Alexa Hepburn and Jonathan Potter
- Published in print:
- 2009
- Published Online:
- February 2010
- ISBN:
- 9780195306897
- eISBN:
- 9780199867943
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195306897.003.0004
- Subject:
- Linguistics, Sociolinguistics / Anthropological Linguistics
This chapter, written by Alexa Hepburn and Jonathan Potter, examines the use of tag questions by child protection officers (CPOs) in calls to a child abuse hotline. Hepburn and Potter find that tag ...
More
This chapter, written by Alexa Hepburn and Jonathan Potter, examines the use of tag questions by child protection officers (CPOs) in calls to a child abuse hotline. Hepburn and Potter find that tag questions are particularly common during crying sequences in these calls, that is, when callers are crying and having a difficult time expressing the reasons for their call. CPOs typically adopt a neutral or even skeptical stance with respect to callers and their predicaments, but during crying sequences CPOs “sympathetically acknowledge” the (upset) mental state of the callers. Combined with other features of the CPOs' turn, Hepburn and Potter argue that tag questions during crying sequences have an affiliative function and a weak response requirement. The use of this particular type of question means that callers are not held strongly accountable for answering and are thus encouraged to stay on the phone even if they fail to participate.Less
This chapter, written by Alexa Hepburn and Jonathan Potter, examines the use of tag questions by child protection officers (CPOs) in calls to a child abuse hotline. Hepburn and Potter find that tag questions are particularly common during crying sequences in these calls, that is, when callers are crying and having a difficult time expressing the reasons for their call. CPOs typically adopt a neutral or even skeptical stance with respect to callers and their predicaments, but during crying sequences CPOs “sympathetically acknowledge” the (upset) mental state of the callers. Combined with other features of the CPOs' turn, Hepburn and Potter argue that tag questions during crying sequences have an affiliative function and a weak response requirement. The use of this particular type of question means that callers are not held strongly accountable for answering and are thus encouraged to stay on the phone even if they fail to participate.
Roger S. Bagnall and Giovanni R. Ruffini
- Published in print:
- 2012
- Published Online:
- May 2016
- ISBN:
- 9780814745267
- eISBN:
- 9780814771327
- Item type:
- chapter
- Publisher:
- NYU Press
- DOI:
- 10.18574/nyu/9780814745267.003.0002
- Subject:
- History, Ancient History / Archaeology
This chapter catalogues the ostraka found at the Trimithis site, providing translations and commentary where possible in order to flesh out the minutiae of the day-to-day life of its former ...
More
This chapter catalogues the ostraka found at the Trimithis site, providing translations and commentary where possible in order to flesh out the minutiae of the day-to-day life of its former inhabitants. Items for study include lists and accounts, ration accounts, well tags, memoranda, receipts, letters, orders, notes, writing exercises, jar inscriptions, among others. Descriptions are provided as to the physical nature of the ostraka themselves, such as the medium of the texts (fabric, pottery, and so on), as well as the nature of the information that can be gleaned from the text itself (abbreviations, grammatical considerations, fragmented or missing text, etc.).Less
This chapter catalogues the ostraka found at the Trimithis site, providing translations and commentary where possible in order to flesh out the minutiae of the day-to-day life of its former inhabitants. Items for study include lists and accounts, ration accounts, well tags, memoranda, receipts, letters, orders, notes, writing exercises, jar inscriptions, among others. Descriptions are provided as to the physical nature of the ostraka themselves, such as the medium of the texts (fabric, pottery, and so on), as well as the nature of the information that can be gleaned from the text itself (abbreviations, grammatical considerations, fragmented or missing text, etc.).
Susan Stewart
- Published in print:
- 1998
- Published Online:
- October 2011
- ISBN:
- 9780195109924
- eISBN:
- 9780199855261
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195109924.003.0002
- Subject:
- Literature, Poetry
This chapter focuses on lyric poetry and its features such as counterpoint, harmony, syncopation, stress, duration, and timbre. It also presents the number of complex conditions under which that ...
