• No results found

Petronius' 'Satyrica' : sources and affinities

N/A
N/A
Protected

Academic year: 2020

Share "Petronius' 'Satyrica' : sources and affinities"

Copied!
103
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

Step 3: We then draw the teams into position 3, from group A to G, missing out the groups which already have a host assigned to that position, and the possible position which will

An analysis of the economic contribution of the software industry examined the effect of software activity on the Lebanese economy by measuring it in terms of output and value

Prof Shunji Matsuoka, a professor at Waseda University and also the general manager of the Campus Asia-EAUI programme, said: “We found that having a regional wide graduate

En febrero del año pasado el índice de radiación solar fue de 13, mientras que en febrero de este año 8 (2017) se llegó a tener un índice de 14, ambos de muy alto riesgo. Esta

[r]

Vulnerability Threat Asset Security Requirement Priority Security Attribute Security Context Security Problem Security Pattern Security Solution Solution Type is kind

The regret heuristics based on positions or routes perform well when used on their own and both yield good results within the ALNSM algorithm, even if irace chooses only the

equally represented; the remaining 30% of the individuals formed the test set, to be classified; (2) calculation, for the training set, of the Chakraborty and Majumder D and the