Academic literature on the topic 'Lemma access'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Lemma access.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Lemma access"

1

Guerini, Federica. "APPUNTI PER UNA EDIZIONE DEL GLOSSARIO BERGAMASCO MEDIOEVALE DI ANTONIO TIRABOSCHI." Italiano LinguaDue 13, no. 2 (2022): 589–605. http://dx.doi.org/10.54103/2037-3597/17150.

Full text
Abstract:
Il presente contribuito descrive la struttura e i contenuti del Glossario Bergamasco Medioevale di Antonio Tiraboschi, attualmente conservato presso la Biblioteca Civica Angelo Mai di Bergamo, e costituito da quattro quaderni manoscritti e inediti, all’interno dei quali sono registrati oltre 2000 lemmi organizzati alfabeticamente. Si descrivono le fonti, edite e inedite, dalle quali Tiraboschi attinge i frammenti citati all’interno di ciascun lemma e si propone una classificazione delle annotazioni di cui il Glossario si compone in tre sottogruppi: 
 
 note di carattere dialettologic
APA, Harvard, Vancouver, ISO, and other styles
2

Lewandowski, Sharon M., W. R. Bushnell, and C. Kent Evans. "Distribution of Mycelial Colonies and Lesions in Field-Grown Barley Inoculated with Fusarium graminearum." Phytopathology® 96, no. 6 (2006): 567–81. http://dx.doi.org/10.1094/phyto-96-0567.

Full text
Abstract:
External surfaces of barley florets have thick-walled epidermal cells resistant to direct penetration by the head blight pathogen, Fusarium graminearum. Surfaces within the floral cavity have thin-walled, susceptible cells. How the fungus gains access to the floral cavity, causing head blight, has not been determined. To investigate pathways of entry, field-grown plants were sprayed with macroconidial inoculum after heads emerged from the flag leaf sheath and then were mist irrigated daily in the morning and evening. On selected days, 1 to 8 days after inoculation (DAI), 80 to 190 florets per
APA, Harvard, Vancouver, ISO, and other styles
3

Luef, Eva Maria, and Jong-Seung Sun. "Wordform-specific frequency effects cause acoustic variation in zero-inflected homophones." Poznan Studies in Contemporary Linguistics 56, no. 4 (2020): 711–39. http://dx.doi.org/10.1515/psicl-2020-0024.

Full text
Abstract:
Abstract The frequency with which a word appears in the lexicon has implications for its pronunciation. Numerous studies have shown that high-frequency lemma are characterized by more phonetic reduction than lower-frequency lemma. These findings have proven to be particularly useful in the study of homophones where frequency-related reduction processes can give insights into lexical access theories. The majority of research on homophones and frequency effects has focused on heterographic and semantically unrelated homophones (e.g., English time – thyme) or investigated zero-derived homophones
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Chao, Haiying Gao, and Duo Wei. "A CP-ABE Scheme Supporting Arithmetic Span Programs." Security and Communication Networks 2020 (March 16, 2020): 1–16. http://dx.doi.org/10.1155/2020/3265871.

Full text
Abstract:
Attribute-based encryption achieves fine-grained access control, especially in a cloud computing environment. In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the ciphertexts are associated with the access policies, while the secret keys are determined by the attributes. In recent years, people have tried to find more effective access structures to improve the efficiency of encryption systems. This paper presents a ciphertext-policy attribute-based encryption scheme that supports arithmetic span programs. On the composite-order bilinear group, the security of the scheme is pr
APA, Harvard, Vancouver, ISO, and other styles
5

de Bot, Kees, T. Sima Paribakht, and Marjorie Bingham Wesche. "TOWARD A LEXICAL PROCESSING MODEL FOR THE STUDY OF SECOND LANGUAGE VOCABULARY ACQUISITION." Studies in Second Language Acquisition 19, no. 3 (1997): 309–29. http://dx.doi.org/10.1017/s0272263197003021.

Full text
Abstract:
A major requirement for theory development in L2 vocabulary acquisition is an adequate model of L2 lexical organization and processing. At present, there is no widely accepted model of this kind, but recent research has demonstrated the potential usefulness of Levelt's (1989, 1993) L1 speech processing model (de Bot & Schreuder, 1993; Green, 1993; Poulisse, 1993). This paper explores the relevance of the model as adapted for L2 lexical processing of written texts, with particular attention to its mental lexicon components (concepts, lemmas, and lexemes) and organization. The model is first
APA, Harvard, Vancouver, ISO, and other styles
6

Sivaeva, O. "SEMANTIC PROSODY OF THE LEMMA VACCINE IN THE MEDIA TEXTS." Studia Philologica 1, no. 16 (2021): 42–46. http://dx.doi.org/10.28925/2311-2425.2021.166.

Full text
Abstract:
This paper discusses the results of the corpus-based analysis of the semantic prosody of collocations with VACCINE in the broadsheet ‘The Guardian’. The corpus has been processed with the help of Sketch Engine. Text passages containing collocations with VACCINE have been interpreted in order to state the prosody mode of the collocation in the context. The study mostly pays attention to the nouns modified by VACCINE as most frequently used in the me­dia texts. The dictionary definition of VACCINE defines it as a word with positive semantic prosody. The discourse analysis demonstrates that collo
APA, Harvard, Vancouver, ISO, and other styles
7

NiCastro, J. R. A. J. "Study of Two-Sided Similarity Methods Using a Radiation “Switch on” Imploding Shock in a Magnetic Field." Journal of Applied Mathematics 2018 (June 24, 2018): 1–14. http://dx.doi.org/10.1155/2018/9701268.

Full text
Abstract:
This paper explores aspects of two-sided similarity modeling using cylindrical geometry for radiating shock waves embedded in a medium with a magnetic field. Two-sided similarity solution techniques may be used to link states influenced by long range near instantaneous fields that continually modify the pre- and postshock zones. Emergent radiation scaling relations are immediately available from consistent homologies. For both small angle and large angle measurements, an approximate analytic technique in the vicinity of luminous fronts together with the high symmetry implications delineated in
APA, Harvard, Vancouver, ISO, and other styles
8

GOÑI, JOSÉ M., JOSÉ C. GONZÁLEZ, and ANTONIO MORENO. "ARIES: A lexical platform for engineering Spanish processing tools." Natural Language Engineering 3, no. 4 (1997): 317–45. http://dx.doi.org/10.1017/s1351324997001812.

Full text
Abstract:
We present a lexical platform that has been developed for the Spanish language. It achieves portability between different computer systems and efficiency, in terms of speed and lexical coverage. A model for the full treatment of Spanish inflectional morphology for verbs, nouns and adjectives is presented. This model permits word formation based solely on morpheme concatenation, driven by a feature-based unification grammar. The run-time lexicon is a collection of allomorphs for both stems and endings. Although not tested, it should be suitable also for other Romance and highly inflected langua
APA, Harvard, Vancouver, ISO, and other styles
9

Deundyak, Vladimir M., and Denis V. Zagumennov. "On the Properties of Algebraic Geometric Codes as Copy Protection Codes." Modeling and Analysis of Information Systems 27, no. 1 (2020): 22–38. http://dx.doi.org/10.18255/1818-1015-2020-1-22-38.

Full text
Abstract:
Traceability schemes which are applied to the broadcast encryption can prevent unauthorized parties from accessing the distributed data. In a traceability scheme a distributor broadcasts the encrypted data and gives each authorized user unique key and identifying word from selected error-correcting code for decrypting. The following attack is possible in these schemes: groups of c malicious users are joining into coalitions and gaining illegal access to the data by combining their keys and identifying codewords to obtain pirate key and codeword. To prevent this attacks, classes of error-correc
APA, Harvard, Vancouver, ISO, and other styles
10

Alshehri, Amira Abdullah. "The L1 Semantic Retrieval of L2 Words: Evidence from Advanced L2 Learners’ Reaction Times." World Journal of English Language 12, no. 1 (2022): 334. http://dx.doi.org/10.5430/wjel.v12n1p334.

Full text
Abstract:
According to the first language (L1) lemma mediation hypothesis, second language learners, regardless of their level of second language (L2) proficiency, access the meaning of L2 words via their first language (Jiang, 2004). To test this hypothesis, a semantic judgment task was conducted on 30 advanced Arab speakers of English, in which they were presented with 86 pairs of English words and had to decide whether each pair was semantically related. Some semantically related pairs are classified as same translation pairs because their members share the same L1 translation, whereas others are sem
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!