Egyptian Bronze-Making Again

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Egyptian Bronze

bronze handle, believed at 3astet holding that time to be the handle of ,t of Mrs. Mary a menyet, another ceremonial Draper, I9I5 object, but it is obvious now that it belonged to an aegis instead, and undoubtedly to an aegis of Isis, since it is she who is represented in the decoration on its upper part. The counterpoise is almost identical in shape and decoration with the one at the back of t...

متن کامل

Making Quantification Relevant Again

Defeasible Description Logics (DDLs) extend Description Logics with defeasible concept inclusions. Reasoning in DDLs often employs rational or relevant closure according to the (propositional) KLM postulates. If in DDLs with quantification a defeasible subsumption relationship holds between concepts, this relationship might also hold if these concepts appear in existential restrictions. Such ne...

متن کامل

Ramblr: Making Reassembly Great Again

Static binary rewriting has many important applications in reverse engineering, such as patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for static binary rewriting. While there has been a proposed solution to the reassembly of binaries, an evaluation on a realworld binary dataset shows that it suffers from some problems that lead to breaking binaries. Tho...

متن کامل

Overdrive: Making SPDZ Great Again

SPDZ denotes a multiparty computation scheme in the preprocessing model based on somewhat homomorphic encryption (SHE) in the form of BGV. At CCS ’16, Keller et al. presented MASCOT, a replacement of the preprocessing phase using oblivious transfer instead of SHE, improving by two orders of magnitude on the SPDZ implementation by Damg̊ard et al. (ESORICS ’13). In this work, we show that using SH...

متن کامل

Making USB Great Again with USBFILTER

USB provides ubiquitous plug-and-play connectivity for a wide range of devices. However, the complex nature of USB obscures the true functionality of devices from the user, and operating systems blindly trust any physically-attached device. This has led to a number of attacks, ranging from hidden keyboards to network adapters, that rely on the user being unable to identify all of the functions ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Antiquity

سال: 1944

ISSN: 0003-598X,1745-1744

DOI: 10.1017/s0003598x00108932