{"component": "clause", "props": {"groups": [{"snippet": "[ABD16] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587 \u2587\u2587\u2587, and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. A subfield lattice attack on overstretched NTRU assumptions. In: Springer, 2016, pages 153\u2013178. [AD21] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Lattice Attacks on NTRU and LWE: A History of Refinements. In: Compu- tational Cryptography: Algorithmic Aspects of Cryptol- ogy. London Mathematical Society Lecture Note Series. Cambridge University Press, 2021, pages 15\u201340. [ADPS16] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and Pe- ter \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Post-quantum Key Exchange\u2013A New Hope. In: 2016, pages 327\u2013343. [AEN19] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587. Random Lattices: Theory And Practice. Available at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587/bin/random_lattice. pdf. 2019. [AFG13] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. On the efficacy of solving LWE by reduction to unique-SVP. In: Springer, 2013, pages 293\u2013310. [AGPS20] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Estimating quan- tum speedups for lattice sieves. In: Springer, 2020, pages 583\u2013613. [AGVW17] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Revisiting the expected cost of solving uSVP and applications to LWE. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer. 2017, pages 297\u2013322. [Ajt99] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Generating Hard Instances of the Short Basis Problem. In: ICALP. 1999, pages 1\u20139. [AKS01] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, and \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. A sieve algorithm for the shortest lattice vector problem. In: STOC. 2001, pages 601\u2013610. [AL22] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587. Predicting BKZ Z- Shapes on q-ary Lattices. Cryptology ePrint Archive, Re- port 2022/843. 2022. [Alb+15] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587, \u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. On the complex- ity of the BKW algorithm on LWE. In: Designs, Codes and Cryptography 74.2 (2015), pages 325\u2013354. [Alb+19] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. The general sieve kernel and new records in lattice reduction. In: Annual International Conference on the Theory and Applications of Cryptographic Tech- niques. Springer. 2019, pages 717\u2013746. [ALL19] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Decoding Challenge. Available at http : / / \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587. 2019. [AN17] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587. Random \u2587\u2587\u2587- \u2587\u2587\u2587\u2587\u2587 revisited: lattice enumeration with discrete prun- ing. In: Eurocrypt. 2017, pages 65\u2013102. [ANS18] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587. Quantum lattice enumeration and tweaking discrete pruning. In: Asiacrypt. 2018, pages 405\u2013434. [AP11] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Generating Shorter Bases for Hard Random Lattices. In: Theory of Computing Sys- tems 48.3 (Apr. 2011). Preliminary version in STACS 2009, pages 535\u2013553. [AR05] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Lattice problems in NP coNP. In: J. ACM 52.5 (2005). Preliminary version in FOCS 2004, pages 749\u2013765. [AUV19] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Faster sieving algorithm for approximate SVP with con- stant approximation factors. Cryptology ePrint Archive, Report 2019/1028. 2019. [AWHT16] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. In: Springer, 2016, pages 789\u2013819. [Bab16] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Graph isomorphism in quasipolynomial time. In: Proceedings of the forty-eighth annual ACM symposium on Theory of Computing. 2016, pages 684\u2013 697. [Bab19] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Canonical form for graphs in quasipolyno- mial time: preliminary report. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Com- puting. 