Filters








1,033,249 Hits in 2.5 sec

Page 247 of American Catholic Philosophical Quarterly Vol. 16, Issue 3 [page]

1942 American Catholic Philosophical Quarterly  
The demands for verifi- ability are therefore more stringent. ‘ An object is ‘ real’ if the object is intersubjective; more exactly, an object is real if (1) it belongs to a comprehensive, legitimately  ...  According to it, propositions about God, substance, and such, cannot be verified since these objects do not fulfill the conditions specified above.  ... 

Verifying cuts as a tool for improving a classifier based on a decision tree

Łukasz Dydo, Jan Bazan, Sylwia Buregwa-Czuma, Wojciech Rząsa, Andrzej Skowron
2016 Proceedings of the 2016 Federated Conference on Computer Science and Information Systems  
Till now only one strategy of choosing verifying cuts was examined. It exploits a measure based on a number of pairs of objects discerned by a chosen cut.  ...  This article is a continuation of previous work, in which a new method of decision tree construction was presented.  ...  In this paper two another techniques of verifying cuts construction based on the Entropy and the Gini's Index are tested.  ... 
doi:10.15439/2016f266 dblp:conf/fedcsis/DydoBBRS16 fatcat:v4piotzu35ayviyljqxduu47ae

Appraising the value of independent EIA follow-up verifiers

Jan-Albert Wessels, Francois Retief, Angus Morrison-Saunders
2015 Environmental impact assessment review  
This paper aims to appraise how and to what extent independent EIA follow-up verifiers add value in major construction projects in the developing country context of South Africa.  ...  Independent Environmental Impact Assessment (EIA) follow-up verifiers such as monitoring agencies, checkers, supervisors and control officers are active on various construction sites across the world.  ...  These include objectives of Sustainable Construction and EIA follow-up; objectives of the ECO code of practice; NEMA's Integrated Environmental Management (IEM) objectives, and the objectives contained  ... 
doi:10.1016/j.eiar.2014.10.004 fatcat:yrtya3qie5bxnfda3bqoucumwe

Continuous k Nearest Neighbor Queries over Large-Scale Spatial–Textual Data Streams

Rong Yang, Baoning Niu
2020 ISPRS International Journal of Geo-Information  
Such a system is usually subscribed with millions of CkQST and evaluated simultaneously whenever new objects arrive and old objects expire.  ...  , to reduce the re-evaluation cost due to the expiration of objects.  ...  objects being verified with block b bid and containing w.  ... 
doi:10.3390/ijgi9110694 fatcat:vzl5whxxzve4ldcyozgscrukwe

Page 450 of MIND Vol. 26, Issue 104 [page]

1917 MIND  
Russell’s thesis is that in so far as physics is verifiable, it is possible to give an interpretation of the proposi- tions of physics in terms of objects given in experience.  ...  Russell’s only plan is to exhibit these objects as logical constructions of objects given in experience. The propositions in question can- not, I think, be called “impure” propositions in Prof.  ... 

Page 355 of The Philosophical Review Vol. 57, Issue 4 [page]

1948 The Philosophical Review  
Constructs, therefore, cannot be substituted for hypotheses, and the problem of the conjectural char- acter of philosophical objects remains unsolved.  ...  their existence ; hence molecules are incom- pletely reducible to their verifying cases.  ... 

Page 355 of American Philosophical Association: Proceedings and Addresses Vol. 21, Issue [page]

1947 American Philosophical Association: Proceedings and Addresses  
Constructs, therefore, cannot be substituted for hypotheses, and the problem of the conjectural char- acter of philosophical objects remains unsolved.  ...  their existence; hence molecules are incom- pletely reducible to their verifying cases.  ... 

Healthcare Information Management System in Home Environment [chapter]

Chang Won Jeong, Chung Sub Lee, Su Chong Joo
2007 Lecture Notes in Computer Science  
Finally, for verifying the practical use of healthcare information constructed in this paper, we show an example of healthcare home monitoring service using information, emergency call, home appliance  ...  Our researching focus in this paper is how to design system and how to use constructed database on the framework for supporting healthcare home services.  ...  From these environments, we verify the executbility of the healthcare home services we constructed.  ... 
doi:10.1007/978-3-540-72588-6_30 fatcat:mevhdxs3xbf3dhwsvyqqtbvpeq

Page 145 of The Philosophical Review Vol. 43, Issue 2 [page]

1934 The Philosophical Review  
As know- able things, myself and yourself are equally constructions; and though as constructed objects they are fundamentally different in kind, the constructions are codrdinate.  ...  EXPERIENCE AND MEANING 145 own-self or yourself as particular objects of knowledge.  ... 