More
This chapter focuses on lyric poetry and its features such as counterpoint, harmony, syncopation, stress, duration, and timbre. It also presents the number of complex conditions under which that “sound” is and is not an aspect of lyric. The complexity of the relation between lyric and musicality is that the dynamic tension between sound and semantic can at once both extend and diminish meaning. This chapter also describes features of sound manipulation in poetry such as counterpoising, tagging, echo effects, diagramming, and the “ornamental” devices of rubrication and embellishment that can make the relation between sound and meaning particularly textured and complex. As a figure of spoken sound, the poem produces effects of transformation in sound and it does not fix or reify the terms of utterance.Less
This chapter focuses on lyric poetry and its features such as counterpoint, harmony, syncopation, stress, duration, and timbre. It also presents the number of complex conditions under which that “sound” is and is not an aspect of lyric. The complexity of the relation between lyric and musicality is that the dynamic tension between sound and semantic can at once both extend and diminish meaning. This chapter also describes features of sound manipulation in poetry such as counterpoising, tagging, echo effects, diagramming, and the “ornamental” devices of rubrication and embellishment that can make the relation between sound and meaning particularly textured and complex. As a figure of spoken sound, the poem produces effects of transformation in sound and it does not fix or reify the terms of utterance.
Susan Hockey
- Published in print:
- 2000
- Published Online:
- October 2011
- ISBN:
- 9780198711940
- eISBN:
- 9780191694912
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780198711940.003.0006
- Subject:
- Literature, Criticism/Theory
This chapter addresses linguistic analysis, including word-class tagging. It looks at some possibilities for analysing text beyond the level of the graphic word or sequence of characters, focusing on ...
More
This chapter addresses linguistic analysis, including word-class tagging. It looks at some possibilities for analysing text beyond the level of the graphic word or sequence of characters, focusing on what can be done with simple concordance tools. The use of concordances and other computer-based tools for linguistic analysis developed rapidly in the 1990s and is now generally known as corpus linguistics. Word-class tagging and other forms of annotation can enhance these corpora, offering more sophisticated analyses. Most of the applications discussed in this chapter are based on language corpora, but they are just as relevant for specific literary or other humanities texts. New tools developed in corpus linguistics are gradually beginning to feed into better techniques for literary analysis.Less
This chapter addresses linguistic analysis, including word-class tagging. It looks at some possibilities for analysing text beyond the level of the graphic word or sequence of characters, focusing on what can be done with simple concordance tools. The use of concordances and other computer-based tools for linguistic analysis developed rapidly in the 1990s and is now generally known as corpus linguistics. Word-class tagging and other forms of annotation can enhance these corpora, offering more sophisticated analyses. Most of the applications discussed in this chapter are based on language corpora, but they are just as relevant for specific literary or other humanities texts. New tools developed in corpus linguistics are gradually beginning to feed into better techniques for literary analysis.
David Ellis
- Published in print:
- 2008
- Published Online:
- October 2011
- ISBN:
- 9780199546657
- eISBN:
- 9780191701443
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199546657.003.0019
- Subject:
- Literature, 20th-century Literature and Modernism
This chapter discusses obituaries. An obituary is a death notice and publication that gives an account of the life of someone considered significant who has recently died. Most obituaries written ...
More
This chapter discusses obituaries. An obituary is a death notice and publication that gives an account of the life of someone considered significant who has recently died. Most obituaries written before the twentieth century were composed in the spirit of the Latin tag De mortuis nil nisi bonum, which can be loosely and colloquially translated as: only speak of the dead if you have something good to say.Less
This chapter discusses obituaries. An obituary is a death notice and publication that gives an account of the life of someone considered significant who has recently died. Most obituaries written before the twentieth century were composed in the spirit of the Latin tag De mortuis nil nisi bonum, which can be loosely and colloquially translated as: only speak of the dead if you have something good to say.
Ezra Mendelsohn
- Published in print:
- 1997
- Published Online:
- October 2011
- ISBN:
- 9780195112030
- eISBN:
- 9780199854608
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780195112030.003.0018
- Subject:
- History, History of Religion
This chapter presents a study that uncovers the historic roots of the fear of having the tell-tale “H” (Hebrew) stamped on metal dog tags of Jewish recruits in the American army. Forgotten Victims, ...
