| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910466796203321 |
|
|
Autore |
Desseyre Pierre |
|
|
Titolo |
Les sept lectures possibles du symbolisme maçonnique / / Pierre Desseyre |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bruxelles ; ; Fernelmont, [Belgium] : , : EME, , 2015 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (69 p.) |
|
|
|
|
|
|
Collana |
|
Explorations maçonniques |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Freemasonry - Symbolism |
Freemasonry - Rituals |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
Avant-propos; I. Pourquoi cette conférence sur le symbolisme maçonnique ?; II. Quelle est la place réelle du symbolisme dans l'univers maçonnique ?; III. Une description rapide et une tentative de classement des symboles maçonniques; IV. Une question fondamentale : comment apprend-on - si on apprend - à « lire »les symboles maçonniques ?; A. Comment apprend-on à lire le symbolisme maçonnique ?; B. Quelles sont les conséquences ?; C. Qu'est-ce que le symbolisme d'évidence ?; V. Ma théorie : sept clés pour lire autrementle symbolisme maçonnique; VI. Quelques exercices; A. Le pavé mosaïque. |
B. Le symbolisme du bandeau.C. La voûte étoilée; D. Le tablier de l'apprenti.; E. Le symbolisme des gants blancs.; F. Le tableau de loge.; G. Le symbolisme des deux colonnes J et B.; H. Le symbolisme de la lumière; I. Le symbolisme des noms de loges; J. Le pain et le vin; VII. Pour conclure; A. Le symbolisme, c'est notre histoire, nos racines, notre identité.; B. Le symbolisme, c'est notre façon spécifique de communiquer entre nous.; C. Le symbolisme, c'est un moyen de travailler ensemble.; D. Le symbolisme, c'est un moyen de réfléchir autrement. |
E. Le symbolisme, c'est un moyen de voir la réalité autrement.Dans la collection « Explorations maçonniques » |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
« La Franc-maçonnerie, société initiatique, rituelle et philosophique, procède, dit-on, de la méthode symbolique. Cette affirmation |
|
|
|
|
|
|
|
|
|
|
|
|
|
correspond-elle réellement à ce que nous observons dans nos loges ou, au contraire, n'est-elle qu'un leurre destiné à cacher notre propre incompétence, notre propre inaptitude à utiliser aujourd'hui cet outil essentiel à la démarche maçonnique » ? Cette question, Pierre Desseyre la posait déjà en 1996, lors de la première édition - aujourd'hui épuisée - de cette brochure, qui rencontra un vif succès et fut présentée à l'occasion d'une trentaine de tenues maçonniq |
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996465565803316 |
|
|
Titolo |
Advances in web and network technologies, and information management : APWeb/WAIM 2007 international workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, proceedings / / Kevin Chen-Chuan Chang [and six others] (editors) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2007] |
|
©2007 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2007.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XXIII, 707 p.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science ; ; 4537 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
World Wide Web - Technological innovations |
Computer networks - Management |
Database management |
Application software - Development |
Computer networks - Access control |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
"Four workshops [were] included in this joint conference"--P. [v]. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Information Access and Dissemination I -- Cost Framework for a Heterogeneous Distributed Semi-structured Environment -- Cost-Based Vertical Fragmentation for XML -- Efficiently Crawling Strategy for Focused Searching Engine -- QoS-Guaranteed Ring Replication Management with Strong Consistency -- A Mobile Database Sharing Protocol to Increase Data Availability in Mobile Environments -- Data |
|
|
|
|
|
|
|
|
|
