LEADER 04192oam 2200685I 450 001 9910450318303321 005 20200520144314.0 010 $a1-135-77338-6 010 $a1-280-23607-8 010 $a9786610236077 010 $a0-203-48594-7 024 7 $a10.4324/9780203485941 035 $a(CKB)1000000000248922 035 $a(EBL)183106 035 $a(OCoLC)62148030 035 $a(SSID)ssj0000132283 035 $a(PQKBManifestationID)11136146 035 $a(PQKBTitleCode)TC0000132283 035 $a(PQKBWorkID)10028846 035 $a(PQKB)10861418 035 $a(MiAaPQ)EBC183106 035 $a(Au-PeEL)EBL183106 035 $a(CaPaEBR)ebr10162639 035 $a(CaONFJC)MIL23607 035 $a(EXLCZ)991000000000248922 100 $a20180331d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCricket and the law $ethe man in white is always right /$fDavid Fraser 205 $a2nd ed. 210 1$aLondon :$cRoutledge,$d2005. 215 $a1 online resource (442 p.) 225 1 $aRoutledge studies in law, society and popular culture 300 $aPrevious ed.: Sydney : Institute of Criminology, Sydney University Law School, 1993. 311 $a0-7146-8285-3 311 $a0-7146-5347-0 320 $aIncludes bibliographical references and index. 327 $aBook Cover; Half-Title; Title; Copyright; Contents; Series editor's preface; Preface; Foreword; 1. Introduction; 2. The legal theory of cricket; 3. Lord Denning, cricket, law and the meaning of life; 4. Dante, cricket, law and the meaning of life; 5. Laws, not rules or cricket as adjudication; 6. Law, codes and the spirit of the game; 7. More law and the spirit of the game; 8. The man in white is always right: umpires, judges and the rule of law; 9. Umpires, decisions and the rule of law; 10. The man in white is always right (but he is not always neutral); 11. Technology, adjudication and law 327 $a12. Leg before wicket, causation and the rule of law13. Mankad, Javed, Hilditch, Sarfraz and the rule of law; 14. It's not cricket: underarm bowling, legality and the meaning of life; 15. The chucker as outlaw-legality, morality and exclusion in cricket; 16. Murali, Shoaib and the jurisprudence of chucking; 17. Bouncers: terror and the rule of law in cricket; 18. Ball-tampering and the rule of law; 19. The little master, ball-tampering and the rule of law; 20. Delay and over-rates: temporality and the meaning of cricket; 21. Ethical discourse, legal narrative and the meaning of cricket 327 $a22. You...-sledging and cricket as ethical discourse23. Walking, the judicial function and the meaning of law; 24. Other stories about cricket, law and the meaning of life; 25. Capitalism and the meaning of cricket; 26. Class struggle, old school tie and the meaning of cricket; 27. The Hill, the members and others: the crowd as sub-text; 28. Bodyline, postmodernism, law and the meaning of life; 29. Conclusion: on life, law and cricket; Notes; Index 330 $aCricket, law and the meaning of life ...In a readable, informed and absorbing discussion of cricket's defining controversies - bodyline, chucking, ball-tampering, sledging, walking and the use of technology, among many others - David Fraser explores the ambiguities of law and social order in cricket. Cricket and the Law charts the interrelationship between cricket and legal theory - between the law of the game and the law of our lives - and demonstrates how cricket's cultural conventions can escape the confines of the game to carry far b 410 0$aRoutledge studies in law, society, and popular culture. 606 $aCricket$xSocial aspects 606 $aCricket$vRules 606 $aSociological jurisprudence 608 $aElectronic books. 615 0$aCricket$xSocial aspects. 615 0$aCricket 615 0$aSociological jurisprudence. 676 $a796.358 700 $aFraser$b David$f1953,$0925802 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910450318303321 996 $aCricket and the law$92078732 997 $aUNINA LEADER 04372nam 2200697Ia 450 001 9910966632903321 005 20200520144314.0 010 $a1-282-44496-4 010 $a9786612444968 010 $a90-272-8893-3 035 $a(CKB)2550000000001380 035 $a(SSID)ssj0000336372 035 $a(PQKBManifestationID)11289984 035 $a(PQKBTitleCode)TC0000336372 035 $a(PQKBWorkID)10282494 035 $a(PQKB)10103028 035 $a(MiAaPQ)EBC622408 035 $a(Au-PeEL)EBL622408 035 $a(CaPaEBR)ebr10355455 035 $a(CaONFJC)MIL244496 035 $a(OCoLC)593287059 035 $a(DE-B1597)721371 035 $a(DE-B1597)9789027288936 035 $a(EXLCZ)992550000000001380 100 $a20090724d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCross-linguistic semantics of tense, aspect and modality /$fedited by Lotte Hogeweg, Helen de Hoop, Andrej Malchukov 205 $a1st ed. 210 $aPhiladelphia, PA $cJohn Benjamins Pub. Company$d2009 215 $avi, 406 p 225 0 $aLinguistik aktuell/Linguistics today,$x0166-0829 ;$v148 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a90-272-5531-8 320 $aIncludes bibliographical references and index. 