LEADER 04451nam 2200733Ia 450 001 9910462015203321 005 20211120003006.0 010 $a3-11-090986-3 024 7 $a10.1515/9783110909869 035 $a(CKB)2670000000250748 035 $a(EBL)3041744 035 $a(SSID)ssj0000594733 035 $a(PQKBManifestationID)11353606 035 $a(PQKBTitleCode)TC0000594733 035 $a(PQKBWorkID)10549086 035 $a(PQKB)11673594 035 $a(MiAaPQ)EBC3041744 035 $a(WaSeSS)Ind00008989 035 $a(DE-B1597)56398 035 $a(OCoLC)979749263 035 $a(DE-B1597)9783110909869 035 $a(Au-PeEL)EBL3041744 035 $a(CaPaEBR)ebr10597420 035 $a(OCoLC)922944795 035 $a(EXLCZ)992670000000250748 100 $a20031023d2003 uy 0 101 0 $aeng 135 $aurnn#---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aAuch and noch in child and adult German$b[electronic resource] /$fby Ulrike Nederstigt 205 $aReprint 2011 210 $aBerlin ;$aNew York $cMouton de Gruyter$dc2003 215 $a1 online resource (420 p.) 225 0 $aStudies on Language Acquisition [SOLA] ;$v23 300 $aDescription based upon print version of record. 311 0 $a3-11-018044-8 320 $aIncludes bibliographical references (p. [387]-397) and indexes. 327 $tFront matter --$tAcknowledgements --$tContents --$tChapter 1: Introduction --$tChapter 2: Focus particles - A review of the literature --$tChapter 3: Auch and noch in spoken German - Aim, data and method of the study --$tChapter 4: Results --$tChapter 5: Conclusions and discussion --$tChapter 6: A fresh look at focus particles --$tChapter 7: Child language - Aim, data and method --$tChapter 8: Child language results --$tChapter 9: The acquisition of Auch and Noch --$tChapter 10: General conclusions and discussion --$tAppendices --$tNotes --$tReferences --$tSubject Index --$tAuthor Index 330 $a"Auch" and "noch" in Child and Adult German is an empirical study of the early acquisition of "auch" (also) and "noch" (also/still) in German, and the adult use of these additive particles in spoken language. It centres around the question of how children acquire these particles, but it also investigates the way in which adults use these particles in order to determine what children actually have to learn and what the input they get is like. Previous studies on focus particles in adult German mainly focused on the semantic and syntactic properties of primarily constructed examples. Based on several corpora of spoken German, this is the first comprehensive study of natural language data that systematically analyses the intonation of focus particle utterances as well as their semantic, syntactic and information structural properties. The study of the child data, an extensive longitudinal corpus of one German child, was carried out against the background of the adult data. It offers a thorough characterisation of the acquisition of the two additive particles that also takes into account results from previous studies on the acquisition of focus particles, mainly on their comprehension. In addition to studying the acquisition of these particles, the author also introduces an analysis of focus particles that emphasizes the differences between stressed and unstressed particles, which makes this book not only interesting to researchers in language acquisition and psycholinguistics, but also to those interested in phonology/prosody, semantics, syntax and information structure. 410 0$aStudies on Language Acquisition [SOLA] 606 $aAuch (The German word) 606 $aNoch (The German word) 606 $aGerman language$xParticles 606 $aGerman language$xSyntax 606 $aGerman language$xAcquisition 606 $aFocus (Linguistics) 608 $aElectronic books. 615 0$aAuch (The German word) 615 0$aNoch (The German word) 615 0$aGerman language$xParticles. 615 0$aGerman language$xSyntax. 615 0$aGerman language$xAcquisition. 615 0$aFocus (Linguistics) 676 $a435/.7 700 $aNederstigt$b Ulrike$f1968-$01024469 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462015203321 996 $aAuch and noch in child and adult German$92434817 997 $aUNINA LEADER 02706nam 2200625Ia 450 001 9910784812203321 005 20230110224040.0 010 $a0-19-773960-1 010 $a1-280-52832-X 010 $a0-19-535666-7 010 $a1-4237-5888-9 035 $a(CKB)1000000000407716 035 $a(EBL)271671 035 $a(OCoLC)466425560 035 $a(SSID)ssj0000178277 035 $a(PQKBManifestationID)11169793 035 $a(PQKBTitleCode)TC0000178277 035 $a(PQKBWorkID)10217722 035 $a(PQKB)11167622 035 $a(Au-PeEL)EBL271671 035 $a(CaPaEBR)ebr10278876 035 $a(CaONFJC)MIL52832 035 $a(MiAaPQ)EBC271671 035 $a(EXLCZ)991000000000407716 100 $a19950706d1998 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIndian epigraphy $ea guide to the study of inscriptions in Sanskrit, Prakrit, and the other Indo-Aryan languages /$fRichard Salomon 210 1$aNew York :$cOxford University Press,$d1998. 215 $a1 online resource (401 pages) 225 1 $aSouth Asia research 300 $aDescription based upon print version of record. 311 0 $a0-19-509984-2 320 $aIncludes bibliographical references (p. 311-327) and indexes. 