... conceived the study design and data analysis and drafted the manuscript TT participated in the design of the study and coordination, TM participated in the study design and conducted a survey, HS took ... because of the conflict, and other events related to armed conflict Cases of PTSD PTSD symptoms were assessed according to a scoring algorithm based on the criteria outlined in the Diagnostic and Statistical ... related to armed conflict and those who reported having no such experiences This was considered due to the impact of traumatic events directly related to armed conflict and the exposure to the long-term...
Ngày tải lên: 18/06/2014, 22:20
... sessions Together the three topics comprise one sixth of the full informatics curriculum for licentiate and engineering degrees There is another point we would like to make, which concerns how to teach ... Ali and Amina and to his family Eeva, Rebecca, and Alexander Peter Van Roy would like to give a special thanks to his parents Frans and Hendrika and to his family Marie-Th´r`se, ee Johan, and ... Thomas Sj¨land, Fred Spiessens, Joe Turner, o and Jean Vanderdonckt We give a special thanks to the following people for their help with material related to the book We thank Rapha¨l Collet for co-authoring...
Ngày tải lên: 22/02/2014, 06:20
Báo cáo y học: "Continuity, psychosocial correlates, and outcome of problematic substance use from adolescence to young adulthood in a community sample" pptx
... analysis resulted in factors explaining 34% of the variance for mothers and 35% of the variance for the fathers The scales were labelled "acceptance" (e g., "my mother/ father praises me when I ... contributed to the prediction which may be due to the fact that the father was seen as a role model particularly for the males in the PSU group In conclusion, the present study points to a rather persistent ... randomized sample representing the 12 counties of the canton, the school grades, and the types of school and formed the basis of the Zurich Epidemiological Study of Child and Adolescent Psychopathology...
Ngày tải lên: 13/08/2014, 18:21
Concepts, Techniques, and Models of Computer Programming - Chapter 1 pps
... left and right and then add them together: [1 + [0 3 3 0] 1] Note that shifting left adds a zero to the right and shifting right adds a zero to the left Doing the addition gives: [1 1] which is the ... development Let us summarize the technique we used to write Pascal: • The first step is to understand how to the calculation by hand • The second step writes a main function to solve the problem, assuming ... memory store as defined in the supplements file on the book’s Web site Then use the interactive interface to understand how the store works (b) Now use the memory store to write an improved version...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 2 pptx
... stack and the reachable part of the store are together called the active memory The rest of the store can safely be reclaimed, i.e., the memory it uses can be reused for other purposes Since the ... and the store have very different behaviors The semantic stack is bounded by a constant size On the other hand, the store grows bigger at each call At the kth recursive call, the store has the form: ... two bindings, A=11 and B=2 The addition C=A+B adds the values of A and B and binds C to the result 13 The multiplication D multiples the value of C by itself and binds D to the result 169 This...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 3 docx
... the component and the rest of the program, then they could not be understood independently They would have to be understood together, and the effort needed would be much bigger For example, it ... If the statement is declarative, then for the same bindings of the inputs, the result is always the same For example, consider the statement Z=X Assume that X is the input and Z is the output For ... identifiers X and Y and one output identifier Z Then, if X and Y are bound to any partial values, the statement’s execution will either block or bind Z to the same partial value Therefore the statement...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 4 pps
... questioning the obvious: it led Newton to discover the spectrum of light and Einstein to discover the postulate of relativity Let us therefore question the obvious and see where it leads us Are there other ... little and show how to repair the previous example Assume that X and Y are visible to the rest of the program If there is an exception, we arrange for X and Y to be bound to default values If there ... RootX and RightLim are outputs (they propagate up towards the root), and the calculations have to be done in the correct order to avoid deadlock There are two ways to find the correct order: • The...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 5 pptx
... of a random lift The idea is for the floor to send messages to all lifts asking them to give an estimate of the time it would take to reach the floor The floor can then pick the lift with the least ... control system and show how the components interact The controller The controller is the easiest to explain It has two states, motor stopped and motor running At the motor stopped state the controller ... store µ called the mutable store This store contains ports, which are pairs of the form x : y, where x and y are variables of the singleassignment store The mutable store is initially empty The...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 6 pdf
