Search results for "interpretation."
showing 10 items of 1040 documents
An easy approach to epistemology and ontology in computing theses
2013
In many research fields---notably social sciences but also in those fields where design, experiment-based science, and social sciences are mixed---researchers must often describe their epistemological and ontological commitments in research reports. The research literature describes those commitments in various ways, often grouped under research paradigms such as positivism, post-positivism, and constructivism, and described as "world views." This paper presents the bare bones of the ontological and epistemological questions in scientific practice. Ontologically speaking, subject matters can be mind-dependent or mind-independent. Epistemologically speaking, elements of research may be more …
Icons: Visual representation to enrich requirements engineering work
2013
Adapting icons in requirements engineering can support the multifaceted needs of stakeholders. Conventional ap- proaches to RE are mainly highlighted in diagrams. This paper introduces icon-based information as a way to represent ideas and concepts in the requirements engineering domain. We report on icon artifacts that support requirements engi- neering work such as priority types, status states and stakeholder kinds. We evaluate how users interpret meanings of icons and the efficacy of icon prototypes shaped to represent those requirements attributes. Our hypothesis is whether practitioners can recognize the icons’ meaning in terms of their functional representation. According to the empi…
Justification of point electrode models in electrical impedance tomography
2011
The most accurate model for real-life electrical impedance tomography is the complete electrode model, which takes into account electrode shapes and (usually unknown) contact impedances at electrode-object interfaces. When the electrodes are small, however, it is tempting to formally replace them by point sources. This simplifies the model considerably and completely eliminates the effect of contact impedance. In this work we rigorously justify such a point electrode model for the important case of having difference measurements ("relative data") as data for the reconstruction problem. We do this by deriving the asymptotic limit of the complete model for vanishing electrode size. This is s…
Il primo concorso per il Palazzo di Giustizia a Roma del 1884. Ricostruzione critica del progetto di Ernesto Basile
2019
1. Breve descrizione dell’oggetto di studio Il concorso del Palazzo di Giustizia di Roma si svolge in quattro fasi svolte tra il 1884 e il 1887. Il progetto per il primo concorso, del 1884, redatto dall’allora giovanissimo Ernesto Basile (Palermo 1857-1932), rivela una grande perizia progettuale che trasforma il complesso programma funzionale in un austero edificio in stile neofiorentino. I disegni originari dell’opera, non realizzata, conservati presso la Dotazione Basile del Dipartimento di Architettura dell’Università di Palermo, sono stati oggetto di studio propedeutico alle fasi di analisi, interpretazione e ricostruzione congetturale del modello digitale. 2. Stato dell’arte e riferime…
Recommendations of the LHC Dark Matter Working Group: Comparing LHC searches for dark matter mediators in visible and invisible decay channels and ca…
2019
Physics of the Dark Universe 26, 100377 (2019). doi:10.1016/j.dark.2019.100377
Koulukiusaaminen : loukkaavat vuorovaikutusprosessit oppilaiden vertaissuhteissa
2012
Preventing reverse engineering of native and managed programs
2015
One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…
The role of the agreement as a tool for management of property relations in cases of cross border marriages and civil unions/partnerships registered …
2021
The essay examines the role of the agreement as a tool for managing property relationships in crossborder marriages and registered partnerships, in light of EU Regulations 1103 and 1104 of 2016, on the property regimes of international married or registered couples. The main prerogative of such acts is the recognition of the parties? freedom to choose the court and the applicable law. The law governing the matrimonial property regimes, or the property consequences of registered partnerships, has universal scope. This agreement in the form envisaged, which is backed by the need for legal certainty and predictability of the applicable rules, means that the spouses, in family problems which ha…
How Do Young Adults Orchestrate Their Multiple Achievement-Related Goals? Associations of Achievement Goal Orientations With Identity Formation and G…
2016
Young adults strive for multiple achievement goals. Frameworks for achievement goal orientations, personal goals, and identity formation have emphasized the role of goal-specific exploration and commitment in the interpretation of goals. However, researchers have yet to combine these different perspectives in an empirical study. Therefore, to explore the processes involved in the selection of multiple goals, the present study investigated the associations of young adults’ achievement goal orientations (mastery-intrinsic, mastery-extrinsic, performance-approach, performance-avoidance, and work-avoidance orientations) with distinct styles of exploring and committing to goals, by considering d…
Teenage Violence Toward Parents – in Search of the Theoretical Bases of a Research Tool
2020
The article contains an analysis of results of the available research on the phenomenon of children’s violence toward their parents. The main purpose of this interpretation is to search for the theoretical structure of a prepared research tool, initially called the Teen Violence Scale Toward Parents (TVSTP). The subject of the analyzes were works and research reports as well as police statistics containing information on the phenomenon of domestic violence, including teenage violence toward parents. As a result of the analysis, the theoretical function of the proposed research tool was distinguished, referring to types of violence possible to diagnose within this area. The proposed tool was…