03813nam 2200625 450 991080931800332120230809224244.01-5015-0541-610.1515/9781501505430(CKB)3710000001386870(MiAaPQ)EBC4866636(DE-B1597)477310(OCoLC)988765059(OCoLC)989860476(DE-B1597)9781501505430(Au-PeEL)EBL4866636(CaPaEBR)ebr11390729(CaONFJC)MIL1013021(EXLCZ)99371000000138687020170623h20172017 uy 0engurcnu||||||||rdacontentrdamediardacarrierAspect and valency in nominals /edited by Maria Bloch-Trojnar, Anna Malicka-KleparskaBerlin, [Germany] ;Boston, [Massachusetts] :De Gruyter Mouton,2017.©20171 online resource (344 pages)Studies in Generative Grammar,0167-4331 ;Volume 134Includes index.1-5015-0543-2 1-5015-1458-X Frontmatter -- Contents -- The interaction of aspect and valency in nominal structures - A theoretical overview / Bloch-Trojnar, Maria / Malicka-Kleparska, Anna -- Eventive Object Experiencer nominalizations in Hebrew / Ahdout, Odelia -- On the complex relationship between deverbal compounds and argument supporting nominals / Alexiadou, Artemis -- Aspectual constraints on the plural marking of argument supporting -nie/-cie nominals in Polish / Bloch-Trojnar, Maria -- Event nominalizations in -da in European Portuguese: A syntactic approach / Brito, Ana Maria -- Group adjectives, argument structure and aspectual characteristics of derived nominals in Polish and English / Cetnarowska, Bożena -- Lexical categories and aspectual primitives: The case of Spanish -ncia / Fábregas, Antonio / Marín, Rafael -- A design for the analysis of bare nominalizations in Norwegian / Hellan, Lars -- Argument structures in Italian nominalizations / Insacco, Gioia -- Morphological and semantic transparency in Hebrew agent noun formation / Laks, Lior -- Aspect-related properties in the nominal domain: The case of Italian psych nominals / Melloni, Chiara -- Generic, habitual and episodic events in Romanian nominalizations / Soare, Elena -- Some constraints on the arguments of an event noun with special aspectual properties / Tovena, Lucia M. -- Editors -- List of contributors -- IndexThis book contributes to the recent theoretical developments in the area of mutual interactions of valency and aspect, as expressed in different types of verb-related nominal structures (nominalizations and synthetic compounds). A wide range of data from Slavic, Hellenic, Germanic, Romance and Semitic languages provides an empirical testing ground for competing theoretical explanations couched in the lexicalist and construction-based frameworks.Studies in generative grammar ;Volume 134.Grammar, Comparative and generalNoun phraseGrammar, Comparative and generalNominalsAspect.Nominalization.Synthetic Compounding.Valency.Grammar, Comparative and generalNoun phrase.Grammar, Comparative and generalNominals.415ET 660SEPArvkBloch-Trojnar MariaMalicka-Kleparska AnnaMiAaPQMiAaPQMiAaPQBOOK9910809318003321Aspect and valency in nominals3919898UNINA05850nam 22006973 450 991100671300332120251218010127.09780128023402012802340697801280213230128021322(CKB)3710000000430794(EBL)2072012(SSID)ssj0001611255(PQKBManifestationID)16322986(PQKBTitleCode)TC0001611255(PQKBWorkID)14900333(PQKB)11632747(WaSeSS)IndRDA00069977(OCoLC)915143486(OCoLC)ocn915143486(FR-PaCSA)88829552(CaSebORM)9780128023402(MiAaPQ)EBC2072012(FRCYB88829552)88829552(EXLCZ)99371000000043079420150629d2015|||| u|| |engur|n|---|||||txtccrAdvances in computersVolume 98 /Edited by Ali R. HursonFirst edition.Amsterdam, Netherlands :Elsevier,2015.1 online resource (247 p.)Advances in computers,0065-2458 ;v. 98Description based upon print version of record.Includes bibliographical references and indexes.Chapter 1: An Overview of Architecture-Level Power-and Energy-Efficient Design Techniques -- 1. Introduction -- 2. Metrics of Interest -- 3. Classification of Selected Architecture-Level Techniques -- 4. Presentation of Selected Architecture-Level Techniques -- 5. Future Trend -- 6. Conclusion -- References --Chapter 2: A Survey of Research on Data Corruption in Cyber-Physical Critical Infrastructure Systems -- 1. Introduction -- 2. Sources of Corrupted Data -- 3. Sensor Networks: Application for Comparison -- 4. Detection of Corrupted Data -- 5. Mitigation of Data Corruption -- 6. Propagation of Corrupted Data -- 7. Conclusion and Future Direction -- References --Chapter 3: A Research Overview of Tool-Supported Model-based Testing of Requirements-based Designs -- 1. Introduction -- 2. The Generic Model-based Testing Approach -- 3. Proposed Taxonomy Dimensions -- 4. A Research Review of Model-based Testing Tools -- 5. Running Example: The Coffee/Tea Vending Machine -- 6. Model-based Testing Tools for Pre/Post Notations -- 7. Model-based Testing Tools for Transition-based Notations -- 7.1. Finite State Machines --Chapter 4: Preference Incorporation in Evolutionary Multiobjective Optimization: A Survey of the State-of-the-Art -- Index.The theme of this 98th volume is inspired by the advances in information technology. Within the spectrum of information technology, this volume touches a variety of topics ranging from computer architecture and energy-efficient design techniques, cyber-physical critical infrastructure systems, model-based testing, and multi-objective optimization methods. The volume is a collection of four chapters that were solicited from authorities in the field, each of whom brings to bear a unique perspective on the topic. (1) Architecture-Level Power- and Energy-Efficient Design Techniques, articulate the holistic consideration of power and energy consumption of computer systems at all design levels without sacrificing the processing power. Several circuit and architectural metrics are defined, the notion of dynamic and static energy is discussed, distinction between power and energy is articulated, and metrics such as “Energy-Delay Product” and “Energy per Instruction” are introduced. (2) Data Corruption in Cyber-Physical Critical Infrastructure Systems, and emphasizes the effect of data corruption, either intentional (i.e., cyber, physical, or cyber-physical attacks) or unintentional (i.e., failures in sensors, processors, storage, or communication hardware), within the scope of critical cyber-physical systems (i.e., power grids, intelligent water distribution networks, smart transportation systems). It presents a comprehensive analysis of various data corruption and mitigation techniques. Finally, a number of studies on the negative effects of system execution on corrupted data are presented. (3) Tool-Supported Model-Based Testing of Requirements-Based Designs, address software testing objectives as a means to gain confidence in software products through fault detection, by observing the differences between the behavior of the implementation and the expected behavior described in the specification. The Chapter presents an overview of and classifies the state of the art in tool-supported model-based testing with an eye toward gaining insight into the gaps in the current tools used by industry and academia. (4) "Preference Incorporation in Evolutionary Multiobjective Optimization" presents a survey of the "State of the Art" and emphasizes the application of evolutionary algorithms as a means for multi-objective optimization. A classification of preference-based Multiobjective Optimization Evolutionary Algorithms based on the structure of the decision maker's preference information is presented and several approaches are discussed and analyzed.Advances in computers ;v. 98(OCoLC)14611740065-2458ComputersGraphical user interfaces (Computer systems)System analysisComputers.Graphical user interfaces (Computer systems).System analysis.005.12Hurson A. RAU-PeELAU-PeELAU-PeELNZ-WeVULBOOK9911006713003321Advances in Computers4391811UNINA