03463nam 2200649Ia 450 991046224630332120200520144314.01-317-16213-71-317-16212-91-283-73889-91-4094-4750-2(CKB)2670000000278193(EBL)1068882(OCoLC)818846522(SSID)ssj0000755336(PQKBManifestationID)12349699(PQKBTitleCode)TC0000755336(PQKBWorkID)10730706(PQKB)11349169(MiAaPQ)EBC1068882(MiAaPQ)EBC5294013(Au-PeEL)EBL1068882(CaPaEBR)ebr10620901(CaONFJC)MIL924834(Au-PeEL)EBL5294013(CaONFJC)MIL405139(OCoLC)827682715(EXLCZ)99267000000027819320120418d2012 uy 0engur|n|---|||||txtccrConflicting femininities in medieval German literature[electronic resource] /by Karina Marie AshBurlington, VT Ashgatec20121 online resource (259 p.)Description based upon print version of record.1-4094-4749-9 Includes bibliographical references and index.Cover; Contents; Names and Abbreviations; Acknowledgments; Introduction; 1 How Do You Solve a Problem Like Maria? The Virgin Mary in Priester Wernher's Maria; 2 Like the Virgin: Diu Vrouwe in Hartmann von Aue's Gregorius; 3 Like a Virgin: Diu Maget in Hartmann von Aue's Der arme Heinrich; 4 Oh My Man, I Love Him So: Kriemhild in Das Nibelungenlied and Diu Klage; 5 Pastoral Persuasion and Mystic Rebellion in the Thirteenth Century; 6 The Champion of Profane Love: Herzeloyde in Wolfram von Eschenbach's Parzival; 7 A Martyr for Profane Love: Sigune in Wolfram von Eschenbach's Parzival8 The Saint of Profane Love: Giburc in Wolfram von Eschenbach's Willehalm9 Turning the Saint into a Lady: St. Elisabeth in Thirteenth-Century Vitae; 10 Once I Had a Secret Love: The Ideal Wife in Wigalois and Die gute Frau; 11 Keeping Female Religiosity a Secret in Der welsche Gast and Das Frauenbuch; 12 Taming the Champion: Herzeloude in Albrecht's Jüngerer Titurel; 13 From Martyr to Maiden: Sigun in Jüngerer Titurel; 14 Separating the Saint from the Lady: Arabel in Ulrich von dem Türlin's Arabel and Kyburg in Ulrich von Turheim's Rennewart; Conclusion; Bibliography; IndexConflicting Femininities in Medieval German Literature illuminates anxieties about women's roles in society in light of lay religious movements during the High Middle Ages and explains how these anxieties are uniquely addressed in medieval German epics, legends, pastoral works, romances, saints' lives and sermons.German literatureMiddle High German, 1050-1500History and criticismWomen and literatureGermanyHistoryElectronic books.German literatureHistory and criticism.Women and literatureHistory.830.9/002Ash Karina Marie900118MiAaPQMiAaPQMiAaPQBOOK9910462246303321Conflicting femininities in medieval German literature2010991UNINA06930nam 22007695 450 99646528670331620230220150617.01-280-38603-797866135639583-642-12179-910.1007/978-3-642-12179-1(CKB)2560000000009119(SSID)ssj0000399476(PQKBManifestationID)11290471(PQKBTitleCode)TC0000399476(PQKBWorkID)10376310(PQKB)11718864(DE-He213)978-3-642-12179-1(MiAaPQ)EBC3065176(PPN)149073453(EXLCZ)99256000000000911920100402d2010 u| 0engurnn#008mamaatxtccrComputational Science and Its Applications - ICCSA 2010[electronic resource] International Conference, Fukuoka, Japan, March 23-26, 2010, Proceedings, Part III /edited by David Taniar, Osvaldo Gervasi, Beniamino Murgante, Eric Pardede, Bernady O. Apduhan1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XIX, 570 p. 284 illus.)Theoretical Computer Science and General Issues,2512-2029 ;6018Bibliographic Level Mode of Issuance: Monograph3-642-12178-0 Includes bibliographical references and index.Workshop on Mobile Communications (MC 2010) -- A Control Loop Reduction Scheme for Wireless Process Control on Traffic Light Networks -- Performance Measurement of a Dual-Channel Intersection Switch on the Vehicular Network -- A Rapid Code Acquisition Scheme for Optical CDMA Systems -- Optimal and Suboptimal Synchronization Schemes for Ultra-Wideband Systems -- Partial Information Relaying with Multi-Layered Superposition Coding -- Performance Measurement of the Hybrid Prefetch Scheme on Vehicular Telematics Networks -- Power Control for Soft Fractional Frequency Reuse in OFDMA System -- Authentication – Based Medium Access Control to Prevent Protocol Jamming: A-MAC -- Femtocell Deployment to Minimize Performance Degradation in Mobile WiMAX Systems -- A Novel Frequency Planning for Femtocells in OFDMA-Based Cellular Networks Using Fractional Frequency Reuse -- Association Analysis of Location Tracking Data for Various Telematics Services -- An Efficient ICI Cancellation Method for Cooperative STBC-OFDM Systems -- Low-Cost Two-Hop Anchor Node-Based Distributed