Sentences Generator
And
Your saved sentences

No sentences have been saved yet

"instantiate" Definitions
  1. to represent (an abstraction) by a concrete instance

121 Sentences With "instantiate"

How to use instantiate in a sentence? Find typical usage patterns (collocations)/phrases/context for "instantiate" and check conjugation/comparative form for "instantiate". Mastering all the usages of "instantiate" from sentence examples published by news publications.

But they are daring to hope he will instantiate at least some of them.
Once you instantiate a mind in a physical body, all sorts of add-ons are possible.
Amazon may try and instantiate itself as basically the national e-commerce monopolist, kind of like a Bell-regulated monopoly.
We only instantiate a network client if disk values are not present or if the format has changed since the last save.
A solution to this black-box problem is to either tabulate by hand, or instantiate a separate audit process after each election.
But with nonrealizable matroids, there was no obvious way to instantiate a cohomology ring—they were like a language without a word for that concept.
We use the streaming API rather than saving the JSON as a single object because it prevents us from needing to instantiate value objects over one megabyte into memory.
This wouldn't instantiate a formal right to sex, exactly, but if the new order worked as its revolutionary architects intended, sex would be more justly distributed than it is today.
I think what's exciting is ... much like we're doing with the brand, there's What does the brand essence mean and What does it mean to instantiate that for a current audience.
This became a pain point when, for example, an analytics configuration value was needed from the disk during app launch but had to wait for blocking SSL-enabled network clients to instantiate.
We leaned on Dagger's Lazy instantiation, which allowed us to inject a lazy network client and not instantiate it until we actually do a network operation — important when offline or after the first load.
Separated by two different historical moments, SNCC and the movement for black lives each bear witness to racism's resilience in America and the various levels of resistance black activists have had to face to instantiate change.
It would not, of course, follow that individual members of those groups were barred from showing one another equal respect — but it would also be plausible that, at times, strangers instantiate these ossified relations, even unknowingly.
But most presidents make some effort to instantiate their governing ideology by elevating figures who actually believe it, rather than relying exclusively on toadies and ring-kissers and guys who look the part when you turn on Fox or CNN.
A year earlier, a black boy with a pellet gun named Tamir Rice was killed by a police officer thirty miles east of Oberlin's campus, and the death seemed to instantiate what students had been hearing in the classroom and across the widening horizons of their lives.
" They continue, "the artworks on the site operate across a number of intersecting political levels: they offer testimony of what otherwise would remain unsaid and unrepresented; they offer graphic examples of acts of protest and resistance; they instantiate agency in contexts in which it is often so brutally denied; they amplify, through their visual languages, the key analytical and political concerns articulated in the various case studies of racialized deaths.
Buttazzo, Giorgio, July 2001, Computer, ISSN 0018-9162 For other theorists (e.g., functionalists), who define mental states in terms of causal roles, any system that can instantiate the same pattern of causal roles, regardless of physical constitution, will instantiate the same mental states, including consciousness ().
Note that in this example it makes no sense, semantically, to instantiate xx with the name of a single person.
Python provides a `collections.defaultdict` class that can be used to create a multimap. The user can instantiate the class as `collections.defaultdict(list)`.
In C++03, the compiler must instantiate a template whenever a fully specified template is encountered in a translation unit. If the template is instantiated with the same types in many translation units, this can dramatically increase compile times. There is no way to prevent this in C++03, so C++11 introduced extern template declarations, analogous to extern data declarations. C++03 has this syntax to oblige the compiler to instantiate a template: template class std::vector; C++11 now provides this syntax: extern template class std::vector; which tells the compiler not to instantiate the template in this translation unit.
The generic instance then behaves just like any other unit. It is possible to instantiate generic units at run-time, for example inside a loop.
COM also has support for multiple implementations of the same interface, so that clients at runtime can choose which implementation of an interface to instantiate.
In the Cariban language Panare, future, desiderative, and nonspecific aspect clauses instantiate the nominative–absolutive alignment. An example is given below. Yutësejpa (këj) kën. s-V s.
Biomathematical models are being developed to instantiate the biological dynamics of sleep need and circadian timing. These models could predict astronaut performance relative to fatigue and circadian desynchronization.
The models can be exploited in a transparent way, one has just to instantiate their associated provided classes. Their experimentation on the radio network design real-world application demonstrate their efficiency.
1 XMLStreamReader :This example illustrates how to instantiate an input factory, create a reader and iterate over the elements of an XML document. XMLInputFactory xmlInputFactory = XMLInputFactory.newInstance(); XMLStreamReader xmlStreamReader = xmlInputFactory.createXMLStreamReader(...); while (xmlStreamReader.
The most important elements of the story line are the objects and so to extract any story line from an image the first and the most important task is to instantiate the objects in it, and that is what the query engine does.
Under this view, for example, I and a computer can both instantiate ("realize") the same functional state though we are made of completely different material stuff (see graphic at right). On this basis functionalism can be classified as a form of token materialism.
Reflection is used to instantiate classes and invoke methods using their names, a concept that allows for dynamic programming. Classes, interfaces, methods, fields, and constructors can all be discovered and used at runtime. Reflection is supported by metadata that the JVM has about the program.
Open source product development (OSPD) refers to the development of open- source hardware products performed in a collaborative development process allowing the participation of any interested person. Open source product development instantiate the concept of open-source model in the context of physical products.
An illustration of multiple realizability. M stands for mental and P stands for physical. It can be seen that more than one P can instantiate one M, but not vice versa. Causal relations between states are represented by the arrows (M1 goes to M2, etc.).
