Narrow your search

Library

KU Leuven (6)

UAntwerpen (5)

UGent (4)

VUB (3)

UCLouvain (2)

ULB (2)

IMEC (1)

KBR (1)

KDG (1)

Thomas More Mechelen (1)

More...

Resource type

book (6)


Language

English (4)

Dutch (2)


Year
From To Submit

2014 (2)

2002 (1)

2001 (1)

1997 (1)

1984 (1)

Listing 1 - 6 of 6
Sort by

Book
Corpus interrogation and grammatical patterns
Authors: --- ---
ISBN: 9789027203717 9789027269744 9027203717 9027269742 1322317364 Year: 2014 Volume: 63 Publisher: Amsterdam, Netherlands ; Philadelphia, Pennsylvania : John Benjamins Publishing Company,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This article proposes a classification of speech functions of variable tag questions in British English conversations. Based on intonational, conversational and formal criteria the analysis shows that tag questions can not only function as questions and statements, but also as responses, commands and offers. A large group of tag questions cannot be captured by any of the traditional speech functions and are classified instead as Statement-Question blends. The article investigates the impact of the LLC and COLT corpora, and features such as gender, age and social roles, on the distribution of t


Book
Pragmatics of tense and time in news : from canonical headlines to online news texts
Author:
ISBN: 9789027256584 9027256586 1322317372 9027269327 Year: 2014 Publisher: Amsterdam, Netherlands ; Philadelphia, Pennsylvania : John Benjamins Publishing Company,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book provides the first comprehensive account of temporal deixis in English printed and online news texts. Linking the characteristic usage of tenses with the projection of deictic centres, it notes how conventional tenses, particularly in headlines, are affected by heteroglossia arising from various accessed voices. The resulting tense shifts are interpreted pragmatically as a conventional reader-oriented strategy that creates the impression of temporal co-presence. It is argued that since different tense choices systematically correlate with the three main textual segments of news texts

Introduction to cryptography
Author:
ISBN: 0387950346 1468404989 1468404962 9780387950341 Year: 2001 Publisher: New York (N.Y.): Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. About the first edition: It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." -Neal Koblitz, The American Mathematical Monthly.

Handbook of applied cryptography
Authors: --- ---
ISBN: 0849385237 9780849385230 1439821917 0429466331 Year: 1997 Publisher: London CRC

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.

Listing 1 - 6 of 6
Sort by