LEADER 02477nam 2200577 450 001 9910787014103321 005 20230803205644.0 010 $a1-4438-6890-6 035 $a(CKB)3710000000261410 035 $a(EBL)1819153 035 $a(SSID)ssj0001407439 035 $a(PQKBManifestationID)11801367 035 $a(PQKBTitleCode)TC0001407439 035 $a(PQKBWorkID)11410489 035 $a(PQKB)10820840 035 $a(Au-PeEL)EBL1819153 035 $a(CaPaEBR)ebr10955490 035 $a(CaONFJC)MIL652867 035 $a(OCoLC)893739549 035 $a(FINmELB)ELB149666 035 $a(MiAaPQ)EBC1819153 035 $a(EXLCZ)993710000000261410 100 $a20141031h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aConstraints and language /$fedited by Philippe Blache [and four others] 210 1$aNewcastle upon Tyne, England :$cCambridge Scholars Publishing,$d2014. 210 4$dİ2014 215 $a1 online resource (325 p.) 300 $aDescription based upon print version of record. 311 $a1-4438-6052-2 311 $a1-322-21587-1 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aCONTENTS; LIST OF ILLUSTRATIONS; LIST OF TABLES; PREFACE; Part I; CHAPTER ONE; CHAPTER TWO; CHAPTER THREE; CHAPTER FOUR; Part II; CHAPTER FIVE; CHAPTER SIX; CHAPTER SEVEN; CHAPTER EIGHT; CHAPTER NINE; CHAPTER TEN; Part III; CHAPTER ELEVEN; CHAPTER TWELVE; CONTRIBUTORS; INDEX 330 $aThe concept of ""constraint"" is widely used in linguistics, computer science, and psychology. However, its implementation varies widely depending on the research domain: namely, language description, knowledge representation, cognitive modelling, and problem solving. These various uses of constraints offer complementary views on intelligent mechanisms. For example, in-depth descriptions implementing constraints are used in linguistics to filter out syntactic or discursive structures by means o... 606 $aComputational linguistics 606 $aConstraints (Linguistics) 615 0$aComputational linguistics. 615 0$aConstraints (Linguistics) 676 $a410.285 702 $aBlache$b Philippe 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910787014103321 996 $aConstraints and language$93769890 997 $aUNINA LEADER 02262nam 2200625 450 001 9910814522903321 005 20230126204615.0 010 $a1-61376-298-4 035 $a(CKB)2560000000305218 035 $a(EBL)4533190 035 $a(SSID)ssj0001266223 035 $a(PQKBManifestationID)11725571 035 $a(PQKBTitleCode)TC0001266223 035 $a(PQKBWorkID)11249621 035 $a(PQKB)11465259 035 $a(MiAaPQ)EBC4533190 035 $a(OCoLC)896890094 035 $a(MdBmJHUP)muse33336 035 $a(Au-PeEL)EBL4533190 035 $a(CaPaEBR)ebr11214658 035 $a(OCoLC)951222932 035 $a(EXLCZ)992560000000305218 100 $a20160612h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBeyond the checkpoint $evisual practices in America's global war on terror /$fRebecca A. Adelman 210 1$aAmherst, [Massachusetts] ;$aBoston, [Massachusetts] :$cUniversity of Massachusetts Press,$d2014. 210 4$dİ2014 215 $a1 online resource (288 p.) 300 $aIncludes index. 311 $a1-62534-069-9 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Contents; Acknowledgments; Introduction. The Shadow Rules of Engagement; One. Illuminating; Two. Dimensional; Three. Diagnostic; Four. Temporal; Five. Juridical; Conclusion. Other Destinations; Notes; Index; About the Author; Back Cover 606 $aTerrorism$zUnited States$xPrevention$xSocial aspects 606 $aWar on Terrorism, 2001-2009$xSocial aspects 606 $aWar on Terrorism, 2001-2009, in mass media 606 $aVisual communication 606 $aVisual sociology 615 0$aTerrorism$xPrevention$xSocial aspects. 615 0$aWar on Terrorism, 2001-2009$xSocial aspects. 615 0$aWar on Terrorism, 2001-2009, in mass media. 615 0$aVisual communication. 615 0$aVisual sociology. 676 $a363.325/160973 700 $aAdelman$b Rebecca A.$01648296 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910814522903321 996 $aBeyond the checkpoint$94078936 997 $aUNINA