Macros are capable of conditional control over compilation based on predetermined criteria, but cannot instantiate new types, recurse, or perform type evaluation and in effect are limited to pre-compilation text-substitution and text- inclusion/exclusion. In other words, macros can control compilation flow based on pre-defined symbols but cannot, unlike templates, independently instantiate new symbols. Templates are a tool for static polymorphism (see below) and generic programming. In addition, templates are a compile time mechanism in C++ that is Turing-complete, meaning that any computation expressible by a computer program can be computed, in some form, by a template metaprogram prior to runtime.
The ability to instantiate any object known to the local process from any other process is a known security vulnerability, and Apple strongly discourages use of PDO for that reason. In addition to the OS X platform, there is GNUstep, which has its own implementation of Distributed Objects.
From an easy-to-use client or desktop application, any administrator or designated end user is able to easily instantiate a server instance or virtual machine (VM) instance. The server instance is provisioned for the eligible administrator or end user without anyone having to physically touch the supporting server infrastructure. While defining the server or VM to instantiate the client application gives the end user or administrator the ability to define the operating system and applications that will run within the server instance to be provisioned automatically. Desktop dynamic provisioning environment (desktop DPE) or client dynamic provisioning environment (client DPE) is the scenario where a DPE is being used to provision client computing or desktop computing instances.
A person, for example, had- at-t1 bentness and had-at-t2 straightness. It seems like that objects can at different times through different ways obtain properties. After such treatment, objects that exist can through different ways at different times instantiate different intrinsic properties (these properties are not related to time directly).
Having some common unimportant attributes together with a person does not instantiate that the same will happen for oneself. In the case of the Van Gogh fallacy, sharing the misunderstood and poor attribute with Van Gogh does not equate to an individual sharing the same fate (i.e., getting recognized as a great artist).
His argument runs as follows: Necessarily, there are some abstract objects, such as numbers. The only possible abstract objects are sets or universals, but both of these depend on the existence of concrete objects (for sets, their members; for universals, the things that instantiate them). Therefore, there are necessarily some concrete objects.
210, "III. Rule for Eliminating Atomic Formulas". however, their algorithm required trying all ground instances of the given formula. This source of combinatorial explosion was eliminated in 1965 by John Alan Robinson's syntactical unification algorithm, which allowed one to instantiate the formula during the proof "on demand" just as far as needed to keep refutation completeness.
The Software Communications Architecture (SCA) is an open architecture framework that defines a standard way for radios to instantiate, configure, and manage waveform applications running on their platform. The SCA separates waveform software from the underlying hardware platform, facilitating waveform software portability and re-use to avoid costs of redeveloping waveforms. The latest version is SCA 4.1.
The realist school claims that universals are real – they exist and are distinct from the particulars that instantiate them. There are various forms of realism. Two major forms are Platonic realism and Aristotelian realism.Price (1953), among others, sometimes uses such Latin terms Platonic realism is the view that universals are real entities and they exist independent of particulars.
It is not necessary to actually own a good to exhibit the mere ownership effect. Simply touching or imagining that one owns a good is enough to instantiate the mere ownership effect. The mere ownership effect is often used as a case in which people show the endowment effect that cannot be parsimoniously explained by loss aversion.
Derbyshire, 1987: 313-315 As a result, Panare and its neighboring languages often use case markings as a way of ordering how constituents of a sentence affect each other.Payne & Payne, 2013Derbyshire, 1987 Future, desiderative, and nonspecific aspect clauses in Panare instantiate the cross-linguistically rare nominative–absolutive alignment. An example is given below. Yutësejpa (këj) kën.
A sample UML class and sequence diagram for the Prototype design pattern. In the above UML class diagram, the `Client` class that requires a `Product` object doesn't instantiate the `Product1` class directly. Instead, the `Client` refers to the `Prototype` interface for cloning an object. The `Product1` class implements the `Prototype` interface by creating a copy of itself.
Mereological nihilism is an extreme eliminative position. Mereological nihilism denies that any objects actually instantiate the parthood relation appealed to in theoretical descriptions of mereology. If there are no relationships that count as parthood relationships, then there are no composite objects. One may initially seek to reject such a position by pointing to its counterintuitive conclusions.
A generic formal parameter is a value, a variable, a constant, a type, a subprogram, or even an instance of another, designated, generic unit. For generic formal types, the syntax distinguishes between discrete, floating- point, fixed-point, access (pointer) types, etc. Some formal parameters can have default values. To instantiate a generic unit, the programmer passes actual parameters for each formal.
During application loading, the Windows loader searches for the manifest. If it is present, the loader adds information from it to the activation context When the COM class factory tries to instantiate a class, the activation context is first checked to see if an implementation for the CLSID can be found. Only if the lookup fails is the registry scanned.
Mental imagery can act as a substitute for the imagined experience: Imagining an experience can evoke similar cognitive, physiological, and/or behavioral consequences as having the corresponding experience in reality. At least four classes of such effects have been documented. # Imagined experiences are attributed evidentiary value like physical evidence. # Mental practice can instantiate the same performance benefits as physical practice.
SpaceX uses a triple-redundant design in the Merlin engine computers. The system uses three computers in each processing unit, each constantly checking on the others, to instantiate a fault-tolerant design. One processing unit is part of each of the ten Merlin engines (nine on the first stage, one on the second stage) used on the Falcon 9 launch vehicle.
GtkBuilder is the XML format that the Glade Interface Designer uses to save its forms. These documents can then be used in conjunction with the GtkBuilder object to instantiate the form using GTK. GladeXML is the XML format that was used with conjunction with libglade, which is now deprecated. Glade Interface Designer automatically generates all the source code for a graphical control element.
