Divination, Royalty and Insecurity in Classical Sparta*
نویسندگان
چکیده
منابع مشابه
Plato and Divination
Plato uses the idea of divinatory knowledge as a metaphorical descriptor for a variety of kinds of daytime, waking knowing. What unites these examples is that they all include discussion of a kind of knowing that cannot account for itself, and that is tentative, imagistic and non-discursive. These metaphorical uses can further be illuminated by his more detailed discussion of divinatory knowled...
متن کاملEndocrinology in ancient Sparta.
This article attempts to analyze the crucial link between the plant Agnus castus and human health, particularly hormonal status, with special reference to the needs of the society of ancient Sparta. The ancient Spartans used Agnus both as a cure for infertility and as a remedy to treat battle wounds. These special properties were recognized by the sanctuary of Asclepios Agnita, which was locate...
متن کاملComplete Insecurity of Quantum Protocols for Classical Two-Party Computation
A fundamental task in modern cryptography is the joint computation of a function which has two inputs, one from Alice and one from Bob, such that neither of the two can learn more about the other's input than what is implied by the value of the function. In this Letter, we show that any quantum protocol for the computation of a classical deterministic function that outputs the result to both pa...
متن کاملPatent Holdup and Royalty Stacking
We study several interconnected problems that arise under the current U.S. patent system when a patent covers one component or feature of a complex product. This situation is common in the information technology sector of the economy. Our analysis applies to cases involving reasonable royalties but not lost profits. First, we show using bargaining theory that the threat to obtain a permanent in...
متن کاملThe SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may want to control in first place the user accessing its resources, i.e., without being forced to delegate the management of access permissions to third parties to meet privacy requirements. On the other side, it should ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Kernos
سال: 2009
ISSN: 0776-3824,2034-7871
DOI: 10.4000/kernos.1767