Oaths were ubiquitous rituals in ancient Athenian legal, commercial, civic and international spheres. Their importance is reflected by the fact that much of surviving Greek drama features a formal oath sworn before the audience. This is the first comprehensive study of that phenomenon. The book explores how the oath can mark or structure a dramatic plot, at times compelling characters like Euripides' Hippolytus to act contrary to their best interests. It demonstrates how dramatic oaths resonate with oath rituals familiar to the Athenian audiences. Aristophanes' Lysistrata and her accomplices, for example, swear an oath that blends protocols of international treaties with priestesses' vows of sexual abstinence. By employing the principles of speech act theory, this book examines how the performative power of the dramatic oath can mirror the status quo, but also disturb categories of gender, social status and civic identity in ways that redistribute and confound social authority.
Body MR Imaging at 3.0 Tesla is a practical text enabling radiologists to maximise the benefits of high field 3T MR systems in a range of body applications. It explains the physical principles of MR imaging using 3T magnets, and the differences between 1.5T and 3T when applied extracranially. The book's organ-based approach focuses on optimized techniques, providing recommended protocols for the main vendors of 3T MRI systems. All major thoracic and abdominal organs are covered, including breast, heart, liver, pancreas, the GI tract, kidneys, prostate and female pelvic organs. Abdominal and pelvic MR angiography and MRCP are also discussed. Protocol optimization, appearance of artifacts and novel applications using 3T are emphasized. Written and edited by experts in the field, Body MR Imaging at 3.0 Tesla guides radiologists in optimizing imaging protocols for 3T MR systems, reducing artifacts and identifying the advantages of using 3T in body applications.
Whole journals are devoted to catalysis and books describe the various catalysts. However it is very difficult to find detailed protocols offering information on where to source catalysts, how to stor
Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the op
Organic Syntheses consists of protocols for the synthesis of useful chemical com-pounds. For each protocol, safety warnings are presented along with detailed experimental de-scriptions for the prepara
Learn how to provide seamless, high quality multimedia for the wireless Internet This book introduces the promising protocols for multimedia services and presents the analytical frameworks for measur
The IMS builds on the success of the first two editions to provide comprehensive coverage of IMS: its concepts, architecture, protocols and functionalities. It has been completely revised to include a
Most research in the life sciences involves a core set of molecular-based equipment and methods, for which there is no shortage of step-by-step protocols. Nonetheless, there remains an exceedingly hig
This book examines the historical context of the earliest Christian martyrs, and anchors their grisly and often wilful self-sacrifice to the everyday life and outlook of the cities of the Roman empire. Professor Bowersock begins by investigating both the time and the region in which martyrdom, as we know it, came into being. He also offers comparisons of the Graeco-Roman background with the martyrology of Jews and Muslims. A study of official protocols illuminates the bureaucratic institutions of the Roman state as they applied to the first martyrs; and the martyrdoms themselves are seen within the context of urban life (and public spectacle) in the great imperial cities. By considering martyrdom in relation to suicide, the author is also able to demonstrate the peculiarly Roman character of Christian self-sacrifice in relation to other forms of deadly resistance to authority.
This book was first published in 2006. Adolescent drug abuse is one of the most challenging disorders to treat. It impacts on schools, community-based programs, mental health and medical facilities, and juvenile justice settings. This book provides practitioners, program developers and policy makers with practical information for improving outcomes in adolescent substance abuse. The authors cover a range of issues, including empirically based treatment development protocols, how to incorporate innovative treatment models into diverse clinical settings; research advances; interventions with special populations, culturally based intervention guidelines, and recommendations for practice and policy.
This is a systematic and comprehensive introduction both to compositional proof methods for the state-based verification of concurrent programs, such as the assumption-commitment and rely-guarantee paradigms, and to noncompositional methods, whose presentation culminates in an exposition of the communication-closed-layers (CCL) paradigm for verifying network protocols. Compositional concurrency verification methods reduce the verification of a concurrent program to the independent verification of its parts. If those parts are tightly coupled, one additionally needs verification methods based on the causal order between events. These are presented using CCL. The semantic approach followed here allows a systematic presentation of all these concepts in a unified framework which highlights essential concepts. This 2001 book is self-contained, guiding the reader from advanced undergraduate level. Every method is illustrated by examples, and a picture gallery of some of the subject's key fig
Wireless sensor networks promise an unprecedented fine-grained interface between the virtual and physical worlds. They are one of the most rapidly developing information technologies, with applications in a wide range of fields including industrial process control, security and surveillance, environmental sensing, and structural health monitoring. Originally published in 2005, this book provides a detailed and organized survey of the field. It shows how the core challenges of energy efficiency, robustness, and autonomy are addressed in these systems by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create algorithms and protocols and engineers implementing integrated solutions, it also contains many exercises and can be used by graduate
Austin Lovegrove examines the sentencing of offenders appearing on multiple offences and how judges, having fixed a prison sentence for each offence, determine an overall sentence for each offender. Analysing judges' verbal protocols for sentencing problems and sentences for fictitious cases, he is able to offer, first, a model of judicial sentencing in the form of a decision strategy comprising working rules deduced from the given responses of judges as they attempted to apply sentencing law, and, second, a numerical guideline in the form of an algebraic model quantifying the application of the working rules. On the basis of this empirical data, Dr Lovegrove furthers understanding of the nature and place of intuition in sentencing and of how the cumulation of sentence can be integrated into a system of proportionality related to the seriousness of single offences.
This book fills a gap in the current literature by giving strategies for the selection and extraction of plant material, protocols for pharmacological investigation which are arranged in therapeutic s
Integrated Genomics: A Discovery-Based Laboratory Course introduces the excitement of discovery to the basic molecular biology laboratory. Utilizing up-to-date molecular biology protocols and a basic
The definitive compendium of bioassay procedures and applications A virtual encyclopedia of key bioassay protocols, this up-to-date, essential resource reviews the methods and applications of bioassa
This comprehensive 1992 treatise was the first on electrical trauma in humans. Several of the world's leading experts describe the basic mechanisms of tissue injury in victims of electrical trauma, the complex and varied manifestations of electrical trauma, and clinical treatment protocols. Coverage of the topic is broad, ranging from mathematical models of molecular processes to intra-operative clinical care. The volume describes the basic physiochemical mechanisms responsible for tissue damage and explains the complex and variable ways in which electrical trauma manifests itself. Electrical Trauma serves as an important source of information from a variety of perspectives that contribute to the understanding of the electrical injury problem and development of rational therapy. It is suitable for clinicians in trauma surgery, emergency medicine, plastic surgery, intensive care and burns units and for those with an academic and research interest in the mechanisms and causes of electric
While we are all becoming familiar with the Internet, which uses the Transfer Control Protocol/Internet Protocol (TCP/IP), more and more additions and changes emerge every year, including protocols th
Monitoring Ecological Impacts provides the tools needed by professional ecologists, scientists, engineers, planners and managers to design assessment programs that can reliably monitor, detect and allow management of human impacts on the natural environment. The procedures described are well grounded in inferential logic, and the statistical models needed to analyse complex data are given. Step-by-step guidelines and flow diagrams provide the reader with clear and useable protocols, which can be applied in any region of the world and to a wide range of human impacts. In addition, real examples are used to show how the theory can be put into practice. Although the context of this book is flowing water environments, especially rivers and streams, the advice for designing assessment programs can be applied to any ecosystem.
Clinical CT: Techniques and Practice aims to give radiographers working in CT on a regular basis an extended knowledge of CT protocols and how they should be adapted to optimise image quality. It uses relevant clinical examples to demonstrate the advantages of the suggested techniques, which may not yet be in use in all hospitals. It covers all but the most rare of pathologies and will therefore also serve as a useful single reference for the busy radiographer.