This script, for example an index.php, would handle all tasks that are common to the application or the framework, such as session handling, caching, and input filtering. Based on the specific request, it would then instantiate further objects and call methods to handle the particular task(s) required. The alternative to a front controller would be individual scripts like login.
Minima naturalia ("natural minima") were theorized by Aristotle as the smallest parts into which a homogeneous natural substance (e.g., flesh, bone, or wood) could be divided and still retain its essential character. In this context, "nature" means formal nature. Thus, "natural minimum" may be taken to mean "formal minimum": the minimum amount of matter necessary to instantiate a certain form.
During application loading, the Windows loader searches for the manifest. If it is present, the loader adds information from it to the activation context. When the COM class factory tries to instantiate a class, the activation context is first checked to see if an implementation for the CLSID can be found. Only if the lookup fails is the registry scanned.
Some contend that phenomenal states are part of the concepts that refer to them. For instance, Papineau suggests that phenomenal concepts are quotational, like saying "That state: ___." Katalin Balog defends a constitutional account of phenomenal concepts, in which "token experiences serve as modes of presentation of the phenomenal properties they instantiate." For instance, the concept of pain is partly constituted by a token experience of pain.
The sentence "they drive the same car" is ambiguous. Do they drive the same type of car (the same model) or the same instance of a car type (a single vehicle)? Clarity requires us to distinguish words that represent abstract types from words that represent objects that embody or exemplify types. The type–token distinction separates types (abstract descriptive concepts) from tokens (objects that instantiate concepts).
The common property of all categories is that they can be predicated of an entity. Categories in GFO are further divided in immanent universals, conceptual structures and symbolic structures. Immanent universals are so-called Aristotlian universals, in the sense that they are considered in re. This means, that these universals exist in all the entities which instantiate an immanent universal, independent of an observer.
An Internet Explorer shell is any computer program (web browser or otherwise) that uses the Internet Explorer layout engine, known as MSHTML. This engine is closed-source, but Microsoft has exposed an application programming interface (API) that permits the developers to instantiate either MSHTML or a full- fledged chromeless Internet Explorer (known as the WebBrowser control) within the graphical user interface of their software.
Users can also drag-and-drop web pages into the world and continue browsing in a multi- user context. Any .svg documents dropped into the world will automatically instantiate an in-world whiteboard for collaborative editing of the document. After editing, the whiteboard documents can be dragged back out onto the desktop for e-mailing to others or for editing with a different application.
One can also use PowerShell embedded in a management application, which uses the PowerShell runtime to implement the management functionality. For this, PowerShell provides a managed hosting API. Via the APIs, the application can instantiate a runspace (one instantiation of the PowerShell runtime), which runs in the application's process and is exposed as a `Runspace` object. The state of the runspace is encased in a `SessionState` object.
Singletons can be a useful tool when developing with Unity, due to the unique way classes are instantiated. This method is preferred over constructor hiding as it is possible to instantiate an object with a hidden constructor in Unity. In order to prevent Instance from being overwritten, a check must be performed to ensure Instance is null. If Instance is not null, the GameObject containing the offending script should be destroyed.
Every usage of an array or struct type instantiates a new concrete type, or reuses a previous instantiated type. Array element types and struct element types are parameterized types, which are used to instantiate the corresponding generic type. All this is usually built-in in the compiler and the syntax differs from other generic constructs. Some extensible programming languages try to unify built-in and user defined generic types.
A jade statue of a skeletal Xolotl carrying a solar disc bearing an image of the Sun on his back (called "the Night Traveler") succinctly portrays Xolotl's role in assisting the Sun through the process of death, gestation, and rebirth. Xolotl's association with ollin motion-change suggests proper completions and gestations must instantiate ollin motion-change. Ollin-shaped decomposition and integration (i.e., death) promote ollin-shaped composition and integration (i.e.
In summary, a template is a compile-time parameterized function or class written without knowledge of the specific arguments used to instantiate it. After instantiation, the resulting code is equivalent to code written specifically for the passed arguments. In this manner, templates provide a way to decouple generic, broadly applicable aspects of functions and classes (encoded in templates) from specific aspects (encoded in template parameters) without sacrificing performance due to abstraction.
In the third case automatic deduction of `max(3, 7.0)` would fail because the type of the parameters must in general match the template arguments exactly. Therefore, we explicitly instantiate the `double` version with `max()`. This function template can be instantiated with any copy-constructible type for which the expression `y > x` is valid. For user- defined types, this implies that the greater-than operator (`>`) must be overloaded in the type.
Sketchpad was the first program ever to utilize a complete graphical user interface. The clever way the program organized its geometric data pioneered the use of "master" ("objects") and "occurrences" ("instances") in computing and pointed forward to object oriented programming. The main idea was to have master drawings which one could instantiate into many duplicates. If the user changed the master drawing, all the instances would change as well.
Green theory is complex in its management of policy networks. The New Age idea of "segmented, polycentric, integrated networks" (SPINs) suggests a possible complex replacement for capitalism. In public administration the idea of "governance" systems addresses some of the complexity. Pierre Teilhard de Chardin's idea of "noosphere" as a connection and link thick environment where multilateral group, system, organization, and network interrelations can instantiate human wisdom is also possible for Green theory.
The trigger causes the environment to instantiate a context object. The type of object is chosen according to the kind of use case that will ensue, based on information about the trigger or the system state or both. For example, a cash machine might have separate Context classes for money transfer, withdrawal, deposit, balance inquiry, and so forth. Once the environment instantiates the Context object, it invokes its trigger method to start the use case enactment.
