scholarly journals Facing interfaces A clustering approach to grammaticalization and related changes

2014 ◽  
Vol 48 (2) ◽  
Author(s):  
Muriel Norde ◽  
Karin Beijering

AbstractIt has long been recognized that many instances of change that have been discussed within the framework of grammaticalization studies notoriously defy categorization, for instance because they share properties of grammaticalization and lexicalization (Brinton & Traugott 2005), or because they share some properties of grammaticalization, but not all of them, as in the case of discourse markers (e.g. Ocampo 2006). In order to avoid these classification issues, we will argue that it is more useful to reduce grammaticalization and related changes to their “main mechanisms” (formal reanalysis and semantic reinterpretation), “primitive changes” (micro-changes on the levels of phonology, morphology, syntax, semantics and/or discourse), and “side effects” (e.g. obligatorification or layering). In grammaticalization and related changes, formal reanalysis and semantic reinterpretation tend to coincide with different sets of primitive changes. Primitive changes will be defined as ternary parameters with the values reduction, expansion, or zero, and it will be seen that they tend to cluster in different ways. Some of these clusters may coincide with changes traditionally labeled “grammaticalization”, “degrammaticalization”, or “lexicalization”, but changes may also cluster in alternative ways. This novel approach to composite changes we term the “clustering approach”, and we aim to show that this model of analysis allows for a more fine-grained account of composite changes than definition-based taxonomies.

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1280
Author(s):  
Hyeonseok Lee ◽  
Sungchan Kim

Explaining the prediction of deep neural networks makes the networks more understandable and trusted, leading to their use in various mission critical tasks. Recent progress in the learning capability of networks has primarily been due to the enormous number of model parameters, so that it is usually hard to interpret their operations, as opposed to classical white-box models. For this purpose, generating saliency maps is a popular approach to identify the important input features used for the model prediction. Existing explanation methods typically only use the output of the last convolution layer of the model to generate a saliency map, lacking the information included in intermediate layers. Thus, the corresponding explanations are coarse and result in limited accuracy. Although the accuracy can be improved by iteratively developing a saliency map, this is too time-consuming and is thus impractical. To address these problems, we proposed a novel approach to explain the model prediction by developing an attentive surrogate network using the knowledge distillation. The surrogate network aims to generate a fine-grained saliency map corresponding to the model prediction using meaningful regional information presented over all network layers. Experiments demonstrated that the saliency maps are the result of spatially attentive features learned from the distillation. Thus, they are useful for fine-grained classification tasks. Moreover, the proposed method runs at the rate of 24.3 frames per second, which is much faster than the existing methods by orders of magnitude.


Author(s):  
Qianqian Fan ◽  
Guo Bao ◽  
Dongfeng Ge ◽  
Kun Wang ◽  
Mingming Sun ◽  
...  

2021 ◽  
Vol 5 (OOPSLA) ◽  
pp. 1-30
Author(s):  
Son Tuan Vu ◽  
Albert Cohen ◽  
Arnaud De Grandmaison ◽  
Christophe Guillon ◽  
Karine Heydemann

Software protections against side-channel and physical attacks are essential to the development of secure applications. Such protections are meaningful at machine code or micro-architectural level, but they typically do not carry observable semantics at source level. This renders them susceptible to miscompilation, and security engineers embed input/output side-effects to prevent optimizing compilers from altering them. Yet these side-effects are error-prone and compiler-dependent. The current practice involves analyzing the generated machine code to make sure security or privacy properties are still enforced. These side-effects may also be too expensive in fine-grained protections such as control-flow integrity. We introduce observations of the program state that are intrinsic to the correct execution of security protections, along with means to specify and preserve observations across the compilation flow. Such observations complement the input/output semantics-preservation contract of compilers. We introduce an opacification mechanism to preserve and enforce a partial ordering of observations. This approach is compatible with a production compiler and does not incur any modification to its optimization passes. We validate the effectiveness and performance of our approach on a range of benchmarks, expressing the secure compilation of these applications in terms of observations to be made at specific program points.


2013 ◽  
Author(s):  
Vinu Krishnan ◽  
Xian Xu ◽  
Sonali Barwe ◽  
Xiaowei Yang ◽  
Scott A. Waldman ◽  
...  