More
This chapter presents a study that uncovers the historic roots of the fear of having the tell-tale “H” (Hebrew) stamped on metal dog tags of Jewish recruits in the American army. Forgotten Victims, the book under review in this chapter, written by Mitchell G. Bard, is the story of the abuse of American citizens and American POWs, some Jewish, who were caught in the German net. Germany's poor treatment of some prisoners was later overshadowed by the horrendous stories leaking out of occupied Europe regarding the treatment of Jews.Less
This chapter presents a study that uncovers the historic roots of the fear of having the tell-tale “H” (Hebrew) stamped on metal dog tags of Jewish recruits in the American army. Forgotten Victims, the book under review in this chapter, written by Mitchell G. Bard, is the story of the abuse of American citizens and American POWs, some Jewish, who were caught in the German net. Germany's poor treatment of some prisoners was later overshadowed by the horrendous stories leaking out of occupied Europe regarding the treatment of Jews.
Paul Bayley and Geoffrey Williams
- Published in print:
- 2012
- Published Online:
- September 2012
- ISBN:
- 9780199602308
- eISBN:
- 9780191739156
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199602308.003.0001
- Subject:
- Political Science, European Union, Comparative Politics
This introductory chapter sets out the theoretical framework and the methodologies applied in the remainder of the volume and describes the composition and the architecture of the corpus, as well as ...
More
This introductory chapter sets out the theoretical framework and the methodologies applied in the remainder of the volume and describes the composition and the architecture of the corpus, as well as the rationale of the choice of news outlets. Moreover, it provides a description of software programmes used to analyse the corpus, and the procedures of mark‐up and tagging which facilitated its interrogation. Finally, it provides an overview of the ensuing chapters.Less
This introductory chapter sets out the theoretical framework and the methodologies applied in the remainder of the volume and describes the composition and the architecture of the corpus, as well as the rationale of the choice of news outlets. Moreover, it provides a description of software programmes used to analyse the corpus, and the procedures of mark‐up and tagging which facilitated its interrogation. Finally, it provides an overview of the ensuing chapters.
Ofer Bergman and Steve Whittaker
- Published in print:
- 2016
- Published Online:
- May 2017
- ISBN:
- 9780262035170
- eISBN:
- 9780262336291
- Item type:
- book
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262035170.001.0001
- Subject:
- Society and Culture, Technology and Society
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find ...
More
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find it. The ease of finding something depends on how we organize our digital stuff. In this book, personal information management (PIM) experts Ofer Bergman and Steve Whittaker explain why we organize our personal digital data the way we do and how better design can help us manage our collections more efficiently.
Bergman and Whittaker report that many of us use hierarchical folders for our personal digital organizing. Critics of this method point out that information is hidden from sight in folders that are often within other folders; so that we have to remember the exact location of information to access it. They therefore suggest other methods: search, more flexible than navigating folders; tags, which allow multiple categorizations; and group information management. Yet Bergman and Whittaker have found that these other methods that work best for public information management don’t work as well for personal information management.
Bergman and Whittaker describe personal information collection as curation: we preserve and organize this data to ensure our future access to it. Unlike other kinds of information management fields, in PIM the same user organizes and retrieves the information. After explaining the cognitive and psychological reasons that so many prefer folders, Bergman and Whittaker propose the user-subjective approach, which does not replace folder hierarchies but exploits the unique characteristics of PIM.Less
Each of us has an ever-growing collection of personal digital data: documents, emails, Web pages we visited, tasks, contacts, appointments and pictures we took. To use any of this, we have to find it. The ease of finding something depends on how we organize our digital stuff. In this book, personal information management (PIM) experts Ofer Bergman and Steve Whittaker explain why we organize our personal digital data the way we do and how better design can help us manage our collections more efficiently.
Bergman and Whittaker report that many of us use hierarchical folders for our personal digital organizing. Critics of this method point out that information is hidden from sight in folders that are often within other folders; so that we have to remember the exact location of information to access it. They therefore suggest other methods: search, more flexible than navigating folders; tags, which allow multiple categorizations; and group information management. Yet Bergman and Whittaker have found that these other methods that work best for public information management don’t work as well for personal information management.
Bergman and Whittaker describe personal information collection as curation: we preserve and organize this data to ensure our future access to it. Unlike other kinds of information management fields, in PIM the same user organizes and retrieves the information. After explaining the cognitive and psychological reasons that so many prefer folders, Bergman and Whittaker propose the user-subjective approach, which does not replace folder hierarchies but exploits the unique characteristics of PIM.