It is sometimes useful to modify a VHD file without booting an operating system. Hyper-V features offline VHD manipulation, providing administrators with the ability to securely access files within a VHD without having to instantiate a virtual machine. This provides administrators with granular access to VHDs and the ability to perform some management tasks offline. The Windows Disk Management MMC plugin can directly mount a VHD file as a drive letter in Windows 7/Server 2008 and newer.
In computer science, separation of concerns (SoC) is a design principle for separating a computer program into distinct sections such that each section addresses a separate concern. A concern is a set of information that affects the code of a computer program. A concern can be as general as "the details of the hardware for an application", or as specific as "the name of which class to instantiate". A program that embodies SoC well is called a modular program.
Dragon uses a "radiation-tolerant" design in the electronic hardware and software that make up its flight computers. The system uses three pairs of computers, each constantly checking on the others, to instantiate a fault-tolerant design. In the event of a radiation upset or soft error, one of the computer pairs will perform a soft reboot. Including the six computers that make up the main flight computers, Dragon employs a total of 18 triple- processor computers.
At its core, erwin has a computer-aided software engineering tool (or CASE tool). Users can utilize erwin Data Modeler as a way to take conceptual data model and create a logical data model that is not dependent on a specific database technology. This schematic model can be used to create the physical data model. Users can then forward engineer the data definition language required to instantiate the schema for a range of database-management systems.
" During the Cold War, Rousseau was criticized for his association with nationalism and its attendant abuses, for example in . This came to be known among scholars as the "totalitarian thesis". Political scientist J.S. Maloy states that "the twentieth century added Nazism and Stalinism to Jacobinism on the list of horrors for which Rousseau could be blamed. ... Rousseau was considered to have advocated just the sort of invasive tampering with human nature which the totalitarian regimes of mid-century had tried to instantiate.
When it is necessary to work with a large number of objects that are particularly expensive to instantiate and each object is only needed for a short period of time, the performance of an entire application may be adversely affected. An object pool design pattern may be deemed desirable in cases such as these. The object pool design pattern creates a set of objects that may be reused. When a new object is needed, it is requested from the pool.
C# satisfies the use-cases for these by providing anonymous delegates; see event handling for more about this. C# also provides a feature called anonymous types/classes, but it is rather different from Java's concept with the same name. It allows the programmer to instantiate a class by providing only a set of names for the properties the class should have, and an expression to initialize each. The types of the properties are inferred from the types of those expressions.
A principled account of the composition relationship will appeal to a general characteristic which is sufficient to instantiate the relationship. Many of these accounts appeal to characteristics derived from intuitive notions about what does or does not allow objects to function as parts in a whole. Two such proposed restricting characteristics are connection and cohesion (Van Cleve, 2008). First, connection is the stipulation that objects must be spatially continuous to some degree in order to be considered parts composing a whole.
The school of realism makes the claim that universals are real and that they exist distinctly from the particulars that instantiate them. Two major forms metaphysical realism are Platonic realism (universalia ante res), meaning "'universal before things'" and Aristotelian realism (universalia in rebus), meaning "'universals in things'". Platonic realism is the view that universals are real entities existing independent of particulars. Aristotelian realism, on the other hand, is the view that universals are real entities, but their existence is dependent on the particulars that exemplify them.
"Define an interface for creating an object, but let subclasses decide which class to instantiate. The Factory method lets a class defer instantiation it uses to subclasses." (Gang Of Four) Creating an object often requires complex processes not appropriate to include within a composing object. The object's creation may lead to a significant duplication of code, may require information not accessible to the composing object, may not provide a sufficient level of abstraction, or may otherwise not be part of the composing object's concerns.
Scientific essentialism, a view espoused by Saul Kripke and Hilary Putnam, maintains that there exist essential properties that objects possess (or instantiate) necessarily. In other words, having such and such essential properties is a necessary condition for membership in a given natural kind. For example, tigers are tigers in virtue of possessing a particular set of genetic properties, but identifying (or appearance-based) properties are nonessential properties. If a tiger lost a leg, or didn't possess stripes, we would still call it a tiger.
In the languages of the Tuparian branch, main clauses commonly instantiate the nominative–absolutive pattern. Person prefixes on the verb are absolutive, i.e., they index the sole argument of an intransitive verb (S) and the patient argument ('direct object') of a transitive verb (P). Person pronouns, which follow the verb (either cliticizing to it or not) are nominative: they may encode the sole argument of an intransitive verb (S) or the agent argument of a transitive verb (A), but not the patient of a transitive verb (P).
A sample UML class and sequence diagram for the Dependency Injection design pattern. In the above UML class diagram, the `Client` class that requires `ServiceA` and `ServiceB` objects does not instantiate the `ServiceA1` and `ServiceB1` classes directly. Instead, an `Injector` class creates the objects and injects them into the `Client`, which makes the `Client` independent of how the objects are created (which concrete classes are instantiated). The UML sequence diagram shows the run-time interactions: The `Injector` object creates the `ServiceA1` and `ServiceB1` objects.
An interpretation (or model) of a first-order formula specifies what each predicate means, and the entities that can instantiate the variables. These entities form the domain of discourse or universe, which is usually required to be a nonempty set. For example, in an interpretation with the domain of discourse consisting of all human beings and the predicate "is a philosopher" understood as "was the author of the Republic", the sentence "There exists a such that a is a philosopher" is seen as being true, as witnessed by Plato.
