language constructs
Recently Published Documents


TOTAL DOCUMENTS

197
(FIVE YEARS 39)

H-INDEX

13
(FIVE YEARS 1)

2021 ◽  
Vol 27 (2) ◽  
Author(s):  
Stefan Hanenberg ◽  
Nils Mehlhorn

AbstractIn Java, lambda expressions (LEs) were introduced at a time where the similar language construct anonymous inner class (AIC) already existed for years. But while LEs became quite popular in mainstream programming languages in general, their usability is hardly studied. From the Java perspective the need to study the relationship between LEs and AICs was and is quite obvious, because both language constructs co-exist. However, it is quite usual that new language constructs are introduced although they are not or hardly studied using scientific methods – and an often heard argument from programming language designers is that the effort or the costs for the application of the scientific method on language constructs is too high. The present paper contributes in two different ways. First, with respect to LEs in comparison to AICs, this paper presents two N-of-1 studies (i.e. randomized control trials executed on a single subject) where LEs and AICs are used as listeners in Java code. Both experiments had two similar and rather simple tasks (“count the number of parameters”, respectively “count the number of used parameters”) with the dependent variable being reaction time. The first experiment used the number of parameters, the second the number of used parameters as the controlled, independent variable (in addition to the technique LE and AIC). Other variables (LOC, etc.) were randomly generated within given boundaries. The main result of both experiments is that LEs without type annotations require less reading time (p hs .2, reduction of reaction time of at most 35%). The results are based on 9,600 observations (one N-of-1 trial with eight replications). This gives evidence that the readability of LEs without type annotations improves the readability of code. However, the effect seems to be so small, that we do not expect this to have a larger impact on daily programming. Second, we see the contribution of this paper in the application of N-of-1 trials. Such experiments require relatively low effort in the data selection but still permit to analyze results in a non-subjective way using commonly accepted analysis techniques. Additionally, they permit to increase the number of selected data points in comparison to traditional multi–subject experiments. We think that researchers should take such experiments into account before planning and executing larger experiments.


Social media is one of the most influential tool for sharing information across different regions among different users .The people sharing their interests in various aspects in online social networking platforms like Facebook, twitter etc. Therefore the usage of hate text steadily increasing. Nowadays it has been reviled unfair behavior of the users in social networking sites. The existence of abusive text on different online social networking platforms and identification of such text is a big challenging task. To understand the complexity of language constructs in different languages is very difficult .Already lot of research work has completed in English language. This paper gives detail analysis of detecting hate text in various languages Hindi, urdu, Arabic, Bengali, Telugu. We incorporated various kinds of ML and DL based algorithms to identify hate text in OSN’s. A review is done related to different classifiers where a comparison made between different models of ML, DL algorithms. Finally finds the accurate method to classify the text is offensive or not by finding the parameters i.e. accuracy and F1score


2021 ◽  
Author(s):  
Yuxuan Jing ◽  
Rami M. Younis

Abstract Automatic differentiation software libraries augment arithmetic operations with their derivatives, thereby relieving the programmer of deriving, implementing, debugging, and maintaining derivative code. With this encapsulation however, the responsibility of code optimization relies more heavily on the AD system itself (as opposed to the programmer and the compiler). Moreover, given that there are multiple contexts in reservoir simulation software for which derivatives are required (e.g. property package and discrete operator evaluations), the AD infrastructure must also be adaptable. An Operator Overloading AD design is proposed and tested to provide scalability and computational efficiency seemlessly across memory- and compute-bound applications. This is achieved by 1) use of portable and standard programming language constructs (C++17 and OpenMP 4.5 standards), 2) adopting a vectorized programming interface, 3) lazy evaluation via expression templates, and 4) multiple memory alignment and layout policies. Empirical analysis is conducted on various kernels spanning various arithmetic intensity and working set sizes. Cache- aware roofline analysis results show that the performance and scalability attained are reliably ideal. In terms of floapting point operations executed per second, the performance of the AD system matches optimized hand-code. Finally, the implementation is benchmarked using the Automatically Differentiable Expression Templates Library (ADETL).


2021 ◽  
Vol 5 (ICFP) ◽  
pp. 1-24
Author(s):  
Xuejing Huang ◽  
Bruno C. d. S. Oliveira

Subtyping with intersection and union types is nowadays common in many programming languages. From the perspective of logic, the subtyping problem is essentially the problem of determining logical entailment : does a logical statement follow from another one? Unfortunately, algorithms for deciding subtyping and logical entailment with intersections, unions and various distributivity laws can be highly non-trivial. This functional pearl presents a novel algorithmic formulation for subtyping (and logical entailment) in the presence of various distributivity rules between intersections, unions and implications (i.e. function types). Unlike many existing algorithms which first normalize types and then apply a subtyping algorithm on the normalized types, our new subtyping algorithm works directly on source types. Our algorithm is based on two recent ideas: a generalization of subtyping based on the duality of language constructs called duotyping ; and splittable types , which characterize types that decompose into two simpler types. We show that our algorithm is sound, complete and decidable with respect to a declarative formulation of subtyping based on the minimal relevant logic B + . Moreover, it leads to a simple and compact implementation in under 50 lines of functional code.


2021 ◽  
Author(s):  
Torgeir E. Fjaertoft

<p>The methodology of this article works with the standard procedure in diplomatic fact-finding and analyses, <i>abductive reasoning</i> from confidential conversations. The article follows the standard procedure for drawing on confidential conversations, <i>Chatham House Rule,</i> abbreviated <i>CHR.</i> What someone says may be quoted, but the identity of sources and their affiliated institutions remain confidential. </p> <p>The author denotes this methodology <i>exploratory conversation, </i>inferring by active listening. This article presents the author’s research by exploratory conversations in all four states that form the Middle East state system, Turkey, Iran, Saudi Arabia, and Turkey, and sources from these states at various international venues. The conversations span the period from 2011 to 2017. </p> <p>By this methodology, the researcher may gain insights into the underlying <i>mental models</i> that form the group identities. In mental models, language constructs the shared sense of social reality and serve as <i>repository of vast accumulations of meaning and experience</i>.</p> <div><br> <hr> <div> <p><br></p></div> </div>


2021 ◽  
Author(s):  
Torgeir E. Fjaertoft

<p>The methodology of this article works with the standard procedure in diplomatic fact-finding and analyses, <i>abductive reasoning</i> from confidential conversations. The article follows the standard procedure for drawing on confidential conversations, <i>Chatham House Rule,</i> abbreviated <i>CHR.</i> What someone says may be quoted, but the identity of sources and their affiliated institutions remain confidential. </p> <p>The author denotes this methodology <i>exploratory conversation, </i>inferring by active listening. This article presents the author’s research by exploratory conversations in all four states that form the Middle East state system, Turkey, Iran, Saudi Arabia, and Turkey, and sources from these states at various international venues. The conversations span the period from 2011 to 2017. </p> <p>By this methodology, the researcher may gain insights into the underlying <i>mental models</i> that form the group identities. In mental models, language constructs the shared sense of social reality and serve as <i>repository of vast accumulations of meaning and experience</i>.</p> <div><br> <hr> <div> <p><br></p></div> </div>


Author(s):  
Matthew Purver ◽  
Mehrnoosh Sadrzadeh ◽  
Ruth Kempson ◽  
Gijs Wijnholds ◽  
Julian Hough

AbstractDespite the incremental nature of Dynamic Syntax (DS), the semantic grounding of it remains that of predicate logic, itself grounded in set theory, so is poorly suited to expressing the rampantly context-relative nature of word meaning, and related phenomena such as incremental judgements of similarity needed for the modelling of disambiguation. Here, we show how DS can be assigned a compositional distributional semantics which enables such judgements and makes it possible to incrementally disambiguate language constructs using vector space semantics. Building on a proposal in our previous work, we implement and evaluate our model on real data, showing that it outperforms a commonly used additive baseline. In conclusion, we argue that these results set the ground for an account of the non-determinism of lexical content, in which the nature of word meaning is its dependence on surrounding context for its construal.


Author(s):  
Taher Ahmed Ghaleb ◽  
Khalid Aljasser ◽  
Musab A. Alturki

Design patterns are generic solutions to common programming problems. Design patterns represent a typical example of design reuse. However, implementing design patterns can lead to several problems, such as programming overhead and traceability. Existing research introduced several approaches to alleviate the implementation issues of design patterns. Nevertheless, existing approaches pose different implementation restrictions and require programmers to be aware of how design patterns should be implemented. Such approaches make the source code more prone to faults and defects. In addition, existing design pattern implementation approaches limit programmers to apply specific scenarios of design patterns (e.g. class-level), while other approaches require scattering implementation code snippets throughout the program. Such restrictions negatively impact understanding, tracing, or reusing design patterns. In this paper, we propose a novel approach to support the implementation of software design patterns as an extensible Java compiler. Our approach allows developers to use concise, easy-to-use language constructs to apply design patterns in their code. In addition, our approach allows the application of design patterns in different scenarios. We illustrate our approach using three commonly used design patterns, namely Singleton, Observer and Decorator. We show, through illustrative examples, how our design pattern constructs can significantly simplify implementing design patterns in a flexible, reusable and traceable manner. Moreover, our design pattern constructs allow class-level and instance-level implementations of design patterns.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Bjørg Christiansen ◽  
Mirela Slomic

The aim of this study is to explore the negotiation of goals in team meetings with patients within a specialized rehabilitation context: What characterizes the dialogue between professionals and patients in goal meetings? Despite agreement in the literature that the patients’ perspectives and participation are significant in goal setting processes, there seem to be few studies on characteristics of the dialogue in such meetings with patients. The data derived from audio-recorded observations of three team meetings with various health care professionals and patients within rehabilitation services. The method can be characterized as a theme-oriented discourse analysis, which is a qualitative method for analyzing how language constructs professional practice. The analysis identifies two main themes: 1. Reviewing goals: from standardized readings to everyday language. 2. Setting meaningful goals. The article discusses characteristics of the patients´ participation in the dialogue, and how professionals de-emphasize inherent power inequalities in the negotiation of goals.


Sign in / Sign up

Export Citation Format

Share Document