Chris Collins and Paul M. Postal
- Published in print:
- 2014
- Published Online:
- September 2015
- ISBN:
- 9780262027311
- eISBN:
- 9780262323840
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262027311.003.0002
- Subject:
- Linguistics, Syntax and Morphology
This chapter discusses the representation of quantifier scope and its general assumptions. It takes the scope of quantifiers to be represented syntactically by the presence of determiner phrase (DP) ...
More
This chapter discusses the representation of quantifier scope and its general assumptions. It takes the scope of quantifiers to be represented syntactically by the presence of determiner phrase (DP) in clausal scope positions. It outlines representations whose key feature is that relative semantic scope is represented by relative height in syntactic structures. Since the relations between multiple DPs in scope positions are hierarchically represented, the fact that some quantifier DPs in a clause scope over others falls out from the representation. The chapter also considers the assumption that there are principles relating syntactic scope to the corresponding semantics, along with evidence for the syntactic reality of syntactic scope positions directly related to negation. Finally, it discusses support for the syntactic representation of quantifier scope from neither expressions, negative parentheticals, appended phrases such as I guess not, and confirmation tags.Less
This chapter discusses the representation of quantifier scope and its general assumptions. It takes the scope of quantifiers to be represented syntactically by the presence of determiner phrase (DP) in clausal scope positions. It outlines representations whose key feature is that relative semantic scope is represented by relative height in syntactic structures. Since the relations between multiple DPs in scope positions are hierarchically represented, the fact that some quantifier DPs in a clause scope over others falls out from the representation. The chapter also considers the assumption that there are principles relating syntactic scope to the corresponding semantics, along with evidence for the syntactic reality of syntactic scope positions directly related to negation. Finally, it discusses support for the syntactic representation of quantifier scope from neither expressions, negative parentheticals, appended phrases such as I guess not, and confirmation tags.
Ruth Barcan Marcus
- Published in print:
- 1995
- Published Online:
- November 2003
- ISBN:
- 9780195096576
- eISBN:
- 9780199833412
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0195096576.001.0001
- Subject:
- Philosophy, General
This book is a collection of papers by Ruth Barcan Marcus, covering much ground in the development of her thought, and spanning from 1961 to 1990. Many of the papers deal with logical, semantic, ...
More
This book is a collection of papers by Ruth Barcan Marcus, covering much ground in the development of her thought, and spanning from 1961 to 1990. Many of the papers deal with logical, semantic, metaphysical, and epistemological issues in intensional logic, and in particular, modalities. Some important themes that run through these papers are extensionality, the necessity of identity, the directly referential conception of proper names as “tags,” essentialism, substitutional quantification, and possibilia and possible worlds. What emerges from them is a robust defense of quantified modal logic in the light of a host of objections, particularly from Quine. Modalities also includes two papers on belief, which have consequences for epistemic logic and more widely for theories of rationality; two papers on ethical issues, which have consequences for deontic logic and practical reasoning; and finally, two papers on historical figures, Spinoza and Russell, dealing with the ontological proof of God's existence, and the nature of particularity, identity, and individuation, respectively.Less
This book is a collection of papers by Ruth Barcan Marcus, covering much ground in the development of her thought, and spanning from 1961 to 1990. Many of the papers deal with logical, semantic, metaphysical, and epistemological issues in intensional logic, and in particular, modalities. Some important themes that run through these papers are extensionality, the necessity of identity, the directly referential conception of proper names as “tags,” essentialism, substitutional quantification, and possibilia and possible worlds. What emerges from them is a robust defense of quantified modal logic in the light of a host of objections, particularly from Quine. Modalities also includes two papers on belief, which have consequences for epistemic logic and more widely for theories of rationality; two papers on ethical issues, which have consequences for deontic logic and practical reasoning; and finally, two papers on historical figures, Spinoza and Russell, dealing with the ontological proof of God's existence, and the nature of particularity, identity, and individuation, respectively.
Ruth Barcan Marcus
- Published in print:
- 1995
- Published Online:
- November 2003
- ISBN:
- 9780195096576
- eISBN:
- 9780199833412
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/0195096576.003.0001
- Subject:
- Philosophy, General
In this paper, quantified modal logic is defended against criticisms concerning identity and substitution, the interpretation of the existential quantifier, and the commitment to essentialism. The ...