By 2003, all development on Zenozoik was halted as Andres and Carlos were hired by local game developer Wanako Games. During their time at Wanako Games, they met their soon-to-be company partner, David Caloguerea, and contributed to several of the studio's games, including Assault Heroes. However, most games developed at Wanako Games were casual games, so in 2007, Andres, Carlos and Caloguerea left Wanako Games to re-instantiate ACE Team. Development on Zenozoik continued and was moved over to the id Tech 4 engine, then to Source.
A group of regents appointed by then-Governor Rick Perry attempted to instantiate the "Seven Breakthrough Solutions" of Austin entrepreneur Jeff Sandefer. Sandefer's ideas for the restructuring of the University were thought by many to be inimical to its research mission. Perry had endorsed the "seven solutions" at a private meeting attended by two of his appointed regents at the Texas Public Policy Foundation in 2008. In the face of mounting pressure from the Board of Regents to implement Sandefer's program, Powers remained steadfast in his support for the University's traditional role and shape.
Fusebox 4 was a complete rewrite of Fusebox 3. The license for the core files (which is open source) is held by a private company owned by Hal Helms and John Quarto-von Tivadar: The Fusebox Corporation (which appears to be a defunct corporation). Fusebox 4.1 introduced some new XML grammar elements beyond those available in 4.0 that let you declare, instantiate and manipulate objects (COM, Java and ColdFusion Components) as well as web services. These features have provided Fusebox developers with the means of tying object-oriented models (i.e.
In computing, static dispatch is a form of polymorphism fully resolved during compile time. It is a form of method dispatch, which describes how a language or environment will select which implementation of a method or function to use. Examples are templates in C++, and generic programming in other languages, in conjunction with function overloading (including operator overloading). Code is said to be monomorphised, with specific data types deduced and traced through the call graph, in order to instantiate specific versions of generic functions, and select specific function calls based on the supplied definitions.
Mirzayanov gives somewhat different structures for Novichok agents in his autobiography than those which have been identified by Western experts. The Western formulations suffered from imperfect information, as can be seen in Fig. 1 of Chai et al in which Mirzayanov describes a family of compounds whereas Western scientists instantiate a particular salt. Mirzyanov makes clear that a large number of compounds were made, and many of the less potent derivatives were reported in the open literature as new organophosphate insecticides,eg: Sokolov VB, Martynov IV. Effect of Alkyl Substituents in Phosphorylated Oximes.
A PROMELA definition can be used to introduce a new name for a list of data objects of predefined or earlier defined types. The new type name can be used to declare and instantiate new data objects, which can be used in any context in an obvious way: The access to the fields declared in a typedef construction is done in the same manner as in C programming language. For example: MyStruct x; x.Field1 = 1; is a valid PROMELA sequence that assigns to the field Field1 of the variable x the value 1.
A Mobile Web Server is software designed for modern-day smartphones to host personal web servers, through the use of open sourced software, such as, i-jetty, an open source software, based on jetty. I-jetty is an open source web container, serving Java-based web content such as, servlets and JSPs. Jetty is written in Java and its API is available as a set of JARs. Developers can instantiate a jetty container as an object, instantly adding network and web connectivity to a stand-alone Java app.
A paradigmatic example of "Gestalt qualities" is a melody, which sounds the same in any key. In 1890, Christian von Ehrenfels attributed these qualities to melodies as "a positive quality of presentation," not something projected upon sense data. Ehrenfels extended these qualities to "Gestalt qualities of a higher order," (such as marriage, service, theft, and war) concepts that retain their identity even though the examples that instantiate them change. For philosophers and psychologists of the 1890s, it was not clear whether these qualities of structure were philosophical or psychological.
Ontological disputes do not revolve around what particular matter is present; rather, the center of disputation is what objects can be said to be instantiated by a given collection of matter. The token objects posited by a given ontology may be classified as instances of one or more distinct object types. As the types of objects accepted proliferate, so do the possible tokens that a given collection of matter can be said to instantiate. This creates variations in size between ontologies, which serve as an arena for disputes among philosophers.
GNU Guix () is a cross-platform package manager and a tool to instantiate and manage Unix-like operating systems, based on the Nix package manager with Guile Scheme APIs and specializes in providing exclusively free software. GNU Guix is the default package manager of the GNU Guix System GNU/Linux distribution. Differing from traditional package managers, Guix (like Nix) utilizes a purely functional deployment model where software is installed into unique directories generated through cryptographic hashes. Dependencies from each software are included within each hash, solving the problem of dependency hell.
Alex Rosenberg developed a theory of structural resemblance or physical isomorphism which could explain how neural states can instantiate truth within the correspondence theory of truth. Neuroscientists use the word “representation” to identify the neural circuits’ encoding of inputs from the peripheral nervous system in, for example, the visual cortex. However, neuroscientists use the word “representation” without according it any commitment to intentional content. In fact, there is an explicit commitment to describing neural representations in terms of structures of neural axonal discharges that are physically isomorphic to the inputs that cause them.
The diagram shows that more than one P can instantiate one M, but not vice versa. Causal relations between states are represented by the arrows (M1 goes to M2, etc.) One can solve these problems, according to Fodor, with functionalism, a hypothesis which was designed to overcome the failings of both dualism and reductionism. What is important is the function of a mental state regardless of the physical substrate which implements it. The foundation for this view lies in the principle of the multiple realizability of the mental.
In the above UML class diagram, the `Client` class that requires `ProductA` and `ProductB` objects does not instantiate the `ProductA1` and `ProductB1` classes directly. Instead, the `Client` refers to the `AbstractFactory` interface for creating objects, which makes the `Client` independent of how the objects are created (which concrete classes are instantiated). The `Factory1` class implements the `AbstractFactory` interface by instantiating the `ProductA1` and `ProductB1` classes. The UML sequence diagram shows the run-time interactions: The `Client` object calls `createProductA()` on the `Factory1` object, which creates and returns a `ProductA1` object.
