Search for dissertations about: "attestation"

Found 3 swedish dissertations containing the word attestation.

  1. 1. The Sortes Vergilianae : A Philological Study

    Author : Moa Ekbom; Maria Plaza; Diederik W.P. Burgersdijk; Uppsala universitet; []
    Keywords : HUMANIORA; HUMANITIES; Virgil reception; Historia Augusta; Virgil in the Historia Augusta; bibliomancy; cento; Augustine; Hadrian; Pescennius Niger; Clodius Albinus; Alexander Severus; Claudius Gothicus; Sortes Vergilianae; Sortes Homericae; Sortes Biblicae; Latin; Latin;

    Abstract : This study discusses the sortes Vergilianae, which are commonly defined as a form of ancient divination practiced by randomly finding a verse in a volume of Virgil. The practice of sortes Vergilianae has been described as widespread in antiquity. READ MORE

  2. 2. On 'have' in Ancient Greek. An investigation on echo and the construction einai with a dative as expressions for 'have'

    Author : Karin Kulneff-Eriksson; Centrum för teologi och religionsvetenskap; []
    Keywords : HUMANIORA; HUMANITIES; ’hold’; focus; definiteness; concreteness; possessor; possession; ἔστι μοι; ἔχω; εἶναι with the dative; *seĝh-; ’have’;

    Abstract : This book deals with ’have’ in ancient Greek. Two different types of ’have’-constructions were used, viz., on the one hand, the active transitive verb ἔχω and, on the other hand, the verb εἶναι, ’be’, with a complement in the dative case (here called the ἔστι μοι construction). READ MORE

  3. 3. Functional Programming for Securing Cloud and Embedded Environments

    Author : Abhiroop Sarkar; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; NATURVETENSKAP; NATURAL SCIENCES; trusted execution environment; real time; functional programming; runtime; information flow control; microcontrollers; functional reactive programming;

    Abstract : The ubiquity of digital systems across all aspects of modern society, while beneficial, has simultaneously exposed a lucrative attack surface for potential adversaries and attackers. Consequently, securing digital systems becomes of critical importance. READ MORE