More
In this paper, quantified modal logic is defended against criticisms concerning identity and substitution, the interpretation of the existential quantifier, and the commitment to essentialism. The paper includes two appendices: the first is a record of the discussion that followed the presentation of the paper in 1962, and includes Quine and Kripke among the discussants; the second is a review of A. Smullyan's “Modality and Description.”Less
In this paper, quantified modal logic is defended against criticisms concerning identity and substitution, the interpretation of the existential quantifier, and the commitment to essentialism. The paper includes two appendices: the first is a record of the discussion that followed the presentation of the paper in 1962, and includes Quine and Kripke among the discussants; the second is a review of A. Smullyan's “Modality and Description.”
Inderjeet Mani and James Pustejovsky
- Published in print:
- 2012
- Published Online:
- May 2012
- ISBN:
- 9780199601240
- eISBN:
- 9780191738968
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199601240.003.0006
- Subject:
- Linguistics, Psycholinguistics / Neurolinguistics / Cognitive Linguistics, Semantics and Pragmatics
Applications and Prospects illustrates a variety of practical applications, including route navigation, mapping travel narratives, multimedia tagging, question‐answering, ...
More
Applications and Prospects illustrates a variety of practical applications, including route navigation, mapping travel narratives, multimedia tagging, question‐answering, communication with artificial agents, scene rendering from text, and spatiotemporal event tracking from textual and structured data sources. The authors analyze some of the texts in these applications in terms of ISO‐Space annotation scheme discussed in Chapter 5 along with their relevant DITL representations. The chapter concludes with an enumeration of some open issues, such as more extensive multilingual analysis and annotation, modeling of functional aspects of spatial representation, handling of fictive motion, and further integration of different qualitative calculi and language processing.Less
Applications and Prospects illustrates a variety of practical applications, including route navigation, mapping travel narratives, multimedia tagging, question‐answering, communication with artificial agents, scene rendering from text, and spatiotemporal event tracking from textual and structured data sources. The authors analyze some of the texts in these applications in terms of ISO‐Space annotation scheme discussed in Chapter 5 along with their relevant DITL representations. The chapter concludes with an enumeration of some open issues, such as more extensive multilingual analysis and annotation, modeling of functional aspects of spatial representation, handling of fictive motion, and further integration of different qualitative calculi and language processing.
Peter Carruthers
- Published in print:
- 2011
- Published Online:
- January 2012
- ISBN:
- 9780199596195
- eISBN:
- 9780191731549
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199596195.003.0006
- Subject:
- Philosophy, Philosophy of Mind, Metaphysics/Epistemology
This chapter outlines and critiques a number of intermediate-strength theories of self-knowledge. These either violate the restrictions imposed by the interpretive sensory-access (ISA) theory without ...
More
This chapter outlines and critiques a number of intermediate-strength theories of self-knowledge. These either violate the restrictions imposed by the interpretive sensory-access (ISA) theory without yet going so far as to suggest dedicated channels of access to attitudes, or they are inner sense views that are restricted to a specific class of mental events. One of these accounts claims that representations in sensory-based working memory are tagged to indicate their attitude of origin. Another postulates the existence of a non-sensory form of working memory in which attitudes themselves can be globally broadcast. The third account claims that we can have transparent knowledge of our own active intentions and mental actions through the efference copies that they create.Less
This chapter outlines and critiques a number of intermediate-strength theories of self-knowledge. These either violate the restrictions imposed by the interpretive sensory-access (ISA) theory without yet going so far as to suggest dedicated channels of access to attitudes, or they are inner sense views that are restricted to a specific class of mental events. One of these accounts claims that representations in sensory-based working memory are tagged to indicate their attitude of origin. Another postulates the existence of a non-sensory form of working memory in which attitudes themselves can be globally broadcast. The third account claims that we can have transparent knowledge of our own active intentions and mental actions through the efference copies that they create.
Claus Nielsen
- Published in print:
- 2011
- Published Online:
- December 2013
- ISBN:
- 9780199606023
- eISBN:
- 9780191774706
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199606023.001.0001
- Subject:
- Biology, Evolutionary Biology / Genetics, Animal Biology
This book provides a comprehensive analysis of evolution in the animal kingdom. It reviews the classical, morphological information from structure and embryology, as well as the new data gained from ...
