LEADER 01430nam--2200433---450- 001 990001109640203316 005 20050426114113.0 010 $a88-420-5591-3 035 $a000110964 035 $aUSA01000110964 035 $a(ALEPH)000110964USA01 035 $a000110964 100 $a20021202d1998----km-y0enga50------ba 101 0 $aita 102 $aIT 200 1 $aLetteratura e cinema$fSara Cortellazzo, Dario Tomasi 210 $aBari [etc.]$cLaterza$d1998 215 $a94 p.$d18 cm 225 2 $aAlfabeto letterario$iLetteratura e altro$v6 410 0$12001$aAlfabeto letterario$iLetteratura e altro$v6 606 0 $aCinematografo e letteratura 676 $a791.43 700 1$aCORTELLAZZO,$bSara$0144471 701 1$aTOMASI,$bDario$0438414 801 0$aIT$bsalbc$gISBD 912 $a990001109640203316 951 $aXIII.2. 675(XVI D 274)$b164515 L.M.$cXVI D$d00099133 951 $aXIII.2. 675a(XVI D 274 A)$b164517 L.M.$cXVI D$d00099135 951 $aXIII.2. 675b(XVI D 274 BIS)$b164516 L.M.$cXVI D$d00099134 959 $aBK 969 $aUMA 979 $aMARIA$b10$c20021202$lUSA01$h0941 979 $aJOHNNY$b90$c20030213$lUSA01$h1350 979 $aANGELA$b90$c20030214$lUSA01$h1614 979 $aANGELA$b90$c20030214$lUSA01$h1615 979 $aPATRY$b90$c20040406$lUSA01$h1717 979 $aCOPAT2$b90$c20050426$lUSA01$h1141 996 $aLetteratura e cinema$985585 997 $aUNISA LEADER 00822nam a2200229/i 4500 001 991002604239707536 008 141013s19961997xx eng 020 $a0198184514 035 $ab14201781-39ule_inst 040 $aDip.to Studi Umanistici$bita 100 1 $aKerrigan, John$0154634 245 10$aRevenge tragedy :$bAeschylus to Armageddon /$cJohn Kerrigan. 260 $aOxford :$bClarendon Press,$c1996 300 $aXV, 494 p. ;$c 22 cm. 650 4$aVendetta nella letteratura 650 4$aTragedia 907 $a.b14201781$b13-10-14$c13-10-14 912 $a991002604239707536 945 $aLE008 FL.M. (IN) K 216 $g1$i2008000055998$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i15637128$z13-10-14 996 $aRevenge tragedy$9258519 997 $aUNISALENTO 998 $ale008$b13-10-14$cm$da $e $feng$gxx $h0$i0 LEADER 00987nam a2200277 i 4500 001 991003020699707536 005 20021022144845.0 008 960610s1967 it ||| | ita 035 $ab11743189-39ule_inst 035 $aLE021FD224671$9ExL 040 $aDip. SSSC$bita 082 0 $a792 100 1 $aChancerel, Léon$0470115 245 10$aStoria del teatro /$cLéon Chancerel ; introduzione e traduzione di Giovanni Marchi 260 $aRoma :$bBulzoni,$c1967 300 $a251 p. ;$c22 cm. 500 $aTit. orig. : Panorama du theatre des origines a nos jours. 650 4$aStoria del teatro 650 4$aTeatro- Storia 700 1 $aMarchi, Giovanni 907 $a.b11743189$b02-04-14$c24-10-02 912 $a991003020699707536 945 $aLE021FD CG21B27$g1$iLE021FD-2030$lle023$nFondo D'Amico$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i11983061$z24-10-02 996 $aStoria del teatro$9905041 997 $aUNISALENTO 998 $ale021$b10-06-96$cm$da $e-$fita$git $h0$i1 LEADER 02085nam 2200445 450 001 9910580194903321 005 20230822182636.0 035 $a(CKB)5860000000055147 035 $a(NjHacI)995860000000055147 035 $a(EXLCZ)995860000000055147 100 $a20230822d2022 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aPLDI '22 $eproceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation : June 13-17, 2022, San DIego, CA, USA /$fedited by Ranjit Jhala, Isil Dillig 210 1$aNew York :$cAssociation for Computing Machinery,$d2022. 215 $a1 online resource (1038 pages) $cillustrations 225 0 $aACM Conferences 300 $aIncludes index. 311 $a1-4503-9265-2 330 $aWelcome to PLDI 2022, the 43rd ACM SIGPLAN Conference on Programming Language Design and Implementation to be held in San Diego (and online) June 13-17. PLDI is a premier forum for programming language research, broadly interpreted, including design, implementation, theory, applications, and performance. PLDI contains outstanding research that extends and/or applies programming language concepts to advance the field of computing. Novel system designs, thorough empirical work, well-motivated theoretical results, and new application areas are all welcome topics at PLDI. 606 $aAutomatic programming (Computer science) 606 $aCompilers (Computer programs) 606 $aComputer science 606 $aProgramming languages (Electronic computers)$vCongresses 615 0$aAutomatic programming (Computer science) 615 0$aCompilers (Computer programs) 615 0$aComputer science. 