Going back to the problem of universals, for six different objects to all be green would be for each object to instantiate the universal green. The very same, identical universal green would be wholly located at each green object. To be even more specific, if a frog and a leaf are the same shade of green, the green of the frog and the green of the leaf are one and the same entity (qua green-ness), which happens to be multiply located. D. C. Williams and Keith Campbell, among others, reject instantiated universals in favor of tropes.
Desktop computing is increasingly relying on web services, making the thin client approach more viable. Departmental boot images may remain but simply instantiate part of a semantic service-oriented architecture, especially in larger organizations. A service component architecture would further simplify the implementation of control mechanisms, especially if a single application language like Java was used for all custom applications in the enterprise. More importantly, shift to software as a service by most large vendors means that applications are not tied to machines, so the number of variant boot images required (with the applications installed) is reduced.
Using this structure, a class definition file containing the declaration of the class and its members is also created. If the class definition has been included and the implementation file for its methods is available, the user can instantiate an object of the class. The purpose of this structure is to keep the implementation code hidden, but allow the user to view the design. Users make use of the public interface of an object so as to make creating objects as simple as possible, ensuring that client code does not distract the user with unnecessary details of the class's implementation.
Tumminio Hansen believes that that the terms most commonly used for sexual violations—including “rape” and “sexual assault”—fail to represent the scope of sexual harm, especially among marginalized populations and when harm fails to represent rape scripts and stereotypes. She proposes in “Absent a Word” that the linguistic gaps in matters of sexual violations instantiate concrete harm to victims. In “Remembering Rape in Heaven,” Tumminio Hansen argues against Miroslav Volf’s proposal that trauma must be forgotten in the eschaton. She suggests that such a proposal raises serious concerns concerning victim epistemic credibility, divine beneficence, and the purpose of remembering the biblical corpus.
The Port Inland Distribution Network involves new or expanded transportation systems for redistribution by barge and rail for the shipped goods and containers that are delivered at area ports in an effort to curtail the use of trucks and their burden on the environment, traffic, and highway systems. The Port Authority of New York and New Jersey (PANYNJ), New Jersey Department of Transportation (NJDOT), and Delaware Valley Regional Planning Commission (DVRPC), are involved in initiatives to review and develop this network. To instantiate PIDN, the PANYNJ signed an agreement November 29, 2003 with the Port of Albany to provide twice weekly barge service. By 2014, the service had been discontinued.
According to Gordon, socialist feminism of the 1980s expanded upon the concept of intersectionality by examining the overlapping structures that instantiate oppression. Feminist scholar and women's studies professor Elizabeth Lapovsky Kennedy says that this broader analysis of societal structures began with socialist feminism and served as a catalyst for feminist scholarship. Kennedy says that many of the first women's studies programs were established by socialist feminist theorists. Despite the claims of being a homogenizing philosophy that erases difference of identity, socialist feminism's inherent approach to difference of identities, through an analysis of economic exploitation of all, is both recognized and enhanced by Crenshaw's intersectionality.
Painted Coat of Arms of Pope Paul V, ceiling of the room of the geographical maps, Vatican City Stained glass of the Saint-Paul church in Montluçon France Allegory of Justice. Ceiling of galleria del Poccetti in the Palazzo Pitti (Florence) In a world where people are interconnected but they disagree, institutions are required to instantiate ideals of justice. These institutions may be justified by their approximate instantiation of justice, or they may be deeply unjust when compared with ideal standards – consider the institution of slavery. Justice is an ideal the world fails to live up to, sometimes due to deliberate opposition to justice despite understanding, which could be disastrous.
Questions of ecclesiastical government are first documented in the first chapters of the Acts of the Apostles and "theological debate about the nature, location, and exercise of authority, in the church" has been ongoing ever since. The first act recorded after the Ascension of Jesus Christ was the election of Saint Matthias as one of the Twelve Apostles, to replace Judas Iscariot. The Twelve Apostles were the first to instantiate the episcopal polity of Christianity. During the Protestant Reformation, reformers asserted that the New Testament prescribed an ecclesiastical government different from the episcopal polity maintained by the Catholic Church, and consequently different Protestant bodies organized into different types of polity.
A closed tableau can always be found by ruling out this and similar "unfair" policies of application of tableau rules. The rule for universal quantifiers (\forall) is the only non-deterministic rule, as it does not specify which term to instantiate with. Moreover, while the other rules need to be applied only once for each formula and each path the formula is in, this one may require multiple applications. Application of this rule can however be restricted by delaying the application of the rule until no other rule is applicable and by restricting the application of the rule to ground terms that already appear in the path of the tableau.
The dramatic difference between standard and colloquial dialects is particularly evident in cases of verbal morphology, the clitic system, the subjunctive, and inflected infinitives in Brazilian Portuguese. Pires and Rothman (2009) found that Brazilian Portuguese heritage learners do not acquire inflected infinitives because their input does not "robustly instantiate these forms". Similarly, Dominguez (2009) found that deviations in the use and distribution of indicative and subjunctive forms that were in the output of heritage Spanish speakers were also found in the children's input (parental speech). In certain cases, heritage language learners receive their input from first-generation migrants who have shown effects of attrition in certain domains.
In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. Traditionally, provable security is asymptotic: it classifies the hardness of computational problems using polynomial-time reducibility. Secure schemes are defined to be those in which the advantage of any computationally bounded adversary is negligible. While such a theoretical guarantee is important, in practice one needs to know exactly how efficient a reduction is because of the need to instantiate the security parameter - it is not enough to know that "sufficiently large" security parameters will do.