Class properties for security review in an object-capability subset of Java

Adrian Mettler, David Wagner
2010 Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security - PLAS '10  
We explore several semantic properties of classes relating to immutability and object identity that can be declared by the programmer and are checked by the Joe-E verifier.  ...  Joe-E is a subset of the Java language, with additional restrictions enforced by a static source-code verifier.  ...  A sufficiently rich type system can help with this goal: programmers can document the properties of objects through annotations on their types, and an appropriately constructed static code verifier can  ... 
doi:10.1145/1814217.1814224 dblp:conf/pldi/MettlerW10 fatcat:rdxf3f6twnallhli3qmy4xoigi

Copyright Protection Protocols Based on Asymmetric Watermarking [chapter]

Scott Craver, Stefan Katzenbeisser
2001 IFIP Advances in Information and Communication Technology  
A construction of such a scheme is given, which uses scrambled documents and so-called ownership tickets in the watermark verification process.  ...  By using the permutation ai to construct the ownership ticket, the verifier can be fooled in case (i).  ...  However, if the verifier asks him to open the first commitment, we will have := a; 1 (T(G)) =1-Gi; thus, the reconstructed object will differ from the true object Gi.  ... 
doi:10.1007/978-0-387-35413-2_15 fatcat:nipjnzaouvhtje7rb5c6snuyk4

Integrity Checking for Aggregate Queries

Somayeh Dolatnezhad Samarin, Morteza Amini
2021 IEEE Access  
The aggregator computes the results (V f ) and creates a verification object (V O) for verifying the authenticity of them and sends the results and the verification object to the verifier.  ...  The verifier verifies the authenticity of the results by checking the verification object using the verification key.  ... 
doi:10.1109/access.2021.3079799 fatcat:r2oqabnbnvgopofd24omlsp754

RESEARCH OF DOCUMENT DATA IDENTITY VERIFICATION SYSTEM USING SEMANTIC INFORMATION

Masanori Ikebe, Shigenori Tanaka, Hitoshi Furuta, Kenji Nakamura
2006 journal of Civil Engineering Information Processing System  
The substantial difference between documents is extracted by analyzing meaning information using the natural-language processing, and the identity is verified.  ...  In electronic delivery of engineering works and construction fields, the standard is settled and the base is adequately maintained by the initiative of the Ministry of Land, Infrastructure and Transport  ...  In this experiment, 2 documents were read, and added/deleted objects and revised objects were verified using the function of verifying identical parts.  ... 
doi:10.2208/journalac2003.15.0_271 fatcat:2inkoynglzawpjf3es6wtfobgm

Environmental Effect of Major Project: Object-Oriented Information Extraction and Schedule-Oriented Monitoring [chapter]

Zhuowei Hu, Hongqi Liu, Lai Wei
2012 Social Sciences and Cultural Studies - Issues of Language, Public Opinion, Education and Welfare  
Meanwhile, the knowledge base of object characteristics to extract the information from the image is used.  ...  Object-oriented method is not analysis the target by single pixel, but by a collection of pixel in the image.  ...  There are 2 main part of the project's verified points; 6 accessory project's verified points; 3 roads verified points; 1 grassland verified point; 3 construction land verified points.  ... 
doi:10.5772/49989 fatcat:jzuy3utc3neqlj25qhczoomkv4

Fulfilling Secure, General, and Fine-Grained Question happen Affirmation for Secure Interest Plot over Mixed Cloud Data

S. Anitha
2019 International Journal for Research in Applied Science and Engineering Technology  
We achieve the goal by constructing secure verification object for encrypted cloud data.  ...  the query user to securely obtain the desired verification object.  ...  Upon receiving these data, the data user first checks the authenticity of verification objects and then continued to verify query results according to the verification objects if verification objects pass  ... 
doi:10.22214/ijraset.2019.4533 fatcat:ym3whe6dy5eetirynm5343qin4
« Previous Showing results 1 — 15 out of 1,033,249 results