... state Next to the single-assignment store σ and the trigger store τ , we add a new store µ called the mutable store This store contains cells, which are pairs of the form x : y, where x and y are ... of other functors The functor’s dependencies are given as filenames In order to be accessible by other functors, the functor must be stored in a file This allows other functors to specify that they ... and then gave a proof rule The idea is to verify the proof rule once and for all and then to use it as often as we like This approach, defining new concepts and their proof rules, is the way to...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 7 ppt
... anywhere by just giving its print representation On the other hand, with names this is more awkward: the program itself has somehow to pass the name to the caller This adds some complexity to the ... burden for the programmer So atoms win out both for program simplicity and for the psychological comfort factor during development Names have other advantages First, it is impossible to have ... meta-object protocols is to method wrapping, that is, to intercept each method call, possibly performing a user-defined operation before and after the call and possibly changing the arguments to the call...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 8 pdf
... executed Just before exiting, the method notifies all other waiting threads that they might be able to continue They will all wake up and try to enter the monitor lock to test their condition The first ... and easier to reason about It is for notify to two operations atomically: it first causes one waiting thread to leave the wait set (as before) and it then immediately passes the monitor lock to ... attempt to access the lock body, then only one is given access and the others are queued When a thread leaves the critical section, access is granted to the next thread in the queue This uses the token...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 9 ppsx
... alternative to be rejected The procedure PlaceQueens traverses a column from top to bottom It keeps the same Cs, but “shifts” the Us one place to the right and the Ds one place to the left At ... forth together with the connectors ∧ ( and ), ∨ (“or”), ↔ (“if and only if”), → (“implies”), and ¬ (“not”) The symbols p, q, r, and so forth are called atoms in logic An atom in logic is the smallest ... syntax: IF IF=THEN THEN THEN=ELSE ELSE ELSE=IF This IF statement uses variables named IF, THEN, and ELSE The parser has to decide whether each occurrence of the tokens IF, THEN, and ELSE is a...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 10 pps
... D=button(text:"Click this button") The record D defines a widget of button type and the content of the text field gives the initial text in the button Other widgets follow the same conventions The ... possible in either direction For the leftright direction, the w value, when present, will attach the widget to the left side (“west”) The same for the e value (“east”) and the right side If w and e are ... simultaneously, then the widget is expanded Otherwise, it takes up just its natural size For the top-down direction, the n and s values play the same roles (“north” and “south”) For example, the description:...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 11 docx
... semantics For example, a remote operation on a cell could force the cell to migrate to the calling process, and thereafter perform the operation locally For all derived entities except for ports, the ... in the sequence, and will bind the next variable after it has executed the lock body Each thread desiring the lock therefore references two variables: one to wait for the lock and one to pass the ... from the caller to the object, and then from the object to the caller If the network is slow, this can take long One way to get around the network delay is to an asynchronous object call First the...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 12 potx
... causes the child space to disappear and all the child’s content to be added to the parent space And Merge is defined by • {Merge S Y} binds Y to the root variable of space S and discards the space ... introduce basic constraints for finite domains as equations of the form x ∈ D, where D is a finite integer set This partial information is told to the store by the statement x::D The domain D is specified ... constraints to the store according to their semantics Each time a variable’s domain is changed in the store, the propagators that use that variable must be given a chance to execute, so they can...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Chapter 13 pptx
... called tell and ask : • Tell The tell operation is a mechanism to add information to the store A task telling the information β to store σ updates the store to σ∧β, provided that the new store is ... added to the constraint store or the predicate store is changed 13.1.2 The single-assignment (constraint) store The constraint store is a repository of information about the program variables For ... two stores σ and σ are equivalent if (1) their constraint stores entail one another, that is, σc |= σc and σc |= σc , and (2) their stores entail the other’s predicate store, that is, σ |= σp and...
Ngày tải lên: 14/08/2014, 10:22
Concepts, Techniques, and Models of Computer Programming - Appendices pot
... current command The notation “CTRL-x” means to hold down the Control key and then press the key x once The CTRL-g command is especially useful if you get lost To feed a text means to compile and execute ... Description {IsAtom A} Return boolean saying whether A is an atom {AtomToString A} Return string corresponding to atom A {StringToAtom S} Return atom corresponding to string S Table B.6: Some atom operations ... gives the precedence and associativity of all the operators used in the book All the operators are binary infix operators, except for three cases The minus sign ´˜´ is a unary prefix operator The...
Ngày tải lên: 14/08/2014, 10:22