This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when tra...This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when transmitting her criticism to, sometimes, women's inferiority condition in history, revealing Woolf's more confident stance. These markers are different from those used in more "gentle" themes related to reviewing an author and her work. In this second case, non-assertive epistemic modality is more frequent. Being less harsh towards an author's surroundings and her literary production, Woolf's stance proves less self-assured. The corpus consists of 10 short essays. We also refer to her longer essays A Room of One's Own (1929) and Three Guineas 0938). They were selected bearing in mind their subject-matter. Half of them deal with literature and women writers, their lives and works; the other half ones also have to do with women-related topics, but referring to their position in history and their difficulties to undertake, for example, a literary career. Some concluding remarks indicate the predominance of non-assertive epistemic modality in relation to an intersubjective reading of her texts. This reading favours the inclusion of her audience in her commentary about women writing.展开更多
Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usuall...Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process.展开更多
John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following t...John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.展开更多
Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models hav...Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models have shown promise in improving the performance of assert statement generation.However,the existing models only rely on the test prefixes along with their corresponding focal methods,yet ignore the developer-written summarization.Based on our observations,the summarization contents usually express the intended program behavior or contain parameters that will appear directly in the assert statement.Such information will help existing models address their current inability to accurately predict assert statements.This paper presents a summarization-guided approach for automatically generating assert statements.To derive generic representations for natural language(i.e.,summarization)and programming language(i.e.,test prefixes and focal methods),we leverage a pre-trained language model as the reference architecture and fine-tune it on the task of assert statement generation.To the best of our knowledge,the proposed approach makes the first attempt to leverage the summarization of focal methods as the guidance for making the generated assert statements more accurate.We demonstrate the effectiveness of our approach on two real-world datasets compared with state-of-the-art models.展开更多
1 Introduction The past decades have seen the emergence of hardware agile design methodology(HADM)[1]that prompts design productivity with novel hardware construction languages(HCLs).In contrast to its agility for des...1 Introduction The past decades have seen the emergence of hardware agile design methodology(HADM)[1]that prompts design productivity with novel hardware construction languages(HCLs).In contrast to its agility for design ability,HCLs are weak in verification capabilities such as assertion-based verification(ABV).展开更多
Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth...Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods.展开更多
In April 2022,then-President of Mexico Andrés Manuel López Obrador officially implemented the lithium resources nationalization law and established the state-owned enterprise LitioMx to oversee their explora...In April 2022,then-President of Mexico Andrés Manuel López Obrador officially implemented the lithium resources nationalization law and established the state-owned enterprise LitioMx to oversee their exploration,extraction,and processing.His successor,Claudia Sheinbaum,reaffirmed this assertive resource governance policy in October 2024.As a direct consequence,the operations of the Chinese firm,Ganfeng Lithium in Mexico,experienced significant disruption.展开更多
A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are as...A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions.展开更多
G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been g...G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved.展开更多
文摘This study entails a first approach to epistemic modality in Woolf's essays. In particular, we will distinguish between assertive and non-assertive epistemic modality. Woolf uses assertive epistemic modality when transmitting her criticism to, sometimes, women's inferiority condition in history, revealing Woolf's more confident stance. These markers are different from those used in more "gentle" themes related to reviewing an author and her work. In this second case, non-assertive epistemic modality is more frequent. Being less harsh towards an author's surroundings and her literary production, Woolf's stance proves less self-assured. The corpus consists of 10 short essays. We also refer to her longer essays A Room of One's Own (1929) and Three Guineas 0938). They were selected bearing in mind their subject-matter. Half of them deal with literature and women writers, their lives and works; the other half ones also have to do with women-related topics, but referring to their position in history and their difficulties to undertake, for example, a literary career. Some concluding remarks indicate the predominance of non-assertive epistemic modality in relation to an intersubjective reading of her texts. This reading favours the inclusion of her audience in her commentary about women writing.
文摘Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process.
文摘John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.
基金supported by the National Natural Science Foundation of China under Grant Nos.62072007,62192733,61832009,62192731,and 62192730.
文摘Generating meaningful assert statements is one of the key challenges in automated test case generation,which requires understanding the intended functionality of the tested code.Recently,deep learning based models have shown promise in improving the performance of assert statement generation.However,the existing models only rely on the test prefixes along with their corresponding focal methods,yet ignore the developer-written summarization.Based on our observations,the summarization contents usually express the intended program behavior or contain parameters that will appear directly in the assert statement.Such information will help existing models address their current inability to accurately predict assert statements.This paper presents a summarization-guided approach for automatically generating assert statements.To derive generic representations for natural language(i.e.,summarization)and programming language(i.e.,test prefixes and focal methods),we leverage a pre-trained language model as the reference architecture and fine-tune it on the task of assert statement generation.To the best of our knowledge,the proposed approach makes the first attempt to leverage the summarization of focal methods as the guidance for making the generated assert statements more accurate.We demonstrate the effectiveness of our approach on two real-world datasets compared with state-of-the-art models.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.U19A2062 and 92473115).
文摘1 Introduction The past decades have seen the emergence of hardware agile design methodology(HADM)[1]that prompts design productivity with novel hardware construction languages(HCLs).In contrast to its agility for design ability,HCLs are weak in verification capabilities such as assertion-based verification(ABV).
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61876173,61432017,and 61532017.
文摘Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods.
文摘In April 2022,then-President of Mexico Andrés Manuel López Obrador officially implemented the lithium resources nationalization law and established the state-owned enterprise LitioMx to oversee their exploration,extraction,and processing.His successor,Claudia Sheinbaum,reaffirmed this assertive resource governance policy in October 2024.As a direct consequence,the operations of the Chinese firm,Ganfeng Lithium in Mexico,experienced significant disruption.
基金This research was partially supported by an National Science Foundation(NSF)Information Technology Research(ITR)award CCR-0113611an NSF award CCR-0203051.
文摘A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions.
基金Project supported by the High Technology Research and Development Program of China.
文摘G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved.