LEADER 04743nam 2200685 450 001 9910466357003321 005 20210504015002.0 010 $a3-11-040759-0 010 $a3-11-040763-9 024 7 $a10.1515/9783110407594 035 $a(CKB)3710000000609719 035 $a(EBL)4426434 035 $a(SSID)ssj0001624551 035 $a(PQKBManifestationID)16361663 035 $a(PQKBTitleCode)TC0001624551 035 $a(PQKBWorkID)14901096 035 $a(PQKB)10762897 035 $a(PQKBManifestationID)16323478 035 $a(PQKBWorkID)14900610 035 $a(PQKB)23330392 035 $a(MiAaPQ)EBC4426434 035 $a(DE-B1597)445063 035 $a(OCoLC)939911295 035 $a(DE-B1597)9783110407594 035 $a(PPN)202103935 035 $a(Au-PeEL)EBL4426434 035 $a(CaPaEBR)ebr11163735 035 $a(CaONFJC)MIL900966 035 $a(EXLCZ)993710000000609719 100 $a20160314h20162016 uy 0 101 0 $ager 135 $aurnnu---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aAthenian lettering of the fifth century B.C. $ethe rise of the professional letter cutter /$fStephen V. Tracy 210 1$aBerlin, [Germany] ;$aBoston, [Massachusetts] :$cDe Gruyter,$d2016. 210 4$d©2016 215 $a1 online resource (256 p.) 300 $aDescription based upon print version of record. 311 $a3-11-040142-8 320 $aIncludes bibliographical references and indexes. 327 $tFront matter --$tContents --$tList of Figures --$tAbbreviations --$tPreface --$tIntroduction and Methodology --$tInscriptions Discussed and/or Assigned --$tThe First Decrees and Laws of ca. 515 to ca. 450 B. C. --$tUnique Examples of Writing of ca. 450 to ca. 400 --$tThe Inscribers of the Lapis Primus and Lapis Secundus (IG I3 259?280) --$tThe Inscribers of the So-called ?Attic Stelai? (IG I3 421?430) --$tThe Cutter of IG I3 263 Dates: 454/3?450/49 --$tThe Cutter of IG I3 270, 448?ca. 438 --$tThe Cutter of IG I3 35, 440/39?432/1 --$tThe Cutter of IG I3 364, 434/3?433/2 --$tThe Cutter of IG I3 392, ca. a. 425 a. --$tThe Cutter of IG I3 50, 424/3 --$tThe Cutter of IG II2 1386, 423/2?394/3 --$tThe Cutter of IG I3 80, 421/0 --$tThe Cutter of IG II2 17, 414/3?386/5 --$tThe Cutter of IG I3 102, 413/2?410/09 --$tThe Cutter of IG I3 316, ca. 408/7 --$tThe Cutter of IG II2 1401, ca. 395 --$tSummation --$tAppendix One: Hands in Fifth-Century B. C. Attic Inscriptions (reprint of Studies Dow 277?282) --$tAppendix Two: The Wrongful Execution of the Hellenotamiai (Antiphon 5.69?71) and The Lapis Primus (reprint of CP 109, 2014, 1?10) --$tAppendix Three: Down Dating Some Athenian Decrees with Three-Bar Sigma: A Palaeographic Approach (reprint of ZPE 190, 2014, 105?115) --$tIndex of Passages Cited --$tGeneral Index 330 $aThis book has chapters on methodology, on the writing of the first decrees and laws of the years ca. 515 to 450 B.C., on unique examples of writing of ca. 450 to 400, on the inscribers of the Lapis Primus and Lapis Secundus (IG I3 259-280), and on those of the Attic Stelai (IG I3 421-430). These are followed by studies of 11 individual cutters arranged in chronological order. This study brings order to the study of hands of the fifth century by setting out a methodology and by discussing the attempts of others to identify hands. Another aim is to bring out the individuality of the writing of these early inscribers. It shows that from the beginning the writing on Athenian inscriptions on stone was very idiosyncratic, for all intents and purposes individual writing. It identifies the inscribing of the sacred inventories of Athena beginning about 450 B.C. as the genesis of the professional letter cutter in Athens and traces the trajectory of the profession. While the dating of many inscriptions will remain a matter for scholarly discussion, the present study narrows the dates of many texts. It also pinpoints the origin of the mistaken idea that three-bar sigma did not occur on public documents after the year 446 in order to make those who are not expert more aware that this is not a reliable means of dating. 606 $aInscriptions, Greek$zGreece$zAthens 606 $aLettering$zGreece$zAthens 606 $aGreek language$xAlphabet 608 $aElectronic books. 615 0$aInscriptions, Greek 615 0$aLettering 615 0$aGreek language$xAlphabet. 676 $a481/.1 700 $aTracy$b Stephen V.$f1941-$0154083 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910466357003321 996 $aAthenian lettering of the fifth century B.C$92491189 997 $aUNINA LEADER 05262nam 22007815 450 001 9910746085203321 005 20251225205215.0 010 $a3-031-40923-X 024 7 $a10.1007/978-3-031-40923-3 035 $a(MiAaPQ)EBC30737813 035 $a(Au-PeEL)EBL30737813 035 $a(DE-He213)978-3-031-40923-3 035 $a(PPN)272734020 035 $a(CKB)28185905900041 035 $a(EXLCZ)9928185905900041 100 $a20230810d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Safety, Reliability, and Security $e42nd International Conference, SAFECOMP 2023, Toulouse, France, September 20?22, 2023, Proceedings /$fedited by Jérémie Guiochet, Stefano Tonetta, Friedemann Bitsch 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (291 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14181 311 08$aPrint version: Guiochet, Jérémie Computer Safety, Reliability, and Security Cham : Springer,c2023 9783031409226 320 $aIncludes bibliographical references and index. 327 $aSafety Assurance -- Assurance Case Arguments in the Large ? CERN LHC Machine Protection System -- Identifying Run-time Monitoring Requirements for Autonomous Systems through the Analysis of Safety Arguments -- Redesigning Medical Device Assurance: Separating Technological and Clinical Assurance Cases -- Software Testing & Reliability -- A Cognitive Framework for Modeling Coincident Software Faults: An Experimental Study -- A Taxonomy of Software Defect Forms for Certification Tests in Aviation Industry -- Constraint-guided Test Execution Scheduling: An Experience Report at ABB Robotics -- Neural Networks Robustness & Monitoring -- A low-cost strategic monitoring approach for scalable and interpretable error detection in deep neural networks -- Are Transformers More Robust? Towards Exact Robustness Verification for Transformers -- Model-based Security and Threat Analysis -- Model-based Generation of Attack-Fault Trees -- MBTA: A Model-Based Threat Analysis approach for software architectures -- Attribute Repair for Threat Prevention -- Safety of Autonomous Driving -- Probabilistic Spatial Relations for Monitoring Behavior of Road Users -- Concept and metamodel to support cross-domain safety analysis for ODD expansion of autonomous systems -- Security Engineering -- Pattern-Based Information Flow Control for Safety-Critical On-Chip Systems -- From Standard to Practice: Towards ISA/IEC 62443-conform Public Key Infrastructures -- AI Safety -- The Impact of Training Data Shortfalls on Safety of AI-based Clinical Decision Support Systems -- Data-centric Operational Design Domain Characterization for Machine Learning-based Aeronautical Products -- Online Quantization Adaptation for Fault-Tolerant Neural Network Inference -- Neural Networks & Testing -- Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection -- Towards Scenario-based Safety Validation for Autonomous Trains with Deep Generative Models. 330 $aThis book constitutes the refereed proceedings of the 42nd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2023, which took place in Toulouse, France, in September 2023. The 20 full papers included in this volume were carefully reviewed and selected from 100 submissions. They were organized in topical sections as follows: Safety assurance; software testing and reliability; neural networks robustness and monitoring; model-based security and threat analysis; safety of autonomous driving; security engineering; AI safety; and neural networks and testing. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14181 606 $aComputer engineering 606 $aComputer networks 606 $aSoftware engineering 606 $aApplication software 606 $aRobotics 606 $aMicroprogramming 606 $aData protection 606 $aComputer Engineering and Networks 606 $aSoftware Engineering 606 $aComputer and Information Systems Applications 606 $aRobotics 606 $aControl Structures and Microprogramming 606 $aData and Information Security 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aApplication software. 615 0$aRobotics. 615 0$aMicroprogramming. 615 0$aData protection. 615 14$aComputer Engineering and Networks. 615 24$aSoftware Engineering. 615 24$aComputer and Information Systems Applications. 615 24$aRobotics. 615 24$aControl Structures and Microprogramming. 615 24$aData and Information Security. 676 $a004.015113 702 $aGuiochet$b Je?re?mie 702 $aTonetta$b Stefano 702 $aBitsch$b Friedemann 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746085203321 996 $aComputer Safety, Reliability, and Security$92908259 997 $aUNINA