YAKU-DAIKU AND CEREMONIES AT KAMOWAKEIKAZUCHI SHRINE
نویسندگان
چکیده
منابع مشابه
My ADT Shrine
The 20 WADT 2010 is put into perspective by giving afterglows of the 1 WADT 1982 in Langscheid near Dortmund, and the 10 WADT 1994 in Santa Margherita near Genova. First encounters with pioneers in the field are recalled, in particular with the ADJ group who initiated the initial-algebra approach. The author’s contributions at that time are put in this context. Around 1982, the emphasis of his ...
متن کاملPilgrimage to a Scientific Shrine
In the summlnler of 1954 my wvife and I enjoyed a long-deferred European holiday which included a miiotor trip in central France. \Ve hired a small Citro&n, and -M., being miiore adaptable than I, soon mlastered the technique of shifting gears on the dashboard and did all the driving. Arriving ill Clerml-ont-Ferrand one afternoon and learning that there was a miiotor road up a nearby mounitaini...
متن کاملThe legend and shrine of Saint Triduana.
A familiar feature in the eye hospitals of the Mediterranean littoral is the statue or picture of St. Lucia of Syracuse, holding her eyes on a plate. This stylized portrayal dating back to the 12th century is based on the legend that " when pestered by a would-be suitor she performed an auto-evulsion of her eyes and sent them to him "-a literal translation into action of St. Matthew, chapter 18...
متن کاملLayered Analysis of Security Ceremonies
A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...
متن کاملCeremonies for End-to-End Verifiable Elections
State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Architecture and Planning (Transactions of AIJ)
سال: 2012
ISSN: 1340-4210,1881-8161
DOI: 10.3130/aija.77.119