Egyptian Bronze-Making Again
نویسندگان
چکیده
منابع مشابه
An Egyptian Bronze
bronze handle, believed at 3astet holding that time to be the handle of ,t of Mrs. Mary a menyet, another ceremonial Draper, I9I5 object, but it is obvious now that it belonged to an aegis instead, and undoubtedly to an aegis of Isis, since it is she who is represented in the decoration on its upper part. The counterpoise is almost identical in shape and decoration with the one at the back of t...
متن کاملMaking Quantification Relevant Again
Defeasible Description Logics (DDLs) extend Description Logics with defeasible concept inclusions. Reasoning in DDLs often employs rational or relevant closure according to the (propositional) KLM postulates. If in DDLs with quantification a defeasible subsumption relationship holds between concepts, this relationship might also hold if these concepts appear in existential restrictions. Such ne...
متن کاملRamblr: Making Reassembly Great Again
Static binary rewriting has many important applications in reverse engineering, such as patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for static binary rewriting. While there has been a proposed solution to the reassembly of binaries, an evaluation on a realworld binary dataset shows that it suffers from some problems that lead to breaking binaries. Tho...
متن کاملOverdrive: Making SPDZ Great Again
SPDZ denotes a multiparty computation scheme in the preprocessing model based on somewhat homomorphic encryption (SHE) in the form of BGV. At CCS ’16, Keller et al. presented MASCOT, a replacement of the preprocessing phase using oblivious transfer instead of SHE, improving by two orders of magnitude on the SPDZ implementation by Damg̊ard et al. (ESORICS ’13). In this work, we show that using SH...
متن کاملMaking USB Great Again with USBFILTER
USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and operating systems blindly trust any physically-attached device. This has led to a number of attacks, ranging from hidden keyboards to network adapters, that rely on the user being unable to identify all of the functions ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Antiquity
سال: 1944
ISSN: 0003-598X,1745-1744
DOI: 10.1017/s0003598x00108932