2019, pages 1237\u20131246. [Bab86] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. On \u2587\u2587\u2587\u2587\u2587\u2587\u2019 lattice reduction and the near- est lattice point problem. In: Combinatorica 6.1 (1986). Preliminary version in STACS 1985, pages 1\u201313.", "size": 5, "snippet_links": [{"key": "note-series", "type": "definition", "offset": [349, 360]}, {"key": "new-hope", "type": "definition", "offset": [510, 518]}, {"key": "theory-and-practice", "type": "clause", "offset": [623, 642]}, {"key": "available-at", "type": "definition", "offset": [644, 656]}, {"key": "cost-of", "type": "clause", "offset": [1161, 1168]}, {"key": "application-of", "type": "clause", "offset": [1254, 1268]}, {"key": "information-security", "type": "definition", "offset": [1284, 1304]}, {"key": "the-general", "type": "clause", "offset": [2055, 2066]}, {"key": "preliminary-version", "type": "clause", "offset": [2830, 2849]}, {"key": "cost-estimation", "type": "clause", "offset": [3342, 3357]}, {"key": "preliminary-report", "type": "definition", "offset": [3656, 3674]}], "samples": [{"hash": "kBCY837Z24y", "uri": "/contracts/kBCY837Z24y#bibliography", "label": "License Agreement", "score": 31.9727516174, "published": true}, {"hash": "jFgK9L95zXj", "uri": "/contracts/jFgK9L95zXj#bibliography", "label": "License Agreement", "score": 25.5722103119, "published": true}, {"hash": "3hUeXRySWog", "uri": "/contracts/3hUeXRySWog#bibliography", "label": "License Agreement", "score": 25.5722103119, "published": true}], "hash": "6152984389a6c6196345066379565871", "id": 1}, {"snippet": "[Ben83] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587-Or. Another advantage of free choice (extended ab- stract): Completely asynchronous agreement protocols. In Proceed- ings of the second annual ACM symposium on Principles of distrib- uted computing, pages 27\u201330. ACM, 1983.", "size": 4, "snippet_links": [], "samples": [{"hash": "ffoilWaOrwH", "uri": "/contracts/ffoilWaOrwH#bibliography", "label": "Byzantine Agreement", "score": 30.8692264557, "published": true}, {"hash": "jnlbH7LPLCI", "uri": "/contracts/jnlbH7LPLCI#bibliography", "label": "Byzantine Agreement", "score": 30.5768890381, "published": true}, {"hash": "551XaU5T6ZQ", "uri": "/contracts/551XaU5T6ZQ#bibliography", "label": "Byzantine Agreement", "score": 30.1740894318, "published": true}], "hash": "aa82744023ea2862fe1b491ae5794235", "id": 2}, {"snippet": "[Ben83] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587-Or. Another advantage of free choice (extended ab- stract): Completely asynchronous agreement protocols. In Proceed- ings of the second annual ACM symposium on Principles of distrib- uted computing, pages 27\u201330. ACM, 1983. [BG89] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587 \u2587 \u2587\u2587\u2587\u2587\u2587. Asymptotically optimal distributed consensus. Springer, 1989. [BGP89] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pages 410\u2013415, 1989. [BT85] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Asynchronous consensus and broadcast protocols. Journal of the ACM (JACM), 32(4):824\u2013840, 1985. [DGM+11] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Stabilizing Consensus with the Power of Two Choices. In Proceedings of the Twenty-third Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA, June 2011. [DS83] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. Authenticated algorithms for byzantine agreement. SIAM Journal on Computing, 12(4):656\u2013666, 1983. [FG03] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587 \u2587 \u2587\u2587\u2587\u2587\u2587. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the twenty- second annual symposium on Principles of distributed computing, pages 211\u2013220. ACM, 2003.", "size": 4, "snippet_links": [{"key": "computer-science", "type": "clause", "offset": [504, 520]}, {"key": "north-carolina", "type": "clause", "offset": [546, 560]}, {"key": "power-of", "type": "clause", "offset": [887, 895]}, {"key": "june-2011", "type": "clause", "offset": [1019, 1028]}, {"key": "byzantine-agreement", "type": "clause", "offset": [1101, 1120]}], "samples": [{"hash": "lqO3TdtSs4r", "uri": "/contracts/lqO3TdtSs4r#bibliography", "label": "Byzantine Agreement", "score": 28.8682098389, "published": true}, {"hash": "fmYbfrZGJtR", "uri": "/contracts/fmYbfrZGJtR#bibliography", "label": "Byzantine Agreement", "score": 27.8334846497, "published": true}], "hash": "3d63264c54f55be3a8c6c4a703ef1aed", "id": 3}, {"snippet": "\u2587\u2587\u2587\u2587, \u2587. & \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. A New Reference Grammar of Modern Spanish. London: \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, 1989 (varias eds.). \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587\u2587\u2587\u2587\u2587\u2587 y escribir correctamente: gram\u00e1tica normativa del espa\u00f1ol actual. Madrid: Arco/Libros. 2006. Real Academia Espa\u00f1ola, Asociaci\u00f3n de Academias de la Lengua Espa\u00f1ola. Nueva gram\u00e1tica de la lengua espa\u00f1ola: Manual. Madrid: Espasa, 2010. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, M.S. Spanish/English Contrasts: a Course in Spanish Linguistics. Georgetown University Press. 