327 $aThe semantics of tense, aspect and modality in the languages of the world / Lotte Hogeweg, Helen de Hoop & Andrej Malchukov -- Incompatible categories: resolving the 'present perfective paradox' / Andrej Malchukov -- The perfective/imperfective distinction: coercion or aspectual operators? / Corien Bary -- Lexical and compositional factors in the aspectual system of Adyghe / Peter M. Arkadiev -- Event structure of non-culminating accomplishments / Sergei Tatevosov & Mikhail Ivanov -- The grammaticalised use of the Burmese verbs la 'come' and Owa? 'go' / Nicoletta Romeo -- Irrealis in Yurakare? and other languages: on the cross-linguistic consistency of an elusive category / Rik van Gijn & Sonja Gipper -- On the selection of mood in complement clauses / Rui Marques -- 'Out of control' marking as circumstantial modality in St'a?t'imcets / Henry Davis, Lisa Matthewson & Hotze Rullmann -- Modal geometry: remarks on the structure of a modal map / Kees de Schepper & Joost Zwarts -- Acquisitive modals / Johan van der Auwera, Petar Kehayov & Alice Vittrant -- Conflicting constraints on the interpretation of modal auxiliaries / Ad Foolen & Helen de Hoop -- Modality and context dependence / Fabrice Nauze -- Verbal semantic shifts under negation, intensionality, and imperfectivity: Russian genitive objects / Barbara H. Partee & Vladimir Borschev -- The Estonian partitive evidential: Some notes on the semantic parallels between aspect and evidential categories / Anne Tamm -- Index. 330 $aThis article shows that the Estonian partitive evidential marks predicates in sentences that express incomplete evidence. Partitive occurs in the categories of aspect, epistemic modality, and evidentiality, marking objects and present participles. Despite the difference in syntax, the semantics of these categories is based on parallel relationships. More specifically, the aspectual partitive marks objects in sentences describing incomplete events, and the partitive evidential appears in sentences that encode incomplete evidence compared to the expectation of complete evidence. 606 $aGrammar, Comparative and general$xTemporal constructions 606 $aGrammar, Comparative and general$xTense 606 $aGrammar, Comparative and general$xAspect 606 $aModality (Linguistics) 606 $aSemantics, Comparative 615 0$aGrammar, Comparative and general$xTemporal constructions. 615 0$aGrammar, Comparative and general$xTense. 615 0$aGrammar, Comparative and general$xAspect. 615 0$aModality (Linguistics) 615 0$aSemantics, Comparative. 676 $a415 701 $aHogeweg$b Lotte$01817109 701 $aHoop$b Helen de$f1964-$0879091 701 $aMalchukov$b A. L$g(Andrei Lvovich)$0879092 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910966632903321 996 $aCross-linguistic semantics of tense, aspect and modality$94374560 997 $aUNINA LEADER 06845nam 22008175 450 001 9910484261803321 005 20251226195823.0 024 7 $a10.1007/b103174 035 $a(CKB)1000000000212631 035 $a(SSID)ssj0000318284 035 $a(PQKBManifestationID)11249826 035 $a(PQKBTitleCode)TC0000318284 035 $a(PQKBWorkID)10307464 035 $a(PQKB)10935351 035 $a(DE-He213)978-3-540-31815-6 035 $a(MiAaPQ)EBC3067569 035 $a(PPN)123090245 035 $a(EXLCZ)991000000000212631 100 $a20100630d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security Applications $e5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers /$fedited by Chae Hoon Lim, Moti Yung 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 472 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3325 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrinted edition: 9783540240150 320 $aIncludes bibliographical references and index. 327 $aNetwork/Computer Security -- Impacts of Security Protocols on Real-Time Multimedia Communications -- An Improvement on Privacy and Authentication in GSM -- Encrypted Watermarks and Linux Laptop Security -- Inconsistency Detection of Authorization Policies in Distributed Component Environment -- Public Key Schemes I -- Custodian-Hiding Verifiable Encryption -- Proving Key Usage -- Public Key Encryption with Conjunctive Field Keyword Search -- Intrusion Detection I -- A Probabilistic Method for Detecting Anomalous Program Behavior -- Service Discrimination and Audit File Reduction for Effective Intrusion Detection -- IDS False Alarm Filtering Using KNN Classifier -- Watermarking/Anti-spamming -- Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking -- Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment -- Public Key Schemes II -- Efficient Authenticated Key Agreement Protocol for Dynamic Groups -- A Ring Signature Scheme Using Bilinear Pairings -- Verifiable Pairing and Its Applications -- Intrusion Detection II -- Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading -- An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks -- Application of Content Computing in Honeyfarm -- Digital Rights Management -- License Protection with a Tamper-Resistant Token -- An Adaptive Approach to Hardware Alteration for Digital Rights Management -- Dynamic Fingerprinting over Broadcast Using Revocation Scheme -- Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels -- e-Commerce Security -- Vulnerability of a Mobile Payment System Proposed at WISA 2002 -- Fair Offline Payment Using Verifiable Encryption -- A Limited-Used Key Generation Scheme for Internet Transactions -- Efficient Implementation -- Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes -- Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(q n ) Using a Gaussian Normal Basis of Type II -- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors -- Hyperelliptic Curve Coprocessors on a FPGA -- Anonymous Communication -- Key-Exchange Protocol Using Pre-agreed Session-ID -- A New k-Anonymous Message Transmission Protocol -- Onions Based on Universal Re-encryption ? Anonymous Communication Immune Against Repetitive Attack -- Side-Channel Attacks -- Side Channel Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template Attacks -- Evaluation and Improvement of the Tempest Fonts. 330 $aThe 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and implementation aspects. The programcommittee received169 papersfrom 22 countries,andaccepted 37 papers for a full presentation track and 30 papers for a short presentation track. Each paper was carefully evaluated through peer-review by at least three members of the programcommittee. This volume contains revised versions of 36 papers accepted and presented in the full presentation track. Short papers were only published in the WISA 2004 pre-proceedings as preliminary versions and are allowed to be published elsewhere as extended versions. In addition to the contributed papers, Professors Gene Tsudik and Ross Andersongaveinvitedtalks,entitledSecurityinOutsourcedDatabasesandWhat does ?Security? mean for Ubiquitous Applications?, respectively. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3325 606 $aCryptography 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer networks 606 $aElectronic data processing$xManagement 606 $aComputers, Special purpose 606 $aCryptology 606 $aOperating Systems 606 $aAlgorithms 606 $aComputer Communication Networks 606 $aIT Operations 606 $aSpecial Purpose and Application-Based Systems 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer networks. 615 0$aElectronic data processing$xManagement. 615 0$aComputers, Special purpose. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithms. 615 24$aComputer Communication Networks. 615 24$aIT Operations. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a005.8 701 $aLim$b Chae Hoon$01756071 701 $aYung$b Moti$01071902 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484261803321 996 $aInformation security applications$94193163 997 $aUNINA