327 $aContents; Abbreviations; Note on Citation and Bibliographic Form; 1 The Scope and Significance of Epigraphy in Indological Studies; 2 Writing and Scripts in India; 3 The Languages of Indic Inscriptions; 4 Survey of Inscriptions in the Indo-Aryan Languages; 5 Methods of Epigraphic Study; 6 The History of Indian Epigraphic Studies; 7 Epigraphy as a Source for the Study of Indian Culture; 8 Bibliographic Survey; Appendix: Selection of Typical Inscriptions; Bibliography; Index of Inscriptions Cited; Index 330 $aThis text surveys all the inscriptional material - documents written in ink on various surfaces, or carved into stone and metal, as well as seals - in the Indo-Aryan languages. It presents the corpus of these inscriptions in a way which should be accessible to both specialists and non-specialists. 410 0$aSouth Asia research (New York, N.Y.) 606 $aInscriptions, Indo-Aryan 606 $aIndo-Aryan languages$xWriting 615 0$aInscriptions, Indo-Aryan. 615 0$aIndo-Aryan languages$xWriting. 676 $a411.7 676 $a491.1 676 $a491/.1 700 $aSalomon$b Richard$f1948-$01530400 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784812203321 996 $aIndian epigraphy$93775444 997 $aUNINA LEADER 01438nam 2200373 n 450 001 996391261003316 005 20221108010910.0 035 $a(CKB)1000000000666800 035 $a(EEBO)2248519123 035 $a(UnM)9958492500971 035 $a(EXLCZ)991000000000666800 100 $a19941219d1634 uy 101 0 $aeng 135 $aurbn||||a|bb| 200 12$aA lovers teares: or, The constancy of a yong mans mind$b[electronic resource] $ealthough his choyce be too unkind. All you yong men who heare this ditty, a lovers teares bemoane with pitty. To the tune of Sigh, sob, and weepe 210 $aPrinted at London $cfor Tho: Lambert, at the sign of the Hors-shoo in Smithfield.$d[1634] 215 $a1 sheet ([1] p.) $cill 300 $aSigned: M.P. [i.e. Martin Parker]. 300 $aPublication date suggested by STC. 300 $aVerse: "You who haue run in Cupids maze ..." 300 $aIn two parts, separated for mounting; woodcuts at head of each part. 300 $aReproduction of original in the British Library. 330 $aeebo-0018 606 $aBallads, English$y17th century 615 0$aBallads, English 700 $aM. P$g(Martin Parker),$fd. 1656?$01001128 801 0$bCu-RivES 801 1$bCu-RivES 801 2$bCStRLIN 801 2$bCu-RivES 906 $aBOOK 912 $a996391261003316 996 $aA lovers teares: or, The constancy of a yong mans mind$92344978 997 $aUNISA LEADER 05415nam 22008535 450 001 9910484457503321 005 20251226202550.0 010 $a1-280-38811-0 010 $a9786613566034 010 $a3-642-14597-3 024 7 $a10.1007/978-3-642-14597-1 035 $a(CKB)2550000000015614 035 $a(SSID)ssj0000446854 035 $a(PQKBManifestationID)11297757 035 $a(PQKBTitleCode)TC0000446854 035 $a(PQKBWorkID)10505189 035 $a(PQKB)11469182 035 $a(DE-He213)978-3-642-14597-1 035 $a(MiAaPQ)EBC3065513 035 $a(PPN)149072651 035 $a(EXLCZ)992550000000015614 100 $a20100709d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTrusted Systems $eFirst International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings /$fedited by Liqun Chen, Moti Yung 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIV, 263 p. 64 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v6163 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-14596-5 320 $aIncludes bibliographical references and index. 327 $aInvited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains ? Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis. 330 $aThis volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services and applications, from their fundamental features and functionalities to design principles, architecture and implementation technologies. The goal of the conference was to bring academic and industrial researchers, designers and implementers together with end-users of trusted systems, in order to foster the exchange of ideas in this challenging and fruitful area. The program consisted of 3 invited talks and 20 contributed papers. The - vited speakerswere Wenchang Shi (Renmin Universityof China), DavidWooten (Microsoft) and Scott Rotondo (Sun Microsystems). The ?rst speaker provided a paper, which is included in these proceedings. Special thanks are due to these speakers. The contributed talks were arranged with two main tracks, one devoted to academic aspects of trusted computing systems (addressed by these proce- ings), and the other devoted to industrial aspects. The contributed papers were selected out of 42 submissions from 13 countries. The refereeing process was rigorous, involving at least three (and mostly more) independent reports being prepared for each submission. We are very grateful to our hard-working and distinguished Program Committee for doing such an excellent job in a timely fashion. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v6163 606 $aComputer science 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing$xManagement 606 $aAlgorithms 606 $aComputers and civilization 606 $aTheory of Computation 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aComputers and Society 615 0$aComputer science. 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing$xManagement. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 14$aTheory of Computation. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aComputers and Society. 676 $a005.8 701 $aChen$b Liqun$0720720 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484457503321 996 $aTrusted systems$94198718 997 $aUNINA