to condition (a). In the second part of the paper, it is discussed whether the above definition can cope with special types of bullshit considered to be a challenge to Frankfurt’s definition. These areev…
Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications
2013
Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…
Adaptive memory programing for the robust capacitated international sourcing problem
2008
The International Sourcing Problem consists of selecting a subset from an available set of potential suppliers internationally located. The selected suppliers must meet the demand for items from a set of plants, which are also located worldwide. Since the costs are affected by macroeconomic conditions in the countries where the supplier and the plant are located, the formulation considers the uncertainty associated with changes in these conditions. We formulate the robust capacitated international sourcing problem by means of a scenario-optimization approach. When dealing with uncertainty, one of the most common approaches in the literature is to formulate the problem via a set of possible …
An efficient adaptive strategy for searching in peer-to-peer networks
2005
One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…
Neural net classification of REM sleep based on spectral measures as compared to nonlinear measures
2001
In various studies the implementation of nonlinear and nonconventional measures has significantly improved EEG (electroencephalogram) analyses as compared to using conventional parameters alone. A neural network algorithm well approved in our laboratory for the automatic recognition of rapid eye movement (REM) sleep was investigated in this regard. Originally based on a broad range of spectral power inputs, we additionally supplied the nonlinear measures of the largest Lyapunov exponent and correlation dimension as well as the nonconventional stochastic measures of spectral entropy and entropy of amplitudes. No improvement in the detection of REM sleep could be achieved by the inclusion of …
Nonlinear analysis of continuous ECG during sleep II. Dynamical measures
2000
The hypothesis that cardiac rhythms are associated with chaotic dynamics implicating a healthy flexibility has motivated the investigation of continuous ECG with methods of nonlinear system theory. Sleep is known to be associated with modulations of the sympathetic and parasympathetic control of cardiac dynamics. Thus, the differentiation of ECG signals recorded during different sleep stages can serve to determine the usefulness of nonlinear measures in discriminating ECG states in general. For this purpose the following six nonlinear measures were implemented: correlation dimension D2, Lyapunov exponent L1. Kolmogorov entropy K2, as well as three measures derived from the analysis of unsta…
Surrogate data analysis of sleep electroencephalograms reveals evidence for nonlinearity
1996
We tested the hypothesis of whether sleep electroencephalographic (EEG) signals of different time windows (164 s, 82 s, 41 s and 20.5 s) are in accordance with linear stochastic models. For this purpose we analyzed the all-night sleep electroencephalogram of a healthy subject and corresponding Gaussian-rescaled phase randomized surrogates with a battery of five non-linear measures. The following nonlinear measures were implemented: largest Lyapunov exponent L1, correlation dimension D2, and the Green-Savit measures delta 2, delta 4 and delta 6. The hypothesis of linear stochastic data was rejected with high statistical significance. L1 and D2 yielded the most pronounced effects, while the G…
The dimensionality of human's electroencephalogram during sleep.
1991
In order to perform an analysis of nonlinear EEG-dynamics we investigated the EEG of ten male probands during sleep. According to Rechtschaffen and Kales (1968) we scored the sleep-EEG and applied an algorithm, proposed by Grassberger and Proccaccia (1983) to compute the correlation dimension of different sleep stages. The correlation dimension characterizes the dynamics of the EEG signal and estimates the degrees of freedom of the signal under study. We could demonstrate, that the EEG of slow wave sleep stages depicts a dimensionality, which is two units smaller than that of light or REM sleep.