派博傳思國(guó)際中心

標(biāo)題: Titlebook: Metaphor Networks; The Comparative Evol Richard Trim Book 2007 Richard Trim 2007 cognition.diachronic.English.evolution.language.synchronic [打印本頁(yè)]

作者: SORB    時(shí)間: 2025-3-21 17:48
書目名稱Metaphor Networks影響因子(影響力)




書目名稱Metaphor Networks影響因子(影響力)學(xué)科排名




書目名稱Metaphor Networks網(wǎng)絡(luò)公開度




書目名稱Metaphor Networks網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Metaphor Networks被引頻次




書目名稱Metaphor Networks被引頻次學(xué)科排名




書目名稱Metaphor Networks年度引用




書目名稱Metaphor Networks年度引用學(xué)科排名




書目名稱Metaphor Networks讀者反饋




書目名稱Metaphor Networks讀者反饋學(xué)科排名





作者: LAVA    時(shí)間: 2025-3-21 20:40
Culture-specific Conceptualisatione the fascinating world of colour conceptualisation. These different issues demonstrate the powerful role of culturally-defined metaphoric language in contrast to the kinds of universal trends discussed in the previous chapter.
作者: 標(biāo)準(zhǔn)    時(shí)間: 2025-3-22 02:26

作者: Cytology    時(shí)間: 2025-3-22 07:44

作者: nutrition    時(shí)間: 2025-3-22 09:21
Book 2007 explores how the metaphors of today are very often linked to images existing in the past and traces metaphor paths back to the Middle Ages and Antiquity. The findings reveal that regular patters of evolution emerge and the aims of the book are to find out what lies behind these patterns.
作者: Bph773    時(shí)間: 2025-3-22 15:59

作者: heterodox    時(shí)間: 2025-3-22 20:57

作者: organism    時(shí)間: 2025-3-22 23:44

作者: Ingredient    時(shí)間: 2025-3-23 03:51
Historical Models of Love Metaphorsecome conventionalised or completely die out. Together with the theoretical aspects discussed in Parts I and II, we are now in a position to evaluate the way in which a specific diachronic network has evolved.
作者: 金絲雀    時(shí)間: 2025-3-23 08:13

作者: tattle    時(shí)間: 2025-3-23 13:11

作者: ANTE    時(shí)間: 2025-3-23 14:37

作者: bisphosphonate    時(shí)間: 2025-3-23 20:30
Historical Mindsetsthe African language, Hausa, however, ‘front’ is the side facing in the same direction as the observer. Either choice is compatible with human experience but the difference illustrates the fact that these two languages have quite a different perception of spatial orientation.
作者: Hemodialysis    時(shí)間: 2025-3-23 22:37

作者: Irrigate    時(shí)間: 2025-3-24 04:25
Richard Trimny called nPA. NFC-enabled smartphones and other NFC objects such as door locks have become widespread. Existing and future applications of the up-and-coming technology require a secure way of assigning and transporting user rights, e.g., for opening and starting a car or access control to a buildin
作者: Gingivitis    時(shí)間: 2025-3-24 07:56

作者: obeisance    時(shí)間: 2025-3-24 13:09
Richard Trimptimization: pick a target architecture, and minimize the cycle count and footprint of the ECC software. This paper addresses a different aspect of resource-constrained ECC implementation: given the application profile, identify the most suitable architecture parameters. At the highest level, an app
作者: Decongestant    時(shí)間: 2025-3-24 16:39

作者: ANN    時(shí)間: 2025-3-24 20:59
ptimization: pick a target architecture, and minimize the cycle count and footprint of the ECC software. This paper addresses a different aspect of resource-constrained ECC implementation: given the application profile, identify the most suitable architecture parameters. At the highest level, an app
作者: crease    時(shí)間: 2025-3-25 00:18
Richard Trimnce of counterfeit (cloned, forged, etc.) goods are two major challenges to address. As a result, owners, manufacturers, distributors, etc. are becoming more interested in approaches that facilitate greater visibility and enable traceability of products as they move through the supply chain. One pro
作者: 不可磨滅    時(shí)間: 2025-3-25 03:48

作者: 征稅    時(shí)間: 2025-3-25 10:22

作者: Console    時(shí)間: 2025-3-25 11:57

作者: 委屈    時(shí)間: 2025-3-25 16:50
Richard Trimnce of counterfeit (cloned, forged, etc.) goods are two major challenges to address. As a result, owners, manufacturers, distributors, etc. are becoming more interested in approaches that facilitate greater visibility and enable traceability of products as they move through the supply chain. One pro
作者: 欄桿    時(shí)間: 2025-3-25 21:05

作者: 植物學(xué)    時(shí)間: 2025-3-26 02:53
Richard Trimr. In order to obtain an accurate upper-bound, the computation time at the prover’s side should be as short as possible, which can be achieved by precomputing the responses and storing them in a lookup table. However, such lookup-based distance bounding protocols suffer from a trade-off between the
作者: 接觸    時(shí)間: 2025-3-26 06:17

作者: RUPT    時(shí)間: 2025-3-26 11:38
denoted as verifier and prover). These protocols typically combine physical properties of the communication channel with cryptographic challenge-response schemes. A key challenge to design secure DB protocols is to keep the time required by the prover to process the challenges and compute and transm
作者: 可觸知    時(shí)間: 2025-3-26 14:14