2017 ◽  
Vol 22 (2) ◽  
pp. 242-269 ◽  
Author(s):  
Ludivine Crible

Abstract While discourse markers (DMs) and (dis)fluency have been extensively studied in the past as separate phenomena, corpus-based research combining large-scale yet fine-grained annotations of both categories has, however, never been carried out before. Integrating these two levels of analysis, while methodologically challenging, is not only innovative but also highly relevant to the investigation of spoken discourse in general and form-meaning patterns in particular. The aim of this paper is to provide corpus-based evidence of the register-sensitivity of DMs and other disfluencies (e.g. pauses, repetitions) and of their tendency to combine in recurrent clusters. These claims are supported by quantitative findings on the variation and combination of DMs with other (dis)fluency devices in DisFrEn, a richly annotated and comparable English-French corpus representative of eight different interaction settings. The analysis uncovers the prominent place of DMs within (dis)fluency and meaningful association patterns between forms and functions, in a usage-based approach to meaning-in-context.


2020 ◽  
Author(s):  
Yann Ehinger ◽  
Ziyang Zhang ◽  
Khanhky Phamluong ◽  
Drishti Soneja ◽  
Kevan M. Shokat ◽  
...  

AbstractAlcohol Use Disorder (AUD) is a devastating psychiatric disorder affecting a large portion of the population. Unfortunately, efficacious medications to treat the disease are limited and thus AUD represents an area of unmet medical need. mTORC1 plays a crucial role in neuroadaptations underlying alcohol use. mTORC1 also contributes to alcohol craving, habit, and relapse. Thus, mTORC1 inhibitors are promising therapeutic agents to treat AUD. However, chronic inhibition of mTORC1 in the periphery produces undesirable side effects in humans, which limit their potential clinical use for the treatment of AUD. To overcome these limitations, we utilized a binary drug strategy in which mice were co-administered the mTORC1 inhibitor RapaLink-1 together with a novel small molecule (RapaBlock) to protect mTORC1 activity in the periphery. We show that the dual administration of RapaLink-1 with RapaBlock, abolishes RapaLink-1-dependent mTORC1 inhibition in the liver and blocks adverse side effects detected in humans including body weight loss, glucose intolerance and liver toxicity. Importantly, we show that co-administration of RapaLink-1 and RapaBlock inhibits alcohol-dependent mTORC1 activation in the Nucleus Accumbens and robustly moderates the level of alcohol use. Our data present a novel approach that could be used to treat individuals suffering from AUD.


2020 ◽  
Vol 12 ◽  
Author(s):  
Tanya Lugani ◽  
Manju Nagpal ◽  
Deepinder Singh Malik ◽  
Ameya Sharma ◽  
Vivek Puri ◽  
...  

Acne is a chronic disease associated with pilosebaceous unit and is affected by Propionibacterium acnes bacteria. Approximately 95% of people worldwide suffer from acne in their life span with a higher prevalence among teenagers (esp. boys). Conventional strategies incorporating antibiotics, steroid, hormones, etc. is recommended orally, systemically or topically, employed for the treatment of acne which shows various side effects (itching, scaling, redness, etc.) and is no more commercially accepted. The literature has been collected using various search engines google scholar, pubmed, science direct etc. The review highlights history of acne, its pathophysiology, developmental factors, various treatment evolutions strategies ranging from conventional to novel approach eradicating the secondary effects with enhanced efficacy and safety profile. We concluded various nanotechnological carriers (liposomes, niosomes, solid lipid nanoparticles, nanostructured lipid carriers, microsponges and other nanoscale formulations) which are formulated in last decade for effective treatment of acne. Patent literature and marketed formulations are included in last sections. Encapsulation efficiency of anti-acne drugs in different nanocarriers improves the efficacy as well as minimizes the side effects of drug. These carriers showed better bioavailability as well as better penetration effects even to pilosebaceous unit of the skin. Tolerance can be improved by increasing the concentration of anti-acne drug in the nano-carrier formulation. Conventional treatment strategies for acne had some limitations like scaling, itching, inflammation which can be overcome by nano-formulations which exhibits better efficacy. In present, various nano-technological carriers are working potentially for the treatment of the acne. These nano-formulations are also associated with some limitations like drug entrapment, stability issues but these will be overcome in the upcoming years as long as research is being continued in this area.


Author(s):  
Krzysztof Walczak

This chapter describes a novel approach to building 3D web applications, called Flex-VR, which can be used a basis for implementing security solutions. Two key elements of the approach are described: scene structuralization and content modeling. The scene structuralization enables decomposition of a 3D scene into independent geometrical and behavioral objects, called VR-Beans. Virtual scenes with rich interactivity and behavior can be dynamically created by combining sets of independent VR-Beans. The second element – the content model – is a generalized high-level description of the application content. The model enables efficient manipulation of content elements and dynamic composition of virtual scenes. Flex-VR provides a fine-grained semantically-rich content structure, which can be used as a basis for defining access privileges for users and groups. Five levels of user privileges definition in the Flex-VR approach are described. An application of Flex-VR in the cultural heritage domain is presented. Examples demonstrate how user privileges can be defined at all levels.


Sign in / Sign up

Export Citation Format

Share Document