Genre pedagogy is meant to focus the student's attention on the purpose of a given piece of text, through the lens of genre. Some perspectives favor instruction on the specific traits of a given established genre, particularly for those who are learning English as a second language. Others espouse the view that students should learn to identify elements of writing—style and conventions, for example—which denote its usefulness in a given setting as genre elements and know when to use them appropriately. Another form of genre pedagogy involves evaluating the characteristics of given genres, including the sensibilities they instantiate and which individuals or perspectives are excluded by them.
Qutb's mature political views always centered on Islam – Islam as a complete system of morality, justice and governance, whose sharia laws and principles should be the sole basis of governance and everything else in life – though his interpretation of it varied. Qutb's political philosophy has been described as an attempt to instantiate a complex and multilayer eschatological vision, partly grounded in the counter-hegemonic re-articulation of the traditional ideal of Islamic universalism. Following the 1952 coup, he espoused a 'just dictatorship' that would 'grant political liberties to the virtuous alone.'Sivan, Emmanuel, Radical Islam : Medieval Theology and Modern Politics, Yale University Press, 1985, p.
To instantiate a template, compilers substitute specific arguments for a template's parameters to generate a concrete function or class instance. Some substitutions are not possible; these are eliminated by an overload resolution policy described by the phrase "Substitution failure is not an error" (SFINAE). Templates are a powerful tool that can be used for generic programming, template metaprogramming, and code optimization, but this power implies a cost. Template use may increase code size, because each template instantiation produces a copy of the template code: one for each set of template arguments, however, this is the same or smaller amount of code that would be generated if the code was written by hand.
The argument in formal logic starts with assuming the validity of naming (X → Y) as X. However, this is not a valid starting point. First we must deduce the validity of the naming. The following theorem is easily proved and represents such a naming: In the above statement the formula A is named as X. Now attempt to instantiate the formula with (X → Y) for A. However, this is not possible, as the scope of \exists X is inside the scope of \forall A . The order of the quantifiers may be reversed using Skolemization: However, now instantiation gives which is not the starting point for the proof and does not lead to a contradiction.
It is clear that the interesting questions about the attributes and the relations come after the instantiation questions, and so the query generator aims at instantiating as many objects as possible. Instantiation questions are composed of both the existence and the uniqueness questions, but it is the uniqueness questions that actually instantiate an object if they get a positive response. So if the query generator has to randomly pick an instantiation question, it prefers to pick an unpredictable uniqueness question if present. If such a question is not present, the query generator picks an existence question such that it will lead to a uniqueness question with a high probability in the future.
The GNU logo The GNAT Modified General Public License (short: Modified GPL, GMGPL) is a version of the GNU General Public License specifically modified for compiled units and for the generic feature found in the Ada programming language. The modification is as follows: :As a special exception, if other files instantiate generics from this unit, or you link this unit with other files to produce an executable, this unit does not by itself cause the resulting executable to be covered by the GNU General Public License. This exception does not however invalidate any other reasons why the executable file might be covered by the GNU Public License. The GNAT Ada compiler can automate conformance checks for some GPL software license issues via a compiler directive.
To build highly reliable and scalable services, NFV requires that the network be able to instantiate VNF instances, monitor them, repair them, and (most important for a service provider business) bill for the services rendered. These attributes, referred to as carrier-gradeDon’t Confuse ‘High Availability’ with Carrier Grade , Embedded Community, Charlie Ashton, April, 2014 features, are allocated to an orchestration layer in order to provide high availability and security, and low operation and maintenance costs. Importantly, the orchestration layer must be able to manage VNFs irrespective of the underlying technology within the VNF. For example, an orchestration layer must be able to manage an SBC VNF from vendor X running on VMware vSphere just as well as an IMS VNF from vendor Y running on KVM.
The first conference was held in Nuevo Casas Grandes, Chihuahua, in 1980. The conference in 2009 was the 27th such meeting; the conference planned for 1985 failed to instantiate, no conferences were held in 1986 and 1988, and in 1995 the Mexican governors held their own conference due to a lack of U.S. representation. From the beginning, the Border Governors Conference has discussed the hottest issues affecting the border, such as immigration and trade. The 1981 conference in El Paso, Texas, reached an impasse over whether to support U.S. President Ronald Reagan's proposed immigration reforms, which would grant amnesty to illegal aliens but require a 90 percent reduction in the number of undocumented Mexican workers entering the U.S. each year.
A SharedObject can be used to synchronize complicated data structures and call remote methods on multiple clients in one go by having clients subscribe to a shared object. Standard ActionScript objects are transported across the NetConnection using the Action Message Format (AMF) which is handled transparently by the server and flash client. The server also allows users to receive and publish net streams. When viewing a net stream the user can either create their own to view a remotely stored Flash Video HTML5 (FLV) or the server can instantiate a net stream and play a video on it, the latter method means that every user will be at the same point in the video when they subscribe to it as they are all viewing the same stream.
The focus is on semantic aspects and shared meanings, while syntax is thought in a perspective based on formal logic mapping. Conceptualization and representation play fundamental roles in thinking, communicating, and modeling. For each concept there is a triad of 1) the concept in our minds, 2) the real-world things conceptualized by the concept, and 3) a representation of the concept that we can use to think and communicate about the concept and its corresponding real-world things. (Note that real-world things include both concrete things and representations of those concrete things as records and processes in operational information systems.) A conceptual model is a formal structure representing a possible world, comprising a conceptual schema and a set of facts that instantiate the conceptual schema.