Range-Free Localization in Wireless Sensor Networks -- SecDEACH: Secure and Resilient Dynamic Clustering Protocol Preserving Data Privacy in WSNs -- Avoidance of Co-channel Interference Using Switched Parasitic Array Antenna in Femtocell Networks -- User Policy Based Transmission Control Method in Cognitive Wireless Network -- Workshop on Rough and Soft Sets Theories and Applications (RSSA 2010) -- Development of a Hybrid Case-Based Reasoning for Bankruptcy Prediction -- The Time Series Image Analysis of the HeLa Cell Using Viscous Fluid Registration -- Matrices Representation of Multi Soft-Sets and Its Application -- Clustering Analysis of Water Quality for Canals in Bangkok, Thailand -- Workshop on Wireless and Ad Hoc Networking (WADNet 2010) -- A Review of Routing Protocols for UWB MANETs -- An Efficient and Reliable Routing Protocol for Wireless Mesh Networks -- A Context-Aware Service Model Based on Workflows for u-Agriculture -- A History-Based Scheduler for Dynamic Load Balancing on Distributed VOD Server Environments -- A Secure Routing Protocol for Wireless Sensor Networks -- Efficient Pairwise Key Establishment Scheme Based on Random Pre-distribution Keys in WSN -- Agent Based Approach of Routing Protocol Minimizing the Number of Hops and Maintaining Connectivity of Mobile Terminals Which Move One Area to the Other -- Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN -- Workshop on Wireless Multimedia Sensor Networks (WMSN 2010) -- A Review of Redundancy Elimination Protocols for Wireless Sensor Networks -- A Light-Weighted Misused Key Detection in Wireless Sensor Networks -- Identifying Mudslide Area and Obtaining Forewarned Time Using AMI Associated Sensor Network -- General Track on Information Systems and Information Technologies -- Utilization of Ontology in Health for Archetypes Constraint Enforcement -- Time-Decaying Bloom Filters for Efficient Middle-Tier Data Management -- Soft Decision Making for Patients Suspected Influenza -- Personal Identification by EEG Using ICA and Neural Network -- A Formal Concept Analysis-Based Domain-Specific Thesaurus and Its Application in Document Representation -- On the Configuration of the Similarity Search Data Structure D-Index for High Dimensional Objects -- Automatic Chinese Text Classification Using N-Gram Model -- Genetic Algorithms Evolving Quasigroups with Good Pseudorandom Properties -- Software Openness: Evaluating Parameters of Parametric Modeling Tools to Support Creativity and Multidisciplinary Design Integration -- Dynamic and Cyclic Response Simulation of Shape Memory Alloy Devices -- Adaptive Fuzzy Filter for Speech Enhancement -- Risk Prediction for Postoperative Morbidity of Endovascular Aneurysm Repair Using Ensemble Model -- Further Results on Swarms Solving Graph Coloring -- Data Collection System for the Navigation of Wheelchair Users: A Preliminary Report.Theoretical Computer Science and General Issues,2512-2029 ;6018Computer networksSoftware engineeringAlgorithmsComputer simulationApplication softwareComputer Communication NetworksSoftware EngineeringAlgorithmsComputer ModellingComputer and Information Systems ApplicationsComputer networks.Software engineering.Algorithms.Computer simulation.Application software.Computer Communication Networks.Software Engineering.Algorithms.Computer Modelling.Computer and Information Systems Applications.004.6Taniar Davidedthttp://id.loc.gov/vocabulary/relators/edtGervasi Osvaldoedthttp://id.loc.gov/vocabulary/relators/edtMurgante Beniaminoedthttp://id.loc.gov/vocabulary/relators/edtPardede Ericedthttp://id.loc.gov/vocabulary/relators/edtApduhan Bernady Oedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465286703316Computational Science and Its Applications - ICCSA 20102829928UNISA01113nam0 22002533i 450 VAN026850320231206093027.70020231206f1989 |0itac50 baitaIT|||| |||||La libera circolazione dei capitali fra sistema comunitario e normativa italianail ruolo della corte di giustizia delle comunità europeeAntonio Filippo PanzeraMilanoGiuffrè267-298 p.25 cmEstratto da : Banca borsa e titoli di credito, fasc. 2 1989MilanoVANL000284PanzeraAntonio FilippoVANV008456227859Giuffrè <editore>VANV109181650ITSOL20231208RICABIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZAIT-CE0105VAN00VAN0268503BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00CONS BL.900M.1946 40 00 268503 20231206 Libera circolazione dei capitali fra sistema comunitario e normativa italiana3643924UNICAMPANIA