YAKU-DAIKU AND CEREMONIES AT KAMOWAKEIKAZUCHI SHRINE

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

My ADT Shrine

The 20 WADT 2010 is put into perspective by giving afterglows of the 1 WADT 1982 in Langscheid near Dortmund, and the 10 WADT 1994 in Santa Margherita near Genova. First encounters with pioneers in the field are recalled, in particular with the ADJ group who initiated the initial-algebra approach. The author’s contributions at that time are put in this context. Around 1982, the emphasis of his ...

متن کامل

Pilgrimage to a Scientific Shrine

In the summlnler of 1954 my wvife and I enjoyed a long-deferred European holiday which included a miiotor trip in central France. \Ve hired a small Citro&n, and -M., being miiore adaptable than I, soon mlastered the technique of shifting gears on the dashboard and did all the driving. Arriving ill Clerml-ont-Ferrand one afternoon and learning that there was a miiotor road up a nearby mounitaini...

متن کامل

The legend and shrine of Saint Triduana.

A familiar feature in the eye hospitals of the Mediterranean littoral is the statue or picture of St. Lucia of Syracuse, holding her eyes on a plate. This stylized portrayal dating back to the 12th century is based on the legend that " when pestered by a would-be suitor she performed an auto-evulsion of her eyes and sent them to him "-a literal translation into action of St. Matthew, chapter 18...

متن کامل

Layered Analysis of Security Ceremonies

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Architecture and Planning (Transactions of AIJ)

سال: 2012

ISSN: 1340-4210,1881-8161

DOI: 10.3130/aija.77.119