2002. \u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587/aula/didactired/didactiteca (The Instituto \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 Didactics Library) \u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587/aula/pasatiempos (Interactive didactic activities aimed at students of Spanish) \u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587/lengua/refranero (A selection of proverbs and proverbial phrases in Spanish with their equivalents in a range of other languages.) \u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587 (Diccionario de la Real Academia de la Lengua Espa\u00f1ola) \u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 (Diccionario ingl\u00e9s-espa\u00f1ol-ingl\u00e9s) Final Grades will be calculated with the following distributive basis in mind: - Regular class attendance: 10% - Classwork undertaken: 15% - Active participation in class sessions: 25% - The successful completion of an assignment based on the prose work, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587: 15% - A final exam which will involve testing all Course-content: 35% - Grading on a scale of 10 as maximum: Fail (0-4\u20199); Pass (5-6\u20199); Very Good (7- 8\u20199); Excellent (9); With Distinction (10). Course FA-37 PAINTING IN LITERARY SEVILLE (45 class hours) Lecturer: \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 (\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587@\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587) Substitute Lecturer: \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587 (\u2587\u2587\u2587\u2587@\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587)", "size": 4, "snippet_links": [{"key": "a-course", "type": "clause", "offset": [409, 417]}, {"key": "aimed-at", "type": "definition", "offset": [641, 649]}, {"key": "selection-of", "type": "clause", "offset": [712, 724]}, {"key": "other-languages", "type": "clause", "offset": [805, 820]}, {"key": "final-grades", "type": "clause", "offset": [948, 960]}, {"key": "class-attendance", "type": "clause", "offset": [1037, 1053]}, {"key": "active-participation", "type": "definition", "offset": [1089, 1109]}, {"key": "completion-of", "type": "definition", "offset": [1150, 1163]}, {"key": "an-assignment", "type": "clause", "offset": [1164, 1177]}, {"key": "based-on", "type": "definition", "offset": [1178, 1186]}, {"key": "final-exam", "type": "clause", "offset": [1232, 1242]}, {"key": "a-scale", "type": "definition", "offset": [1307, 1314]}, {"key": "very-good", "type": "clause", "offset": [1361, 1370]}, {"key": "class-hours", "type": "definition", "offset": [1465, 1476]}], "samples": [{"hash": "2iiraOWEWUa", "uri": "/contracts/2iiraOWEWUa#bibliography", "label": "Agreement Based Courses of Study for Students From Abroad", "score": 31.5453548431, "published": true}, {"hash": "hA1CyIxYkDp", "uri": "/contracts/hA1CyIxYkDp#bibliography", "label": "Course of Study Agreement", "score": 30.7159328461, "published": true}], "hash": "40228a6bd80357317f2e4b7227c2323a", "id": 4}, {"snippet": "The bibliography below should be seen as an index of those texts which can be made use of by students as a way of delving deeper into the subject-units made available. - ANONYMOUS (Bachiller Revoltoso), 1995 [1750]. Libro de la Gitaner\u00eda \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 de los a\u00f1os 1740 a 1750 que escribi\u00f3 el bachiller revoltoso para que no se imprimiera. Pr\u00f3logo y Edici\u00f3n de \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587. - \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. 2002: \u201cEl arte flamenco como campo de producci\u00f3n cultural. Aproximaci\u00f3n a sus aspectos sociales\u201d. En Anduli, Revista Andaluza de Ciencias Sociales, n\u00ba 1. - BALTAN\u00c1S, E. y \u2587\u2587\u2587\u2587\u2587\u2587 P. M. 1998: \u201cEl flamenco y los gitanos en The Zincali \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u201d. EN STEINGRESS, \u2587. \u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 (Eds.) 1998: Flamenco y nacionalismo. Aportaciones para una sociolog\u00eda pol\u00edtica del flamenco. Universidad \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 y Fundaci\u00f3n \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Sevilla, pp. 81-92. - \u2587\u2587\u2587\u2587\u2587\u2587\u2587, M. 2000 [1972]. Ese dif\u00edcil mundo del flamenco. Universidad \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. - \u2587\u2587\u2587\u2587\u2587\u2587, A. M. 1989: \u201cSobre el campesinado andaluz y el flamenco\u201d. En VV.AA. 1989: \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. 