LEADER 03302nam 2200757Ia 450 001 9910962695103321 005 20200520144314.0 010 $a9786612255328 010 $a9781423766421 010 $a1423766423 010 $a9789027295934 010 $a902729593X 010 $a9781282255326 010 $a1282255320 024 7 $a10.1075/slcs.65 035 $a(CKB)1000000000004172 035 $a(SSID)ssj0000182216 035 $a(PQKBManifestationID)11169824 035 $a(PQKBTitleCode)TC0000182216 035 $a(PQKBWorkID)10166712 035 $a(PQKB)10039922 035 $a(SSID)ssj0000280920 035 $a(PQKBManifestationID)12087237 035 $a(PQKBTitleCode)TC0000280920 035 $a(PQKBWorkID)10300245 035 $a(PQKB)23379046 035 $a(MiAaPQ)EBC622711 035 $a(Au-PeEL)EBL622711 035 $a(CaPaEBR)ebr10046627 035 $a(OCoLC)55663741 035 $a(DE-B1597)720794 035 $a(DE-B1597)9789027295934 035 $a(EXLCZ)991000000000004172 100 $a20030228d2003 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntonation units in Japanese conversation $esyntactic, informational and functional structures /$fKazuko Matsumoto 205 $a1st ed. 210 $aAmsterdam $cBenjamins$d2003 215 $a1 online resource (xvi, 212 pages) 225 1 $aStudies in language companion series,$x0165-7763 ;$v65 300 $aBibliographic Level Mode of Issuance: Monograph 311 0 $a9789027230751 311 0 $a9027230757 311 0 $a9781588113641 311 0 $a1588113647 320 $aIncludes bibliographical references (p. [179]-189) and index. 327 $aIntonation Units in Japanese Conversation; Editorial page; Title page; LCC page; Dedication page; Table of contents; Preface; Tables and Figures; Transcription conventions; Abbreviations; Chapter 1 Introduction; Chapter 2 Information flow in spoken discourse; Chapter 3 Method of the study; Chapter 4 Syntactic structure of the intonation unit in conversational Japanese; Chapter 5 Information structure of the intonation unit in conversational Japanese; Chapter 6 Functional structure of the intonation unit in conversational Japanese; Chapter 7 Conclusion; Notes; References; Index 330 $aThis book explores how speakers of Japanese organize their messages into coherent units as they jointly and interactively construct conversational discourse. Specifically, it investigates the syntactic, informational, and functional structures of intonation units (IUs) as basic units of discourse production and information flow in spoken communication. 410 0$aStudies in language companion series ;$vv. 65. 606 $aJapanese language$xIntonation 606 $aJapanese language$xAccents and accentuation 615 0$aJapanese language$xIntonation. 615 0$aJapanese language$xAccents and accentuation. 676 $a495.6/16 700 $aMatsumoto$b Kazuko$f1955-$01800011 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910962695103321 996 $aIntonation units in Japanese conversation$94344450 997 $aUNINA LEADER 04871nam 22008895 450 001 9910483306803321 005 20251226203545.0 010 $a1-282-33187-6 010 $a9786612331879 010 $a3-642-03549-3 024 7 $a10.1007/978-3-642-03549-4 035 $a(CKB)1000000000761242 035 $a(EBL)450549 035 $a(OCoLC)437346671 035 $a(SSID)ssj0000296400 035 $a(PQKBManifestationID)11236261 035 $a(PQKBTitleCode)TC0000296400 035 $a(PQKBWorkID)10321767 035 $a(PQKB)10213812 035 $a(DE-He213)978-3-642-03549-4 035 $a(MiAaPQ)EBC450549 035 $a(MiAaPQ)EBC6416131 035 $a(PPN)136310966 035 $a(EXLCZ)991000000000761242 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFinancial Cryptography and Data Security $e13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers /$fedited by Roger Dingledine, Philippe Golle 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (389 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5628 300 $aDescription based upon print version of record. 311 08$a3-642-03548-5 320 $aIncludes bibliographical references. 327 $aEconomics of Information Security I -- Mitigating Inadvertent Insider Threats with Incentives -- Deterring Online Advertising Fraud through Optimal Payment in Arrears -- Anonymity and Privacy I -- Privacy-Preserving Information Markets for Computing Statistical Data -- Achieving Privacy in a Federated Identity Management System -- Data Hemorrhages in the Health-Care Sector -- Private Computation -- Solving Linear Programs Using Multiparty Computation -- Private Intersection of Certified Sets -- Privacy-Preserving Classifier Learning -- Economics of Information Security II -- Investments and Trade-offs in the Economics of Information Security -- Blue versus Red: Towards a Model of Distributed Security Attacks -- Authentication and Identification -- Optimised to Fail: Card Readers for Online Banking -- Expecting the Unexpected: Towards Robust Credential Infrastructure -- Optical DNA -- Panel -- Passwords: If We?re So Smart, Why Are We Still Using Them? -- Fraud Detection -- Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection -- Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing -- Detecting Denial of Service Attacks in Tor -- Auctions -- Cryptographic Combinatorial Securities Exchanges -- Cryptographic Combinatorial Clock-Proxy Auctions -- Secure Multiparty Computation Goes Live -- Anonymity and Privacy II -- Coercion Resistant End-to-end Voting -- Relations Among Privacy Notions. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Financial Cryptography and Data Security, FC 2009, held in Accra Beach, Barbados, in February 2009. The 20 revised full papers and 1 revised short papers presented together with 1 panel report and 1 keynote address were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on economics of information security, anonymity and privacy, private computation, authentication and identification, fraud detection and auctions. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5628 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aComputer networks 606 $aAlgorithms 606 $aCryptology 606 $aData and Information Security 606 $aIT Operations 606 $aComputers and Society 606 $aComputer Communication Networks 606 $aAlgorithms 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 0$aComputer networks. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aData and Information Security. 615 24$aIT Operations. 615 24$aComputers and Society. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 676 $a005.3 702 $aDingledine$b Roger$f1977- 702 $aGolle$b Philippe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483306803321 996 $aFinancial Cryptography and Data Security$92960333 997 $aUNINA