More
This book provides a comprehensive analysis of evolution in the animal kingdom. It reviews the classical, morphological information from structure and embryology, as well as the new data gained from studies using immune stainings of nerves and muscles and blastomere markings, which makes it possible to follow the fate of single blastomeres all the way to early organogenesis. Until recently, the information from analyses of gene sequences has tended to produce myriads of quite diverging trees. However, the latest generation of molecular methods, using many genes, expressed sequence tags, and even whole genomes, has brought a new stability to the field. The book brings together the information from these varied fields, and demonstrates that it is indeed now possible to build a phylogenetic tree from a combination of both morphology and gene sequences. This thoroughly revised third edition brings the subject fully up to date, especially in light of the latest advances in molecular techniques. The book is illustrated throughout with finely detailed line drawings and clear diagrams, many of them new.Less
This book provides a comprehensive analysis of evolution in the animal kingdom. It reviews the classical, morphological information from structure and embryology, as well as the new data gained from studies using immune stainings of nerves and muscles and blastomere markings, which makes it possible to follow the fate of single blastomeres all the way to early organogenesis. Until recently, the information from analyses of gene sequences has tended to produce myriads of quite diverging trees. However, the latest generation of molecular methods, using many genes, expressed sequence tags, and even whole genomes, has brought a new stability to the field. The book brings together the information from these varied fields, and demonstrates that it is indeed now possible to build a phylogenetic tree from a combination of both morphology and gene sequences. This thoroughly revised third edition brings the subject fully up to date, especially in light of the latest advances in molecular techniques. The book is illustrated throughout with finely detailed line drawings and clear diagrams, many of them new.
Christa Dürscheid and Elisabeth Stark
- Published in print:
- 2011
- Published Online:
- January 2012
- ISBN:
- 9780199795437
- eISBN:
- 9780199919321
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199795437.003.0014
- Subject:
- Linguistics, Sociolinguistics / Anthropological Linguistics
This chapter presents a corpus-linguistic project based on a large-scale collection of Swiss text messages (SMS) and reveals some preliminary findings of this study. Although this is not the first ...
More
This chapter presents a corpus-linguistic project based on a large-scale collection of Swiss text messages (SMS) and reveals some preliminary findings of this study. Although this is not the first corpus-based SMS project, it is still remarkable since most databases are very small and the insight therefore not statistically significant. SMS4science.ch is a sub-project of the international project SMS4science (coordinated in Belgium), which brings together researchers from various countries to conduct research on text messaging. After giving a brief overview over different types of existing corpora, the chapter introduces the Swiss SMS corpus and some projected research work based on it (particularly on code-switching, structural features, and pragmatic issues in text messages). Finally, the future of text messaging and text messaging research is briefly discussed.Less
This chapter presents a corpus-linguistic project based on a large-scale collection of Swiss text messages (SMS) and reveals some preliminary findings of this study. Although this is not the first corpus-based SMS project, it is still remarkable since most databases are very small and the insight therefore not statistically significant. SMS4science.ch is a sub-project of the international project SMS4science (coordinated in Belgium), which brings together researchers from various countries to conduct research on text messaging. After giving a brief overview over different types of existing corpora, the chapter introduces the Swiss SMS corpus and some projected research work based on it (particularly on code-switching, structural features, and pragmatic issues in text messages). Finally, the future of text messaging and text messaging research is briefly discussed.
James H. Smith
- Published in print:
- 2021
- Published Online:
- May 2022
- ISBN:
- 9780226774350
- eISBN:
- 9780226816050
- Item type:
- chapter
- Publisher:
- University of Chicago Press
- DOI:
- 10.7208/chicago/9780226816050.003.0010
- Subject:
- Anthropology, African Cultural Anthropology
This chapter analyzes "bag and tag" intervention implemented by corporate-sponsored NGOs and designed to open up mining after a period of de facto embargo. It explains the ironic consequences of the ...
More
This chapter analyzes "bag and tag" intervention implemented by corporate-sponsored NGOs and designed to open up mining after a period of de facto embargo. It explains the ironic consequences of the tagging scheme, which transformed those involved in mining at “unregistered” or ”red” sites into “smugglers” of blood minerals. The majority of mines were unregistered, and the tags became an instrument for state actors to expropriate minerals from newly criminalized diggers and traders. The digitized tags promised a kind of disembodiment and deterritorialization, but their visible materiality is what made them useful for Congolese state actors. Many involved in the trade interpreted the scheme as a foreign purification project intended to cleanse “Western” technology of the pollution of Congo and Congolese people; some saw the project as an effort to cleanse iPhones and other technologies of Congolese blood so that "white" people wouldn’t have to touch this blood every time they touched an iPhone. The model of peace-building entailed in the tagging scheme—based on the separation of things from social context and certain kinds of actors from other kinds of actors—is contrasted to the Congolese idea of peace emerging from “many hands touching money."Less
This chapter analyzes "bag and tag" intervention implemented by corporate-sponsored NGOs and designed to open up mining after a period of de facto embargo. It explains the ironic consequences of the tagging scheme, which transformed those involved in mining at “unregistered” or ”red” sites into “smugglers” of blood minerals. The majority of mines were unregistered, and the tags became an instrument for state actors to expropriate minerals from newly criminalized diggers and traders. The digitized tags promised a kind of disembodiment and deterritorialization, but their visible materiality is what made them useful for Congolese state actors. Many involved in the trade interpreted the scheme as a foreign purification project intended to cleanse “Western” technology of the pollution of Congo and Congolese people; some saw the project as an effort to cleanse iPhones and other technologies of Congolese blood so that "white" people wouldn’t have to touch this blood every time they touched an iPhone. The model of peace-building entailed in the tagging scheme—based on the separation of things from social context and certain kinds of actors from other kinds of actors—is contrasted to the Congolese idea of peace emerging from “many hands touching money."
Antonio Torralba and Adolfo Plasencia
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780262036016
- eISBN:
- 9780262339308
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262036016.003.0027
- Subject:
- Society and Culture, Technology and Society
Antonio Torralba, member of MIT CSAIL, opens the dialogue by describing the research he performs in the field of computer vision and related artificial intelligence (AI). He also compares the ...
More
Antonio Torralba, member of MIT CSAIL, opens the dialogue by describing the research he performs in the field of computer vision and related artificial intelligence (AI). He also compares the conceptual differences and the context of the early days of artificial intelligence—where hardly any image recording devices existed—with the present situation, in which an enormous amount of data is available. Next, through the use of examples, he talks about the huge complexity faced by research in computer vision to get computers and machines to understand the meanings of what they “see” in the scenes, and the objects they contain, by means of digital cameras. As he explains afterward, the challenge of this complexity for computer vision processing is particularly noticeable in settings involving robots, or driverless cars, where it makes no sense to develop vision systems that can see if they cannot learn. Later he argues why today’s computer systems have to learn “to see” because if there is no learning process, for example machine learning, they will never be able to make autonomous decisions.Less
Antonio Torralba, member of MIT CSAIL, opens the dialogue by describing the research he performs in the field of computer vision and related artificial intelligence (AI). He also compares the conceptual differences and the context of the early days of artificial intelligence—where hardly any image recording devices existed—with the present situation, in which an enormous amount of data is available. Next, through the use of examples, he talks about the huge complexity faced by research in computer vision to get computers and machines to understand the meanings of what they “see” in the scenes, and the objects they contain, by means of digital cameras. As he explains afterward, the challenge of this complexity for computer vision processing is particularly noticeable in settings involving robots, or driverless cars, where it makes no sense to develop vision systems that can see if they cannot learn. Later he argues why today’s computer systems have to learn “to see” because if there is no learning process, for example machine learning, they will never be able to make autonomous decisions.
Gerjan van Schaaik
- Published in print:
- 2020
- Published Online:
- September 2020
- ISBN:
- 9780198851509
- eISBN:
- 9780191886102
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198851509.003.0026
- Subject:
- Linguistics, Phonetics / Phonology, Syntax and Morphology
Particles belong to the class of so-called function words; in contrast to content words such as green or house, which immediately evoke some image, the meaning of a particle becomes clear only as ...