100 a\u00f1os que muri\u00f3 y a\u00fan vive. Ayuntamiento \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, pp. 51- 58. - \u2587\u2587\u2587\u2587\u2587\u2587, \u2587.\u2587. 1999: Los Z\u00edncali: los gitanos de Espa\u00f1a. Madrid. \u2587\u2587\u2587\u2587\u2587\u2587. - CONSEJER\u00cdA DE TURISMO Y DEPORTE (REGIONAL BOARD OF TOURISM AND SPORT). 2002. Gu\u00eda del Flamenco de Andaluc\u00eda. Sevilla, Junta de Andaluc\u00eda. Incluye 2 CDs. Los archivos de texto y de sonido se puede descargar del sitio: \u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587 - CRUCES \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. 2004/2002: M\u00e1s all\u00e1 de la M\u00fasica: Antropolog\u00eda y Flamenco (I) y (II). Signatura Ediciones. Sevilla. - CRUCES \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. 2001: Flamenco y Patrimonio. Bienal de Flamenco \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Sevilla.", "size": 4, "snippet_links": [{"key": "the-subject", "type": "clause", "offset": [134, 145]}, {"key": "made-available", "type": "clause", "offset": [152, 166]}, {"key": "board-of", "type": "definition", "offset": [1223, 1231]}], "samples": [{"hash": "2iiraOWEWUa", "uri": "/contracts/2iiraOWEWUa#bibliography", "label": "Agreement Based Courses of Study for Students From Abroad", "score": 31.5453548431, "published": true}, {"hash": "hA1CyIxYkDp", "uri": "/contracts/hA1CyIxYkDp#bibliography", "label": "Course of Study Agreement", "score": 30.7159328461, "published": true}], "hash": "ac30102fb2bdbf37a83b52fd6f5551c8", "id": 5}, {"snippet": "Boeing Aerospace Operations, Inc. (Boeing), 1993a. Position Paper 148-156. January 22 , 1993b. Report of Findings, Phase I Building Assessment Building 45. April Brady and Associates, Inc. 1994. Final Environmental Assessment, Moffett Field Comprehensive Use Plan, Moffett Field, California. August Chemical Waste Management Inc., 1993a. Draft Preliminary Site Assessment, Hangar 1, Buildings 32, 33, 83, 118, 119, 120, 347, and 584, Naval Air Station, Moffett Field, California. February 1 , 1993b. Draft Preliminary Site Assessment, Area 8, Buildings I A, 105, 249, 256A, 329, 331, 400. May 17 , 1993c. Phase I Environmental Site Assessment Area 4, Buildings 77, 449, and 454. June 1 , 1993d. Phase I Environmental Assessment, Building 567 Public Works Warehouse, Naval Air Station Moffett Field, California. August 25 , 1993e. Surface Soil Lead Survey, Naval Air Station, Moffett Field California. October 29 , 1994. Naval Weapons Bunkers and Laboratory Declassification Survey, NASA Ames Research Center. January 12 Chou, Joseph, Regional Water Quality Control Board, San Francisco Bay Region, 2000. Personal communication - telephone. Conversation regarding USB and comments and draft EBS. October 4 Department of the Anny (Anny), Headquarters 124th U.S. Anny Reserve Command, 1994. Memorandums discussing Radon Survey Results to USAR Aviation Support Facility 27 and to 3rd BN, 12th Special Forces Group. July 8 Harding ESE, Inc. (Harding ESE, formerly Harding Lawson Associates), 1988. Remedial Investigation Report, Middlefield -Ellis-Whisman Area, Mountain View, California 2000. Draft Air Quality Investigation, 476 and 543, Ames Research Center. July 14 ICF-Clement, 1988. Endangerment Assessment for the Middlefield-Ellis-Whisman Site, Mountain View, California, June 15. Insituform Technologies, Inc. 1997a. BAMSI, Inc. Solicitation #MSSC-C-96-026, Sewer Rehabilitation, Moffett Field, California January , 1997b. DMJM Engineers, NASA Ames Research Center, Repair Sanitary Sewer System, Moffett Field, California. May IT Corporation, 1993. Operable Unit 2 Remedial Investigation Report, Naval Air Station Moffett Field, California Vol. 1. May Iwamura, T.I., 1980. Saltwater Intrusion in the Santa Clara Valley Bay/ands Area, California. Santa Clara Valley Water District. September Locus Technologies, 1999. Remedial Action Report Regional Ground Water Remediation Program Middlefield-Ellis-Whisman Site Mountain View, California. December NASA -ARC, 1989. Memorandum to Steve Brisbin from NWT presenting Radon Survey results for period between 12/27/88 and 1/02/89. February 9 Naval Air Station Moffett fiel\u2022.Public Works Environmental Division (NAS Moffett Field), 1990. Hazard Communication Plan for NAS Moffett Field ,1991a. Hazardous Substance Spill Contingency Plan, Naval Air Station, Moffett Field CA. January , 1991b. Hazardous Waste Management Plan, Naval Air Station, Moffett Field CA. April , 1991c. Oil Spill Prevention, Control, and Countermeasues Plan, Naval Air Station, Moffett Field CA. April , 1993. Draft PCB Survey, Naval Air Station, Moffett Field CA. November Naval Energy and Environmental Support Activity (NEESA, Port Hueneme), 1984. Initial Assessment Study of Naval Air Stations, Moffett Field, California. March , 1989. Hazardous Waste Minimization Plan for Naval Air Station, Moffett Field CA. October , 1991. Solid Waste Management Plan (SWMP) for Naval Air Station, Moffett Field, CA. September", "size": 3, "snippet_links": [{"key": "report-of-findings", "type": "clause", "offset": [95, 113]}, {"key": "final-environmental-assessment", "type": "definition", "offset": [195, 225]}, {"key": "chemical-waste", "type": "definition", "offset": [299, 313]}, {"key": "area-4", "type": "definition", "offset": [643, 649]}, {"key": "phase-i-environmental-assessment", "type": "definition", "offset": [695, 727]}, {"key": "public-works", "type": "definition", "offset": [742, 754]}, {"key": "surface-soil", "type": "definition", "offset": [830, 842]}, {"key": "research-center", "type": "definition", "offset": [992, 1007]}, {"key": "regional-water-quality-control-board", "type": "definition", "offset": [1034, 1070]}, {"key": "san-francisco-bay", "type": "definition", "offset": [1072, 1089]}, {"key": "personal-communication", "type": "definition", "offset": [1104, 1126]}, {"key": "department-of", "type": "clause", "offset": [1205, 1218]}, {"key": "survey-results", "type": "clause", "offset": [1317, 1331]}, {"key": "support-facility", "type": "definition", "offset": [1349, 1365]}, {"key": "remedial-investigation-report", "type": "definition", "offset": [1493, 1522]}, {"key": "mountain-view", "type": "clause", "offset": [1557, 1570]}, {"key": "air-quality", "type": "definition", "offset": [1595, 1606]}, {"key": "sanitary-sewer-system", "type": "definition", "offset": [1977, 1998]}, {"key": "operable-unit-2", "type": "definition", "offset": [2053, 2068]}, {"key": "saltwater-intrusion", "type": "definition", "offset": [2177, 2196]}, {"key": "water-district", "type": "definition", "offset": [2269, 2283]}, {"key": "remedial-action-report", "type": "clause", "offset": [2321, 2343]}, {"key": "ground-water", "type": "definition", "offset": [2353, 2365]}, {"key": "remediation-program", "type": "definition", "offset": [2366, 2385]}, {"key": "communication-plan", "type": "clause", "offset": [2693, 2711]}, {"key": "hazardous-substance", "type": "definition", "offset": [2742, 2761]}, {"key": "spill-contingency-plan", "type": "definition", "offset": [2762, 2784]}, {"key": "hazardous-waste-management-plan", "type": "definition", "offset": [2840, 2871]}, {"key": "spill-prevention", "type": "definition", "offset": [2929, 2945]}, {"key": "assessment-study", "type": "definition", "offset": [3181, 3197]}, {"key": "waste-minimization", "type": "definition", "offset": [3272, 3290]}, {"key": "solid-waste-management-plan", "type": "definition", "offset": [3353, 3380]}], "samples": [{"hash": "apqxfmzfnVx", "uri": "/contracts/apqxfmzfnVx#bibliography", "label": "Enhanced Use Lease (Bloom Energy Corp)", "score": 29.3750858307, "published": true}, {"hash": "kl2FrztGulX", "uri": "/contracts/kl2FrztGulX#bibliography", "label": "Enhanced Use Lease (Bloom Energy Corp)", "score": 27.8391513824, "published": true}, {"hash": "ijqnawYbaV6", "uri": "/contracts/ijqnawYbaV6#bibliography", "label": "Enhanced Use Lease (Bloom Energy Corp)", "score": 27.6119098663, "published": true}], "hash": "bf72ccc32d8fe286e82b10b59c8556c7", "id": 6}, {"snippet": "Keeping in mind the custom in universities in the United States of employing a single text, from our standpoint, the text offering the clearest picture of the subject in hand is: \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587: Espa\u00f1a en democracia, 1975-2000 (Barcelona: Plaza y \u2587\u2587\u2587\u2587\u2587), 2001. The book itself contains a bibliographical index which can help those students wishing to amplify information regarding specific subject areas, as well as providing help when carrying out assignments.", "size": 3, "snippet_links": [{"key": "united-states-of", "type": "definition", "offset": [50, 66]}, {"key": "the-subject", "type": "clause", "offset": [155, 166]}, {"key": "the-book", "type": "clause", "offset": [262, 270]}, {"key": "information-regarding", "type": "clause", "offset": [360, 381]}, {"key": "subject-areas", "type": "definition", "offset": [391, 404]}], "samples": [{"hash": "2zM64UwrjBq", "uri": "/contracts/2zM64UwrjBq#bibliography", "label": "Course of Study Agreement", "score": 35.3193778992, "published": true}, {"hash": "2iiraOWEWUa", "uri": "/contracts/2iiraOWEWUa#bibliography", "label": "Agreement Based Courses of Study for Students From Abroad", "score": 