615 0$aProgramming languages (Electronic computers) 676 $a001.642 702 $aJhala$b Ranjit 702 $aDillig$b Isil 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910580194903321 996 $aPLDI '22$93548032 997 $aUNINA LEADER 08267nam 2200685 a 450 001 9910961926403321 005 20251116140458.0 010 $a9786610196302 010 $a9781280196300 010 $a1280196300 010 $a9780309585088 010 $a0309585082 010 $a9780585028675 010 $a0585028672 035 $a(CKB)110986584751236 035 $a(OCoLC)42329395 035 $a(CaPaEBR)ebrary10055620 035 $a(SSID)ssj0000165840 035 $a(PQKBManifestationID)11153114 035 $a(PQKBTitleCode)TC0000165840 035 $a(PQKBWorkID)10147033 035 $a(PQKB)11145674 035 $a(MiAaPQ)EBC3376406 035 $a(Au-PeEL)EBL3376406 035 $a(CaPaEBR)ebr10055620 035 $a(OCoLC)923263578 035 $a(Perlego)4736109 035 $a(BIP)670085 035 $a(EXLCZ)99110986584751236 100 $a19930818d1993 ua 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aGround water vulnerability assessment $econtamination potential under conditions of uncertainty /$fCommittee on Techniques for Assessing Ground Water Vulnerability, Water Science and Technology Board, Commission on Geosciences, Environment, and Resources, National Research Council 205 $a1st ed. 210 $aWashington, D.C. $cNational Academy Press$d1993 215 $a1 online resource (226 p.) 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9780309047999 311 08$a0309047994 320 $aIncludes bibliographical references and index. 327 $aGROUND WATER VULNERABILITY ASSESSMENT -- Copyright -- Preface -- Contents -- Executive Summary -- INTRODUCTION -- The Vulnerability Assessment Process -- MANAGEMENT -- APPROACHES TO VULNERABILITY ASSESSMENT -- Uncertainty in Vulnerability Assessment -- Testing and Evaluation of Vulnerability Assessments -- Computing Environments for Vulnerability Assessments -- DATA AND DATABASES -- CASE STUDIES -- RESEARCH RECOMMENDATIONS -- REFERENCE -- 1 Introduction -- PROTECTING GROUND WATER FROM FUTURE CONTAMINATION -- Ground Water Vulnerability to Contamination -- ASSESSING GROUND WATER VULNERABILITY -- Uncertainty in the Assessment Process -- Elements of Vulnerability Assessment -- Reference Location -- Specific and Intrinsic Vulnerability -- Contaminant Pathways -- Spatial Scales -- THE VULNERABILITY ASSESSMENT PROCESS -- Case Studies -- REFERENCES -- 2 Considerations in the Selection and Use of Vulnerability Assessments -- INTRODUCTION -- EXISTING AND POTENTIAL USES FOR VULNERABILITY ASSESSMENTS -- Policy Analysis and Development -- Program Management -- Land Use Decisions -- Zoning and Screening -- Conditioning, Mitigating, and Compliance Monitoring -- Technical Assistance -- General Education and Awareness -- FACTORS AFFECTING SELECTION AND USE OF VULNERABILITY ASSESSMENTS -- Technical Considerations -- Type and Form of Output -- Size and Characteristics of Assessment Area -- Availability of Data -- Uncertainty of Results and Impact on Use -- Institutional Considerations -- Time Frame of a Vulnerability Assessment -- Cost and Commitment of Personnel and Physical Resources -- Coordination with Other Planning Programs and Needs -- Coordination with Other Agencies and Institutions -- SUMMARY -- 3 Approaches to Vulnerability Assessments -- INTRODUCTION -- REVIEW OF CURRENT APPROACHES -- Overlay and Index Methods -- Depth to Ground Water -- Recharge. 327 $aProperties of the Unsaturated Zone and Aquifer Material -- Discussion -- Process-Based Simulation Models -- Discussion -- Statistical Techniques for Vulnerability Assessment -- Regionalization -- Vulnerability Assessment -- UNCERTAINTY IN VULNERABILITY ASSESSMENT METHODS -- Sources of Errors -- Errors in Obtaining Data -- Errors Due to Natural Spatial and Temporal Variability -- Errors in Computerization (Digitizing) and Storage of Data -- Data Processing Errors -- Models and Conceptualizations -- Output and Visualization Errors -- Uncertainty Analyses -- Applications of FOUA to Vulnerability Assessment -- Uncertainty of Uncertainty