The paper presents some of the results obtained within a research project aimed at developing ET (English Tutor), an intelligent tutoring system which supports Italian students in learning the English verbs. We concentrate on one of the most important modules of the system, the domain (i.e. verb) expert which is devoted to generate, in a cognitively transparent way, the right tense for the verb(s) appearing in the exercises presented to the student. An example which highlights the main capabilities of the verb expert is provided. A prototype version of ET has been fully implemented. ...
Although ultimately intended functions include text generation (e.g., 4), present efforts focus on text analysis: developing the capability to take in essentially unconstrained business text and to output grammar and style critiques, on a sentence by sentence basis. Briefly, we use a large on-line dictionary and a bottom-up parser in connection with an Augmented Phrase Structure Grammar (5) to obtain an approximately correct structural description of the surface t e x t (e.g., we posit no transformations or recovery of deleted material to infer underlying "deep" structures). ...
Chapter 5 - Information systems concepts. After studying this chapter you will be able to: List and discuss, in order, the steps in the systems development life cycle; explain the advantages and disadvantages of using the SDLC; apply the SDLC in accounting contexts; list and discuss the levels of the capability maturity model; classify organizations' processes according to the CMM; explain factors managers should consider when choosing IT for an AIS.
Chapter 5 - Information systems concepts. When you've finished studying this chapter, and completing the activities at its conclusion, you should be able to: List and discuss, in order, the steps in the systems development life cycle; explain the advantages and disadvantages of using the SDLC; apply the SDLC in accounting contexts; list and discuss the levels of the capability maturity model; classify organizations' processes according to the CMM; explain factors managers should consider when choosing IT for an AIS.
CASE 1: Pizza Hut CASE 2: General Motors Corporation Introduction The Value Chain Primary Activities Support Activities Pizza Industry Value Chain Primary Activities Support Activities Automobile Industry Value Chain Primary Activities Support Activities The Value Chain as Part of a Business System Pizza Hut General Motors Capability Drivers First-Mover Status Scale of Operation Experience Interrelationships Assessing Competitive Advantage First-Mover Advantages Scale and Experience Advantages The Growth of the Internet and Competitive Advantage Diagnosing Pizza Hut’s Capabilities First-...
Ultra-Wideband Radio (UWB) earmarks a new radio access philosophy and exploits several GHz of bandwidth. It promises high data rate communication over short distances as well as innovative radar sensing and localization applications with unprecedented resolution. Fields of application may be found, among others, in industry, civil engineering, surveillance and exploration, for security and safety measures, and even for medicine.
The nowadays ubiquitous and effortless digital data capture and processing capabilities offered by the majority of devices, lead to an unprecedented penetration of multimedia content in our everyday life. To make the most of this phenomenon, the rapidly increasing volume and usage of digitised content requires constant re-evaluation and adaptation of multimedia methodologies, in order to meet the relentless change of requirements from both the user and system perspectives.
The use of intelligent materials which are capable of reacting to external stimuli is growing
in the field of textiles. Conductive materials, metals as well as conducting polymers, are
already being used in many textile applications, like antistatic materials, electromagnetic
interference shielding, heating, transport of electrical signals, sensors etc.
This book is intended to bring solution protein chemistry to proteomic technology
and to provide a different perspective from other review works. Proteomics, while
a diffuse area, is an extension of classical protein chemistry largely driven by major
advances in the analytical capability of mass spectrometry. The content assembles
together some disparate areas into a single volume. The author has also tried to use
as much classical protein chemistry literature as possible as this serves as the
intellectual basis for proteomics.
The questions posed in the task for this study are part of a very broad
and important set of issues for the Department of Defense. To answer them
required the Committee on Critical Technology Accessibility to develop its
own perspective about the context within which the questions could be
placed. As a result, this report provides judgments and recommendations
about both the specific questions and the broader context.
I wish to express my appreciation to the members of the committee for
their contributions to the preparation of this report.
Sound macroeconomic policy, responsive governance, a favorable business climate, and the
openness and accountability of institutions also affect outcomes for women (and men), but they
mostly operate beyond the influence of this Action Plan. Even so, the Plan can address some
aspects of the enabling environment for working women—such as the ability of women’s
organizations to reach a scale and sophistication where they are capable of articulating and
advocating policies to promote women’s economic empowerment.
With extensive experience, research-
based knowledge and the skills of
thousands of professionals across our
Global Delivery Network, Accenture
has a demonstrated ability and track
record of delivering measurable
improvements in business performance
through finance and accounting
BPO. We created the market with
our ground-breaking deal with BP
in 1991—a contract that has been
renewed multiple times—and
we continue to be acknowledged as
a leader by industry analysts.
NASA’s budget for fiscal year 2003 included funds to begin the Nuclear Systems Initiative focused on
research into and development of enhanced capabilities in the general areas of spacecraft power and propulsion
This report has been reviewed in draft form by individuals chosen for their diverse perspectives
and technical expertise, in accordance with procedures approved by the National Research Council’s
(NRC’s) Report Review Committee. The purpose of this independent review is to provide candid and
critical comments that will assist the institution in making its published report as sound as possible and to
ensure that the report meets institutional standards for objectivity, evidence, and responsiveness to the
In 2008 the National Leadership Computing Facility at Oak Ridge National
Laboratory will have a petaflop system in place. This system will have tens of
thousands of processors and petabytes of memory. This capability system will
focus on application problems that are so hard that they require weeks on the
full system to achieve breakthrough science in nanotechnology, medicine, and
Continued advances in information technologies are enabling a
growing number of physical devices to be imbued with computing
and communications capabilities. Aircraft, cars, household
appliances, cellular telephones, and health monitoring devices all contain
microprocessors that are being linked with other information processing
devices. Such examples represent only the very beginning of what is
possible. As microprocessors continue to shrink, wireless radios are also
becoming more powerful and compact.
National Defense University's Directorate of Advanced Concepts, Technologies and
Information Strategies (ACTIS) and School of Information Warfare and Strategy (SIWS)
are pleased to inaugurate a new series of publications by the National Defense University
Press intended to explore the evolving relationship between the law and information
The West, as we noted in the Introduction, relies heavily on
the Indian software industry, and thus on Indian stability;
China is capable of damaging the American and world econ-
omies by cashing in its huge dollar reserves; Russia is able to
stop a very large part of the gas supply to Europe. In 2007 we
witnessed a cyber attack on Estonia, launched either using the
capabilities of a state or by individuals acting anonymously.
While NATO lawyers tried to figure out whether this last
example constituted an attack according to Article 5, the EU
and NATO failed to rally to...
If a future crisis requires that a force be sent to defend Middle East oil supplies, as happened in 1990, the responsibility and risk will again fall almost entirely upon the United States, even though wealthy U.S. allies are more dependent on the oil. Because only the United States currently maintains the capability to defend common
This month’s issue marks the first time, at least to
my knowledge, that a topic such as artificial intelligence
has been discussed on a PHP publication.
AI is one of those topics most people talk about without
really understanding its capabilities—and this has
resulted in a lot of confusion out there. If you’re worried
that your server will become sentient and try to
take over the world (or, worse, spend all your money),
you can rest assured that that will not be the case (at
least until you run Internet Explorer—that’ll do the