31.5453548431, "published": true}, {"hash": "hA1CyIxYkDp", "uri": "/contracts/hA1CyIxYkDp#bibliography", "label": "Course of Study Agreement", "score": 30.7159328461, "published": true}], "hash": "24a366c3a19d29b95561d5e6151d4d0b", "id": 7}, {"snippet": "The Bibliography section lists all referenced documentation used as source material in the compilation of the report. This information can include but is not limited to:\na) criteria, methodology, program scheme documentation;\nb) technical reference documentation; and\nc) developer documentation used in the evaluation effort. It is critical for the sake of reproducibility that all developer documentation is uniquely identified with the proper release date, and proper version numbers. The following information is provided for inclusion on all certificates issued on behalf of Participants to this Recognition Agreement.", "size": 3, "snippet_links": [{"key": "referenced-documentation", "type": "clause", "offset": [35, 59]}, {"key": "source-material", "type": "definition", "offset": [68, 83]}, {"key": "the-report", "type": "clause", "offset": [106, 116]}, {"key": "not-limited", "type": "clause", "offset": [154, 165]}, {"key": "scheme-documentation", "type": "clause", "offset": [204, 224]}, {"key": "reference-documentation", "type": "clause", "offset": [239, 262]}, {"key": "developer-documentation", "type": "clause", "offset": [271, 294]}, {"key": "the-evaluation", "type": "clause", "offset": [303, 317]}, {"key": "release-date", "type": "definition", "offset": [445, 457]}, {"key": "on-behalf-of", "type": "definition", "offset": [566, 578]}, {"key": "recognition-agreement", "type": "clause", "offset": [600, 621]}], "samples": [{"hash": "kyGXxf8iCbE", "uri": "/contracts/kyGXxf8iCbE#bibliography", "label": "Mutual Recognition Agreement", "score": 19.2874240875, "published": true}, {"hash": "isSiH06a88c", "uri": "/contracts/isSiH06a88c#bibliography", "label": "Mutual Recognition Agreement", "score": 19.143737793, "published": true}, {"hash": "20oPdE0UH78", "uri": "/contracts/20oPdE0UH78#bibliography", "label": "Mutual Recognition Agreement", "score": 19.0095825195, "published": true}], "hash": "857514101d39fe162173abc24a23256a", "id": 8}, {"snippet": "\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587\u2587\u2587 centro a los m\u00e1rgenes. Narrativa hispanoamericana del Siglo XX. Sevilla: Universidad \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, 2003. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. Nueva historia de la literatura hispanoamericana. Madrid: Editorial Castalia, 1997. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587\u2587\u2587 escritores y la creaci\u00f3n en Hispanoam\u00e9rica. Madrid: Castalia, 2004. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587. Comentarios filol\u00f3gicos sobre el realismo m\u00e1gico. Madrid: Arco Libros, 2006. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. Historia personal del boom. Barcelona: Seix Barral, 1982. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 hispanoamericana contempor\u00e1nea. Madrid: Taurus, 1987. \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Estudios en el Centenario de Los Raros y Prosas profanas. Sevilla: Universidad \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, 1998.", "size": 3, "snippet_links": [], "samples": [{"hash": "2iiraOWEWUa", "uri": "/contracts/2iiraOWEWUa#bibliography", "label": "Agreement Based Courses of Study for Students From Abroad", "score": 31.5453548431, "published": true}, {"hash": "hA1CyIxYkDp", "uri": "/contracts/hA1CyIxYkDp#bibliography", "label": "Course of Study Agreement", "score": 30.7159328461, "published": true}], "hash": "886edd77fbee02dde0281b754ab77adc", "id": 9}, {"snippet": "[1] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587- \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Decimation limits of principal algebraic Zd - actions, Preprint (2021). [2] \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, Local limit theorems for par- tial sums of stationary sequences generated by \u2587\u2587\u2587\u2587\u2587\u2013Markov maps, Stochastics and Dynamics 1 (2001), no. 02, 193\u2013237. [3] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, The complex analytic structure of the space of closed Rie- \u2587\u2587\u2587\u2587 surfaces, Princeton University Press, 2015. [4] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, A proof of the transfer-current theorem in absence of reversibility, Statistics & Probability Letters 142 (2018), 17\u201322. [5] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Introduction to commutative algebra, CRC Press, 2018. [6] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, A natural topology