According to Socrates, physical objects and physical events are "shadows" of their ideal or perfect forms, and exist only to the extent that they instantiate the perfect versions of themselves. Just as shadows are temporary, inconsequential epiphenomena produced by physical objects, physical objects are themselves fleeting phenomena caused by more substantial causes, the ideals of which they are mere instances. For example, Socrates thinks that perfect justice exists (although it is not clear where) and his own trial would be a cheap copy of it. The Allegory of the Cave is intimately connected to his political ideology, that only people who have climbed out of the cave and cast their eyes on a vision of goodness are fit to rule.
For example, a method executed in the past may have modified the value of an object field, which is used to determine the resource being accessed. That method may have already popped out from the stack when the stack inspection takes place. Other limitations of the Java security model is that certain permissions are implicitly equivalent to Java's `AllPermission`. These include the permission to change the current security manager (and replace it with one that could potentially bypass the stack inspection), the permission to instantiate and use a custom class loader (which could choose to associate `AllPermission` to a malicious class upon loading it), and the permission to create a custom permission (which could potentially declare itself as powerful as `AllPermission` via a malicious implementation of its `implies` method).
In his books, The Unconscious Abyss and Origins, Mills develops a psychoanalytic metaphysics called “dialectical psychoanalysis” or “process psychology” based on neo- Hegelian principles, which places the unconscious at the heart of all psychic activity. He argues that the mind is ontologically constituted through unconscious genesis, and that subjectivity is conditioned a priori by unconscious agency, which is responsible for all forms of mental life to transpire, including higher modes of consciousness, contrary to contemporary views in the philosophy of mind that place causal primacy on consciousness. Rather than demote the mind to biological reductionism, unconscious processes are conceived as a series of psychic spacings that instantiate themselves through a multitude of schemata, which are the building blocks of psychic reality. He makes the controversial claim that unconscious semiotics condition and underlie the structure and function of language, subjectivity, and social dynamics.
Core to the Shepherd model of user space initialisation is the concept of the extension, a form of composability where services are designed to be layered onto other services, augmenting them with more elaborate or specialised behaviours as desired. This expresses the instantiation-based dependency relationships found in many modern init systems, making the system modular, but also allows services to interact variadically with other services in arbitrary ways. Shepherd also provides so-called virtual services which allow dynamic dispatch over a class of related service objects, such as all those which instantiate a mail transfer agent (MTA) for the system. A system governed via the Shepherd daemon can represent its user space as a directed acyclic graph, with the "system-service" − responsible for early phases of boot and init − as its root, and all subsequently initialised services as extensions to system-service's functionality, either directly or transitively over other services.
The Mongolian Stock Exchange was established in 1991 as a vehicle to implement the government's plan for privatisation of large state-owned enterprises. In an attempt to ensure an equitable distribution of assets, the Mongolian government chose to instantiate a voucher-based scheme; one blue voucher worth MNT7,000 was issued to every citizen born before 31 May 1991 for the purchase of shares in large enterprises, and a nationwide network of 29 brokerage houses was established to take their orders. Red vouchers worth MNT3,000 were also issued for the purchase of the assets of small enterprises which would not be listed on the exchange; unlike the blue vouchers, these could be traded in secondary markets. Initially, stock exchange officials hoped to privatise 80% of state assets, but, on 7 June 1991, Government Resolution No. 170 announced that the state would retain a stake of 50% in some large enterprises; mining, energy, transportation, communications, and water supply companies were excluded from the privatisation scheme entirely.
In a proof-of-concept endeavour, the developers successfully deployed BioSLAX as instances on a pool of resources using both VMWare's ESXi and Citrix Xen's Hypervisors. Their aim was to effectively create a "BioSLAX CLOUD" where students and staff may instantiate any number BioSLAX servers dynamically for research and education (conduct bioinformatics practical labs by having students connect to the servers via suitable X Window clients such as X-Win32, VNC, Exceed and NoMachine NX) or deployed in such a manner which when used in conjunction with the UD Grid mpagent may be used to form a cluster for processing large jobs. The proof-of-concept was highly successful in being deployed for research and education for the Life Science Curriculum at NUS and in 2011, a number of the BioSLAX cloud instances, both on VMWare's vSphere and Citrix Xen servers, were used in the APBioNet project, BioDB100. The backend controls and automation were created and implemented using the various APIs for vSphere and Xen by Mr. Mark De Silva.
Paulo S. L. M. Barreto (born 1965) is a Brazilian cryptographer and one of the designers of the Whirlpool hash function and the block ciphers Anubis and KHAZAD, together with Vincent Rijmen. He has also co-authored a number of research works on elliptic curve cryptography and pairing-based cryptography, including the eta pairing technique, identity-based cryptographic protocols, and the family of Barreto-Naehrig (BN) pairing-friendly elliptic curves. More recently he has been focusing his research on post-quantum cryptography, being one of the discoverers of quasi-dyadic codes and quasi-cyclic moderate-density parity-check (QC-MDPC) codes to instantiate the McEliece and Niederreiter cryptosystems and related schemes. His paper "Efficient Algorithms for Pairing-Based Cryptosystems", jointly written with Hae Y. Kim, Ben Lynn and Mike Scott and presented at the Crypto 2002 conference, has been identified in March 2005 as a "Hot Paper", and in December 2005 as "Fast Breaking Paper", by Thomson ISI's Essential Science Indicators (now Science Watch), by virtue of being among the top one-tenth of one percent (0.1%) most cited papers and by having the largest percentage increase in citations in the Computer Science category.

No results under this filter, show 121 sentences.

Copyright © 2024 RandomSentenceGen.com All rights reserved.