More
Particles belong to the class of so-called function words; in contrast to content words such as green or house, which immediately evoke some image, the meaning of a particle becomes clear only as soon as it is put in the right place in a sentence. There are quite a few in Turkish. Conjunctions are the particles used for the coordination of nouns, and these are treated here, together with the question particle. This particle is not only applied to form choice questions, but it forms yes/no questions as well. The negational particle değil is used to contrast two or more nouns and combined with the question particle it is also the core of tag questions. In the third section so-called clitics are discussed, by means of which emphatic statements and rhetorical questions are formulated. Also, some clause linkers and devices for topicalization are discussed.Less
Particles belong to the class of so-called function words; in contrast to content words such as green or house, which immediately evoke some image, the meaning of a particle becomes clear only as soon as it is put in the right place in a sentence. There are quite a few in Turkish. Conjunctions are the particles used for the coordination of nouns, and these are treated here, together with the question particle. This particle is not only applied to form choice questions, but it forms yes/no questions as well. The negational particle değil is used to contrast two or more nouns and combined with the question particle it is also the core of tag questions. In the third section so-called clitics are discussed, by means of which emphatic statements and rhetorical questions are formulated. Also, some clause linkers and devices for topicalization are discussed.
Peter A. Henderson
- Published in print:
- 2021
- Published Online:
- May 2021
- ISBN:
- 9780198862277
- eISBN:
- 9780191895067
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198862277.003.0003
- Subject:
- Biology, Biomathematics / Statistics and Data Analysis / Complexity Studies, Ecology
The main methods used to estimate population size using capture–recapture for both closed and open populations are described, including the Peterson–Lincoln estimator, the Schabel census, Bailey’s ...
More
The main methods used to estimate population size using capture–recapture for both closed and open populations are described, including the Peterson–Lincoln estimator, the Schabel census, Bailey’s triple catch, the Jolly–Seber stochastic method, and Cormack’s log-linear method. The robust design approach is described. R code listings for commonly used packages are presented. The assumptions common to capture–recapture methods are reviewed, and tests for assumptions such as equal catchability described. The use of programs to select model assumptions are described. The main methods for marking different animal groups are described, together with the use of natural marks and parasites and DNA. Marking methods include paint marks, dyes, tagging, protein marking, DNA, natural marks, tattooing, and mutilation. Methods for handling and release are described.Less
The main methods used to estimate population size using capture–recapture for both closed and open populations are described, including the Peterson–Lincoln estimator, the Schabel census, Bailey’s triple catch, the Jolly–Seber stochastic method, and Cormack’s log-linear method. The robust design approach is described. R code listings for commonly used packages are presented. The assumptions common to capture–recapture methods are reviewed, and tests for assumptions such as equal catchability described. The use of programs to select model assumptions are described. The main methods for marking different animal groups are described, together with the use of natural marks and parasites and DNA. Marking methods include paint marks, dyes, tagging, protein marking, DNA, natural marks, tattooing, and mutilation. Methods for handling and release are described.
Beatrix Busse
- Published in print:
- 2020
- Published Online:
- July 2020
- ISBN:
- 9780190212360
- eISBN:
- 9780190212384
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780190212360.003.0006
- Subject:
- Linguistics, English Language, Historical Linguistics
The sixth chapter illustrates how the automatic annotation of the different modes of speech, writing, and thought presentation in 19th-century narrative fiction may be performed on the basis of ...
More
The sixth chapter illustrates how the automatic annotation of the different modes of speech, writing, and thought presentation in 19th-century narrative fiction may be performed on the basis of repetitive lexico-grammatical features and by setting up rules based on the manual annotation of the corpus and facilitating it in larger data sets. The chapter proposes a number of formal diagnostic features for the identification of discourse presentation as well as procedures to help their automatic detection. The procedures described serve as basis for a tool for the automatic identification of discourse presentation which can be adopted to programs like Wmatrix (Rayson 2018) and WordSmith Tools (Scott 2017). The chapter furthermore critically reflects on the limits of automated procedures and the necessity to manually check the annotations and include contextual information for unambiguous identification of different types of discourse presentation.Less
The sixth chapter illustrates how the automatic annotation of the different modes of speech, writing, and thought presentation in 19th-century narrative fiction may be performed on the basis of repetitive lexico-grammatical features and by setting up rules based on the manual annotation of the corpus and facilitating it in larger data sets. The chapter proposes a number of formal diagnostic features for the identification of discourse presentation as well as procedures to help their automatic detection. The procedures described serve as basis for a tool for the automatic identification of discourse presentation which can be adopted to programs like Wmatrix (Rayson 2018) and WordSmith Tools (Scott 2017). The chapter furthermore critically reflects on the limits of automated procedures and the necessity to manually check the annotations and include contextual information for unambiguous identification of different types of discourse presentation.