1997
DOI: 10.1080/00062278.1997.10739680
|View full text |Cite
|
Sign up to set email alerts
|

Boekbesprekingen

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2004
2004
2009
2009

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The text of Jubilees has been the subject of a number of studies. Besides the publication of most of the Hebrew material in DJD XIII (VanderKam and Milik 1994) and DJD XXIII (García Martínez, Tigchelaar, and van der Woude 1998), van Ruiten (2000) has written a detailed analysis of Jubilees' rewriting of Genesis 1-11 and has used all of the most recently available evidence in doing so.…”
Section: Textmentioning
confidence: 99%
“…The text of Jubilees has been the subject of a number of studies. Besides the publication of most of the Hebrew material in DJD XIII (VanderKam and Milik 1994) and DJD XXIII (García Martínez, Tigchelaar, and van der Woude 1998), van Ruiten (2000) has written a detailed analysis of Jubilees' rewriting of Genesis 1-11 and has used all of the most recently available evidence in doing so.…”
Section: Textmentioning
confidence: 99%
“…It also results in an anachronism with respect to Noah's death, which is announced prior to the construction of the Tower, but which is not supposed to occur (if the timeframe of the chronology is followed) until several years after the destruction of the Tower. Even Jacques van Ruiten (2000), who generally treats the Book of Jubilees as an integrated, harmonious account, describes this anachronism as being 'somewhat peculiar ' (p.342).…”
Section: The Book Of Jubilees' Chronologymentioning
confidence: 99%
“…Ruitenbeek in [30] simulates virus propagation using parameterized stochastic models of a network of mobile phones, created with the help of Mobius tool and provides insight into the relative effectiveness of each response mechanism. Two models of the propagation of mobile phone viruses were designed to study the impact of viruses on the dependability and security of mobile phones: the first model quantifies the propagation of multimedia messaging system (MMS) viruses and the second -of Bluetooth viruses.…”
Section: Other Malware-oriented Modelsmentioning
confidence: 99%