for upper semicontinuous functions and a Baire category dual for convergence in measure, Pacific J. Math. 96 (1981), no. 2, 251\u2013263. MR637972 [7] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Deux propri\u00e9t\u00e9s d\u00e9cidables des suites r\u00e9currentes lin\u00e9aires, Bull. Soc. Math. France 104 (1976), no. 2, 175\u2013184 (French). MR414475 [8] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Spaces of Riemann surfaces as bounded domains, Bul- letin of the American Mathematical Society 66 (1960), no. 2, 98\u2013103. [9] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Introduction to compact Riemann surfaces, Springer, 2011. [10] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, Limit theorems for non-hyperbolic automor- phisms of the torus, Israel Journal of Mathematics 109 (1999), no. 1, 61\u201373. [11] \u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587, Uniform approximation to \u2587\u2587\u2587\u2587\u2587\u2587\u2019\u2587 measure in sev- eral variables, Canad. Math. Bull. 41 (1998), no. 1, 125\u2013128, DOI 10.4153/CMB-1998-019-6. MR1618904 [12] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Spe- cial invited paper: uniform spanning forests, Annals of probability (2001), 1\u201365. [13] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Expansive subdynamics, Trans. Amer. Math. Soc. 349 (1997), no. 1, 55\u2013102, DOI 10.1090/S0002-9947-97- 01634-6. MR1355295 [14] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, Equilibrium states and the ergodic theory of Anosov dif- feomorphisms, Springer Lecture Notes in Math 470 (1975), 78\u2013104. [15] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Vitesse dans le th\u00e9or\u00e8me limite central pour certains syst\u00e8mes dynamiques quasi-hyperboliques, Bulletin de la Soci\u00e9t\u00e9 Math\u00e9matique de France 133 (2005), no. 3, 395\u2013 417. [16] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Local characteristics, entropy and limit theorems for spanning trees and domino tilings via transfer- impedances, The Annals of Probability (1993), 1329\u20131371. [17] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, A transfer principle: from periods to isoperiodic foliations, arXiv preprint arXiv:1511.07635 (2015). [18] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, Isoperiodic meromorphic forms: two simple poles, arXiv:2109.01796 (2021). [19] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Limite d\u2019ensembles et g\u00e9om\u00e9trie des nombres, Bull. Soc. Math. France 78 (1950), 143\u2013151 (French). MR38983 [20] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, Galois descent, \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/ blurbs/galoistheory/galoisdescent.pdf. [21] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, On the Chabauty space of locally compact abelian groups, Algebr. Geom. Topol. 11 (2011), no. 4, 2007\u20132035, DOI 10.2140/agt.2011.11.2007. MR2826931 [22] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, A variational princi- ple for domino tilings, \u2587. \u2587\u2587\u2587\u2587. Math. Soc. 14 (2001), no. 2, 297\u2013346. [23] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Rates in the strong invariance principle for ergodic automorphisms of the torus, Stochastics and Dynamics 14 (2014), no. 02, 1350021. [24] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Theoretical studies of self-organized criticality, Physica A: Statistical Mechanics and its Applications 369 (2006), no. 1, 29\u201370. [25] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Convergence to the \u2587\u2587\u2587\u2587\u2587\u2587 measure and the dis- tribution of periodic points for algebraic Noetherian Zd-actions, arXiv 1611.04664 (2016). [26] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Limit theorems for partially hyperbolic systems, Transactions of the American Mathematical Society 356 (2004), no. 4, 1637\u20131689. [27] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 surfaces, Oxford University Press, 2011. [28] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587, Sequences, discrepancies and ap- plications, Springer, 2006. [29] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, Absolute factorization of polynomials: a geo- metric approach, SIAM J. Comput. 