作者: 周興旺    時(shí)間: 2025-3-26 17:15

作者: 縮短    時(shí)間: 2025-3-26 22:43
Culture-specific Conceptualisatione for cross-language variation in metaphor. In the following discussion, we shall look at a number of major issues on the relevance of culture in metaphor creation before looking at culture-specific networking. We shall examine how linguists have tried to set up definitions of cultural models, the t
作者: 不在灌木叢中    時(shí)間: 2025-3-27 03:03

作者: jettison    時(shí)間: 2025-3-27 08:51
Cultural Patterns of the Pastpe, or why all the pebbles happen to be in the field, unless we go back into the past. Only the past geology of the rock formations will give us a clear idea as to why such landscape features exist. In many ways, the same applies to language and, in particular to metaphor. In this chapter, we shall
作者: 多樣    時(shí)間: 2025-3-27 09:33

作者: 止痛藥    時(shí)間: 2025-3-27 16:56

作者: 信徒    時(shí)間: 2025-3-27 19:27
Germanic Influences in Old EnglishS A JOURNEY model in Western society. Duration therefore varies enormously and it is difficult to categorise which metaphors are likely to last. At first sight, it may be assumed that long-lasting metaphors are similar to the types of universal features of basic concepts. This is very often true but
作者: 血友病    時(shí)間: 2025-3-28 00:35

作者: 轉(zhuǎn)折點(diǎn)    時(shí)間: 2025-3-28 05:06

作者: artifice    時(shí)間: 2025-3-28 08:55
The Evolution of Love Metaphors: a Case Studyse of translating texts from different historical periods, a number of different factors would have played a part in the types of metaphor images used. These involve social class, regional variants, the type of medium (whether it was written or spoken language and what kinds of particular written me
作者: Ventricle    時(shí)間: 2025-3-28 11:45
Latinate-based Origins in English Medieval Metaphording time zones. Poetry or narrative expressed through the medium of metaphor draws on other contemporary or preceding works of literature. The metaphors of love we have seen in Chaucer are a clear example of drawing on contemporary sources which have, in turn, drawn on other sources at an earlier p
作者: Encephalitis    時(shí)間: 2025-3-28 16:15

作者: Bridle    時(shí)間: 2025-3-28 21:20

作者: 對(duì)待    時(shí)間: 2025-3-29 02:08
ntroller-based ECC implementation. Second, we present a methodology to derive and optimize the architecture parameters starting from the application requirements. We demonstrate our methodology on a MSP430F5438A microcontroller, and present the energy/architecture design space for 80-bit and 128-bit
作者: OCTO    時(shí)間: 2025-3-29 04:11

作者: Visual-Acuity    時(shí)間: 2025-3-29 07:46
Richard Trim During the booking process, the phone operates as an RFID reader to interrogate the nPA of the user and utilizes the security mechanisms of the nPA, including the PACE protocol, for identifying the customer. After having obtained the credential, the smartphone emulates a Mifare DESFire card that is
作者: Dri727    時(shí)間: 2025-3-29 13:07
Richard Trimntroller-based ECC implementation. Second, we present a methodology to derive and optimize the architecture parameters starting from the application requirements. We demonstrate our methodology on a MSP430F5438A microcontroller, and present the energy/architecture design space for 80-bit and 128-bit
作者: Irritate    時(shí)間: 2025-3-29 17:38
Richard Trim During the booking process, the phone operates as an RFID reader to interrogate the nPA of the user and utilizes the security mechanisms of the nPA, including the PACE protocol, for identifying the customer. After having obtained the credential, the smartphone emulates a Mifare DESFire card that is
作者: Criteria    時(shí)間: 2025-3-29 22:56
ntroller-based ECC implementation. Second, we present a methodology to derive and optimize the architecture parameters starting from the application requirements. We demonstrate our methodology on a MSP430F5438A microcontroller, and present the energy/architecture design space for 80-bit and 128-bit
作者: debble    時(shí)間: 2025-3-30 02:18
Richard Trimolution specific to network devices (i.e., routers, modems, set-top boxes, video game consoles, home security devices, etc.) that addresses the security and management issues of their entire supply chain. By combining two techniques: one-to-one mapping between tag identity and control chip identity,
作者: 有惡意    時(shí)間: 2025-3-30 05:14
Richard Trimolution specific to network devices (i.e., routers, modems, set-top boxes, video game consoles, home security devices, etc.) that addresses the security and management issues of their entire supply chain. By combining two techniques: one-to-one mapping between tag identity and control chip identity,
作者: 削減    時(shí)間: 2025-3-30 10:21
Richard Trimolution specific to network devices (i.e., routers, modems, set-top boxes, video game consoles, home security devices, etc.) that addresses the security and management issues of their entire supply chain. By combining two techniques: one-to-one mapping between tag identity and control chip identity,
作者: angina-pectoris    時(shí)間: 2025-3-30 14:49





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
顺昌县| 兴海县| 城步| 项城市| 奉新县| 石泉县| 平远县| 会同县| 谢通门县| 阜康市| 哈密市| 万盛区| 孝昌县| 普陀区| 北票市| 吉安县| 平山县| 县级市| 鹤峰县| 泰和县| 新河县| 双桥区| 景谷| 高雄县| 贵溪市| 新竹市| 瑞安市| 中江县| 行唐县| 岱山县| 岑溪市| 包头市| 丰顺县| 乌鲁木齐县| 怀宁县| 清苑县| 陕西省| 航空| 托里县| 安龙县| 宜川县|