LEADER 03659nam 2200637 450 001 9910816294603321 005 20240131152507.0 010 $a1-4438-6841-8 035 $a(CKB)3710000000250923 035 $a(EBL)1810282 035 $a(SSID)ssj0001399934 035 $a(PQKBManifestationID)11820682 035 $a(PQKBTitleCode)TC0001399934 035 $a(PQKBWorkID)11469333 035 $a(PQKB)10695685 035 $a(MiAaPQ)EBC1810282 035 $a(Au-PeEL)EBL1810282 035 $a(CaPaEBR)ebr10949450 035 $a(CaONFJC)MIL649317 035 $a(OCoLC)892799116 035 $a(OCoLC)892430243 035 $a(FINmELB)ELB132642 035 $a(EXLCZ)993710000000250923 100 $a20141010d2013 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAuthorising history $egestures of authorship in fourteenth-century English historiography /$fby Nicole Nyffenegger 210 1$aNewcastle upon Tyne, United Kingdom :$cCambridge Scholars Publishing,$d2013. 215 $a1 online resource (230 p.) 300 $aDescription based upon print version of record. 311 $a1-322-18053-9 311 $a1-4438-4819-0 320 $aIncludes bibliographical references and index. 327 $aTABLE OF CONTENTS; PREFACE; INTRODUCTION; The four works; Robert Mannyng of Brunne's chronicle; Robert of Gloucester's chronicle; The Northern and the Southern versions of the Cursor Mundi; CHAPTER ONE; The historiographer as mediator; The "unlearned" audience; The written text and aural prelection; Material metaphors for the writing of history; CHAPTER TWO; Time matters: past, present and the authorial persona; Space in time: "land" as epoch marker and motif; Conquerors, kings, and the Virgin Mary; CHAPTER THREE; The power of the book to preserve the truth 327 $aBooks as the exclusive domain of the literatusLetters of liberation; Robert Mannyng's emphasis on letters of liberation; CHAPTER FOUR; Robert Mannyng's evaluation of his sources; Appropriating the sources' authority; Eluding the control exerted by the authoritative sources; Criticising and challenging the sources; CHAPTER FIVE; Framing the text with the authorial persona; The functions of "here" and "now"; Mannyng's reaction to Wace's gestures of authorship; CONCLUSION; BIBLIOGRAPHY; INDEX 330 $a""This book discusses the strategies and rhetorical means by which four authors of Middle English verse historiography seek to authorise their works and themselves. Paying careful attention to the texts, it traces the ways in which authors inscribe their fictional selves and seek to give authority to their constructions of history. It further investigates how the authors position themselves in relation to their task of writing history, their sources and their audiences. This study provides new... 517 3 $aAuthorising history :$egestures of authorship in 14th-century English historiography 606 $aHistorical poetry, English$xHistory and criticism 606 $aHistorical poetry, English$xAuthorship 606 $aEnglish literature$yMiddle English, 1100-1500$xHistory and criticism 615 0$aHistorical poetry, English$xHistory and criticism. 615 0$aHistorical poetry, English$xAuthorship. 615 0$aEnglish literature$xHistory and criticism. 676 $a941.0072 676 $a942.037 700 $aNyffenegger$b Nicole$01644995 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910816294603321 996 $aAuthorising history$94060412 997 $aUNINA LEADER 04371nam 22007815 450 001 9910484901203321 005 20251226202243.0 010 $a3-319-44403-4 024 7 $a10.1007/978-3-319-44403-1 035 $a(CKB)3710000000837724 035 $a(DE-He213)978-3-319-44403-1 035 $a(MiAaPQ)EBC6281636 035 $a(MiAaPQ)EBC5587219 035 $a(Au-PeEL)EBL5587219 035 $a(OCoLC)956425695 035 $a(PPN)194804100 035 $a(EXLCZ)993710000000837724 100 $a20160805d2016 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDatabase and Expert Systems Applications $e27th International Conference, DEXA 2016, Porto, Portugal, September 5-8, 2016, Proceedings, Part I /$fedited by Sven Hartmann, Hui Ma 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (XXVIII, 449 p. 155 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9827 311 08$a3-319-44402-6 327 $aTemporal, Spatial, and High Dimensional Databases -- Data Mining -- Authenticity, Privacy, Security, and Trust -- Data Clustering -- Distributed and Big Data Processing -- Decision Support Systems, and Learning -- Data Streams -- Data Integration, and Interoperability -- Semantic Web, and Data Semantics -- Social Networks, and Network Analysis -- Linked Data -- Data Analysis -- NoSQL, NewSQL -- Multimedia Data -- Personal Information Management -- Semantic Web and Ontologies -- Database and Information System Architectures -- Query Answering and Optimization -- Information Retrieval, and Keyword Search -- Data Modelling, and Uncertainty. 330 $aThis two volume set LNCS 9827 and LNCS 9828 constitutes the refereed proceedings of the 27th International Conference on Database and Expert Systems Applications, DEXA 2016, held in Porto, Portugal, September 2016. The 39 revised full papers presented together with 29 short papers were carefully reviewed and selected from 137 submissions. The papers discuss a range of topics including: Temporal, Spatial, and High Dimensional Databases; Data Mining; Authenticity, Privacy, Security, and Trust; Data Clustering; Distributed and Big Data Processing; Decision Support Systems, and Learning; Data Streams; Data Integration, and Interoperability; Semantic Web, and Data Semantics; Social Networks, and Network Analysis; Linked Data; Data Analysis; NoSQL, NewSQL; Multimedia Data; Personal Information Management; Semantic Web and Ontologies; Database and Information System Architectures; Query Answering and Optimization; Information Retrieval, and Keyword Search; Data Modelling, and Uncertainty. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v9827 606 $aData mining 606 $aDatabase management 606 $aInformation storage and retrieval systems 606 $aArtificial intelligence 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData Mining and Knowledge Discovery 606 $aDatabase Management 606 $aInformation Storage and Retrieval 606 $aArtificial Intelligence 606 $aData and Information Security 606 $aCryptology 615 0$aData mining. 615 0$aDatabase management. 615 0$aInformation storage and retrieval systems. 615 0$aArtificial intelligence. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 14$aData Mining and Knowledge Discovery. 615 24$aDatabase Management. 615 24$aInformation Storage and Retrieval. 615 24$aArtificial Intelligence. 615 24$aData and Information Security. 615 24$aCryptology. 676 $a005.74 702 $aHartmann$b Sven$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMa$b Hui$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484901203321 996 $aDatabase and Expert Systems Applications$9772107 997 $aUNINA