20 (1991), no. 1, 1\u201321, DOI 10.1137/0220001. MR1082133 [30] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587, Statistical theory of the energy levels of complex sys- tems. I, Journal of Mathematical Physics 3 (1962), no. 1, 140\u2013156. [31] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Expansive subdynamics for algebraic Zd-actions, Er- godic Theory Dynam. Systems 21 (2001), no. 6, 1695\u20131729, DOI 10.1017/S014338570100181X. MR1869066 [32] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587 \u2587\u2587\u2587 \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, Recurrence sequences, Mathematical Surveys and Monographs, vol. 104, American Mathematical Society, Providence, RI, 2003. MR1990179 [33] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, On roughly transitive amenable graphs and harmonic Dirichlet functions, Proceedings of the American Math- ematical Society (2000), 2479\u20132485. [34] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Geometry in the tropical limit, Math. Semesterber. 59 (2012), no. 1, 57\u201373. [35] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587, Absolute irreducibility of polynomials via New- ton polytopes, \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 237 (2001), no. 2, 501\u2013520, DOI 10.1006/jabr.2000.8586. MR1816701 [36] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Dis- criminants, resultants, and multidimensional determinants, \u2587\u2587\u2587\u2587\u2587- \u2587\u2587\u2587\u2587\u2587\u2587: Theory & Applications, Birkh\u00e4user Boston, Inc., Boston, MA, 1994. MR1264417 [37] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Transcendental and algebraic numbers, Dover, New York, 1960. [38] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Statistical ensembles of complex, quaternion, and real matrices, Journal of Mathematical Physics 6 (1965), no. 3, 440\u2013449. [39] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, Lectures on random lozenge tilings, Cambridge Univ. Press, to appear. [40] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, The central limit theorem for stationary processes, Doklady Akademii Nauk, 1969, pp. 739\u2013741. [41] , A homoclinic version of the central limit theorem, Journal of Mathematical Sciences 68 (1994), no. 4, 451\u2013458.", "size": 3, "snippet_links": [{"key": "local-limit", "type": "definition", "offset": [189, 200]}, {"key": "the-complex", "type": "definition", "offset": [355, 366]}, {"key": "the-space", "type": "definition", "offset": [389, 398]}, {"key": "princeton-university", "type": "definition", "offset": [429, 449]}, {"key": "proof-of", "type": "clause", "offset": [507, 515]}, {"key": "the-transfer", "type": "clause", "offset": [516, 528]}, {"key": "for-non", "type": "clause", "offset": [1339, 1346]}, {"key": "the-\u2587", "type": "clause", "offset": [3694, 3699]}, {"key": "oxford-university-press", "type": "clause", "offset": [4009, 4032]}, {"key": "new-york", "type": "clause", "offset": [5624, 5632]}, {"key": "the-central", "type": "clause", "offset": [5891, 5902]}], "samples": [{"hash": "fPO2hoONIe8", "uri": "/contracts/fPO2hoONIe8#bibliography", "label": "License Agreement", "score": 22.069814682, "published": true}, {"hash": "9sbO9DODG6W", "uri": "/contracts/9sbO9DODG6W#bibliography", "label": "License Agreement", "score": 22.069814682, "published": true}], "hash": "86a15c0fcad26ebf47847410e4485008", "id": 10}], "next_curs": "ClUST2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjELEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhViaWJsaW9ncmFwaHkjMDAwMDAwMGEMogECZW4YACAA", "clause": {"title": "Bibliography", "size": 307, "parents": [["recordation", "RECORDATION"], ["methodology", "Methodology"], ["special-exceptions-or-provisions", "\u2013 SPECIAL EXCEPTIONS OR PROVISIONS"], ["research-streams", "Research streams"], ["empirical-domain", "Empirical domain"]], "children": [["", ""], ["certificates-associated-with-it-product-evaluations", "Certificates Associated with IT Product Evaluations"], ["ru-ow3-approach", "Ru-Ow3 approach"], ["introduction", "Introduction"], ["computational-details", "Computational details"]], "id": "bibliography", "related": [["cryptography", "Cryptography", "Cryptography"], ["metadata", "Metadata", "Metadata"], ["images", "Images", "Images"], ["photography", "Photography", "Photography"], ["conhecimento-da-lingua", "Conhecimento da Lingua", "Conhecimento da Lingua"]], "related_snippets": [], "updated": "2025-07-24T04:27:57+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The Bibliography clause serves to list all sources, references, or materials cited or consulted in the preparation of a document or agreement. It typically includes books, articles, websites, and other resources, formatted according to a specified citation style. By providing a comprehensive record of referenced materials, this clause ensures transparency, supports the credibility of the document, and allows readers to verify or further explore the information presented."}, "json": true, "cursor": ""}}