Mining -- Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding Window -- Mining Web Transaction Patterns in an Electronic Commerce Environment -- Mining Purpose-Based Authorization Strategies in Database System -- RSP-DS: Real Time Sequential Pattern Analysis over Data Streams -- Sensor, P2P, and Grid Networks I -- Investigative Queries in Sensor Networks -- A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer Networks -- A Comparative Study of Replica Placement Strategies in Data Grids -- A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer Network -- QoS-Based Services Selecting and Optimizing Algorithms on Grid -- Information access and Dissemination 2 -- Bayesian Method Based Trusted Overlay for Information Retrieval over Networks -- Managing a Geographic Database from Mobile Devices Through OGC Web Services -- Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents Access -- Stream Data Management -- The Golden Mean Operator Scheduling Strategy in Data Stream Systems -- Continuous Skyline Tracking on Update Data Streams -- A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-Means -- Sensor, P2P, and Grid Networks 2 -- OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping Regions -- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments -- A Load Balancing Method Using Ring Network in the Grid Database -- Design and Implementation of a System for Environmental Monitoring Sensor Network -- Policy Based Scheduling for Resource Allocation on Grid -- Potpourri -- Characterizing DSS Workloads from the Processor Perspective -- Exploiting Connection Relation to Compress Data Graph -- Indexing the Current Positions of Moving Objects on Road Networks -- Keynote Talk -- DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data Management -- A Personalized Re-ranking Algorithm Based on Relevance Feedback -- An Investigation and Conceptual Models of Podcast Marketing -- A User Study on the Adoption of Location Based Services -- Email Community Detection Using Artificial Ant Colony Clustering -- EviRank: An Evidence Based Content Trust Model for Web Spam Detection -- A Novel Factoid Ranking Model for Information Retrieval -- Dynamic Composition of Web Service Based on Coordination Model -- An Information Retrieval Method Based on Knowledge Reasoning -- Research on Personalized Recommendation Algorithm in E-Supermarket System -- XML Normal Forms Based on Constraint-Tree-Based Functional Dependencies -- Untyped XQuery Canonization -- Web Search Tailored Ontology Evaluation Framework -- Full Paper -- An Overview of the Business Process Maturity Model (BPMM) -- Process Mining: Extending ?-Algorithm to Mine Duplicate Tasks in Process Logs -- A Distributed Genetic Algorithm for Optimizing the Quality of Grid Workflow -- Safety Analysis and Performance Evaluation of Time WF-nets -- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and Verification -- Bridging Organizational Structure and Information System Architecture Through Process -- Relation-Driven Business Process-Oriented Service Discovery -- Workflow Message Queue’s Performance Effect Measurements on an EJB-Based Workflow Management System -- Short Paper -- RFID Application Model and Performance for Postal Logistics -- An Organization and Task Based Access Control Model for Workflow System -- A Method of Web Services Composition Based on Service Alliance -- Toward a Lightweight Process-Aware Middleware -- Automatic Generation of |
|
|
|
|
|
|
|
|
Web Service Workflow Using a Probability Based Process-Semantic Repository -- A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical Study -- QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planning -- SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process Integration -- Model Checking for BPEL4WS with Time -- A Version Management of Business Process Models in BPMS -- Research on Architecture and Key Technology for Service-Oriented Workflow Performance Analysis -- WPE Models and Applications -- The Study on Internet-Based Face Recognition System Using Principal Component Analysis -- Semantic Representation of RTBAC: Relationship-Based Access Control Model -- A Code-Based Multi-match Packet Classification with TCAM -- Security and Services of WPE -- Home Network Device Authentication: Device Authentication Framework and Device Certificate Profile -- P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment -- Improvement of an Authenticated Key Agreement Protocol -- A Mechanism for Securing Digital Evidences in Pervasive Environments -- A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices -- WSN/RFID/Web Services -- Adapting Web Services Security Standards for Mobile and Wireless Environments -- Coexistence Proof Using Chain of Timestamps for Multiple RFID Tags -- A Design of Authentication Protocol for Multi-key RFID Tag -- An Efficient Fragile Watermarking for Web Pages Tamper-Proof -- Classification of Key Management Schemes for Wireless Sensor Networks -- Data Management and Access Control for WPE -- An Efficient Algorithm for Proportionally Fault-Tolerant Data Mining -- SOGA: Fine-Grained Authorization for Self-Organizing Grid -- Permission-Centric Hybrid Access Control. |
|
|
|
|
|
| |