Excavations at Palaikastro. II: § 10.—Hagios Nikolaos
نویسندگان
چکیده
منابع مشابه
Nikolaos Galatos
Substructural logics have received a lot of attention in recent years from the communities of both logic and algebra. We discuss the algebraization of substructural logics over the full Lambek calculus and their connections to residuated lattices, and establish a weak form of the deduction theorem that is known as parametrized local deduction theorem. Finally, we study certain interpolation pro...
متن کاملNikolaos Frangogiannis
Nikolaos G. Frangogiannis, MD, is the Edmond J. Safra/Republic National Bank of New York Professor of Cardiovascular Medicine at the Albert Einstein College of Medicine in the Bronx. Frangogiannis graduated from the University of Athens School of Medicine in 1990 and two years later left his native Greece to pursue a residency in Internal Medicine at Baylor College of Medicine in Houston. Accep...
متن کاملA Preliminary Report of Excavations at Aveh Plain,Islamic period
Aveh archaeological site, which has prepared the necessary background for the archaeological studiesafter having been identified and registered, is located in Saveh Plain, and it is one of the less-known sitesin the Iranian Central Plateau. The chronological sequence of this site extends from prehistoric periodstill Timurid time. It is worth mentioning that here, except for the Islamic settleme...
متن کاملArchaeological excavations at Big Forest Park, West Coast, New Zealand
The machinery of the Big River mine is the most complete historical assemblage of in situ machinery for quartz mining in New Zealand. Excavations were carried out to mitigate the effects of reconstruction of the winding engine house. Comprehensive and extensive drainage of the original working compound between the winding engine, bath house, engineer's workshop and the upper terminal of the aer...
متن کاملAnnual Postgraduate Progress Report Nikolaos Papanikolaou
This paper discusses the use of computer–aided verification as a practical means for analysing quantum information systems; specifically, the BB84 protocol for quantum key distribution is examined using this method. This protocol has been shown to be unconditionally secure against all attacks in an information– theoretic setting, but the relevant security proof requires a thorough understanding...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Annual of the British School at Athens
سال: 1903
ISSN: 0068-2454,2045-2403
DOI: 10.1017/s0068245400007796