Analyses -- TESTING AND EVALUATION OF VULNERABILITY ASSESSMENTS -- Regional-Scale Testing and Evaluation -- Limitations of Ground Water Quality Sampling -- Difficulties in Characterizing the Mobile Fraction of Contaminants -- Sampling Near the Water Table -- Purging and Pumping -- COMPUTING ENVIRONMENTS FOR VULNERABILITY ASSESSMENTS -- Building and Making Databases Available for Assessment Approaches -- Geographical Display of Assessment Results -- Analytical Functions -- SUMMARY -- REFERENCES -- 4 Data and Databases -- INTRODUCTION -- Federal Data Management Activities -- State and Local Data Management Activities -- TOPOGRAPHY -- Characteristics and Availability of Data -- Discussion -- SOILS -- Characteristics and Availability of Data -- Geographic Databases -- Attribute Databases -- Site-Specific Databases -- Discussion -- HYDROGEOLOGY -- Characteristics and Availability of Data -- Discussion -- WEATHER AND CLIMATE -- Characteristics and Availability of Data -- Discussion -- LAND USE AND LAND COVER -- Characteristics and Availability of Data -- Discussion -- MANAGEMENT FACTORS -- Characteristics and Availability of Data -- National Resources Inventory -- Agricultural Census of 1987 -- Farm and Ranch Irrigation Survey. 327 $aPesticide Databases -- Field Level Databases -- CONCLUSION -- REFERENCES -- 5 Case Studies -- INTRODUCTION -- IOWA -- Introduction -- Defining the Question -- Mandate, Selection, and Implementation -- CAPE COD -- Introduction -- Defining the Question -- Selection and Implementation of Approaches -- Results -- FLORIDA -- Introduction -- The Hydrogeologic Setting -- Defining the Question -- Selecting an Approach -- Results -- THE SAN JOAQUIN VALLEY -- Introduction -- Hydrogeologic Setting -- Defining the Question -- Selection and Implementation of an Approach -- HAWAII -- Introduction -- Defining the Question -- Approaches -- Results -- APPLICATION OF A VULNERABILITY INDEX FOR DECISION-MAKING AT THE NATIONAL LEVEL -- Need for a Vulnerability Index -- Description of the Vulnerability Index -- Application to Program Management -- Application to Policy Analysis and Development -- SUMMARY -- REFERENCES -- 6 Conclusions and Recommendations -- MANAGEMENT IMPLICATIONS -- APPROACHES -- DATA AND DATABASES -- RESEARCH AGENDA -- Fundamental Transport and Fate Processes -- Databases -- Geoprocessing and Display -- Assessment Methods -- Appendixes -- Appendix A Sources for Digital Resource Databases -- GENERAL SOURCE INFORMATION -- Appendix B Biographical Sketches -- COMMITTEE MEMBERS -- COMMITTEE STAFF -- Appendix C Contributors to the Committee's Effort -- Index. 330 $aSince the need to protect ground water from pollution was recognized, researchers have made progress in understanding the vulnerability of ground water to contamination. Yet, there are substantial uncertainties in the vulnerability assessment methods now available. With a wealth of detailed information and practical advice, this volume will help decisionmakers derive the most benefit from available assessment techniques. It offers Three laws of ground water vulnerability. Six case studies of vulnerability assessment. Guidance for selecting vulnerability assessments and using the results. Reviews of the strengths and limitations of assessment methods. Information on available data bases, primarily at the federal level. This book will be indispensable to policymakers and resource managers, environmental professionals, researchers, faculty, and students involved in ground water issues, as well as investigators developing new assessment methods. 606 $aGroundwater$xPollution 606 $aWater$xPollution potential 615 0$aGroundwater$xPollution. 615 0$aWater$xPollution potential. 676 $a628.1/68 712 02$aNational Research Council (U.S.).$bCommittee on Techniques for Assessing Ground Water Vulnerability. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910961926403321 996 $aGround water vulnerability assessment$94359118 997 $aUNINA