Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sensory Linguistics: Language, perception and metaphor (Converging Evidence in Language and Communication Research)

Buy
One of the most fundamental capacities of language is the ability to express what speakers see, hear, feel, taste, and smell. Sensory Linguistics is the interdisciplinary study of how language relates to the senses. This book deals with such foundational questions as: Which semiotic strategies do speakers use to express sensory perceptions? Which perceptions are easier to encode and which are “ineffable”? And what are appropriate methods for studying the sensory aspects of linguistics? After a broad overview of the field, a detailed quantitative corpus-based study of English sensory adjectives and their metaphorical uses is presented. This analysis calls age-old ideas into question, such as the idea that the use of perceptual metaphors is governed by a cognitively motivated “hierarchy of the senses”. Besides making theoretical contributions to cognitive linguistics, this research monograph showcases new empirical methods for studying lexical semantics using contemporary statistical methods.
(HTML tags aren't allowed.)

Fuzzing: Brute Force Vulnerability Discovery
Fuzzing: Brute Force Vulnerability Discovery
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered...
Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals (Addison-Wesley Information Technology Series)
Proven Portals: Best Practices for Planning, Designing, and Developing Enterprise Portals (Addison-Wesley Information Technology Series)
If you need to plan, design, or deploy an enterprise portal this book is for you. Initiating a portal project (or rescuing one under way) is an exciting, sometimes daunting, challenge. Fortunately, the craft of portal design is now mature enough to identify the best practices that lead to successful implementations. Examples of those...
ASP.NET 3.5 Social Networking
ASP.NET 3.5 Social Networking
Social Networking is all about developing connections or ties between friends and associates. While people have always networked with one another the Internet has allowed us to network with people all over the world easily. Any interest or cause can support its own social network, where fans and followers can meet, chat, and share their views. But...

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up

The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain...

CDO & MAPI Programming with Visual Basic:: Developing Mail and Messaging Applications
CDO & MAPI Programming with Visual Basic:: Developing Mail and Messaging Applications

Computers and devices are more connected now than ever before. Why? Because the humans who use those computers need to collaborate. We need to share information, and we need to do it quickly, without regard to the physical distance that separates us. Corporate solution developers now more than ever have the opportunity and responsibility to...

Using Aspect-Oriented Programming for Trustworthy Software Development
Using Aspect-Oriented Programming for Trustworthy Software Development
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming

This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy