To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The third chapter treats the geography of collective Shiʿite self and other and the question of its global contexts. It reassesses ʿĀshurā ritual to trans-European backgrounds of Shiʿite blood donation and charts the transnational evolution of the Twelver Khojas. While the first chapter presents it as local civic integration, blood donation is also a global practice supported by high religious authorities. Thus, blood donation involves cultural exchange on religious terms that both incorporates Shiʿites within national contexts of secular diversity and integrates the latter into Shiʿism’s orbit. Among Twelver Khojas, European settlement gave rise to globalized religious identity, political solidarity, or communal organization. Away from the Africa Federation in Britain, the Shia Ithnaʿashari Community of Middlesex broke open the caste mould, lowering the threshold for extramural relations while rebalancing communal self religiously. This involved strengthened transnational Shiʿite solidarity and a predilection for Middle East-centred, anti-Western Islamism. The World Federation of Khoja Shia Ithna-Asheri Muslim Communities emerged post-migration as a Britain-oriented body that evolved into the community’s global agent. Its international relations sectarianized and amplified the Twelver Khojas’ proto-statal functions on a world scale. In sum, the chapter demonstrates European transformations of Shiʿite identity in global religious contexts shaping trans-European selves.
Copyright misuse is a defence to enforcement of a valid copyright. It applies when a copyright owner either licenses or enforces its copyright in an unacceptable matter. For example, a paradigmatic case of misuse involves a copyright owner who uses a copyright license to prevent the licensee from developing competing works. A rightsholder who has committed misuse is barred from enforcing its copyright against others – including third parties who were not the direct victims of the acts of misuse – while the acts of misuse continue. This chapter explores how the misuse defence might apply in cases of upcycling involving copyright-protected materials. Although the defence of copyright misuse as such exists mainly in the US, the analysis in the chapter can also prove relevant for other countries. First, the US misuse doctrine bears considerable similarity to the general notion of abuse of rights. Second, the US misuse doctrine also borrows heavily from monopoly (anti-trust) law. While there are important differences between US anti-trust law and monopoly laws in other countries, many of the basic situations are treated the same. The discussion of the US misuse doctrine can therefore inform countries that might want to deal with upcycling situations.
In late 1914 Lawrence wrote ‘Study of Thomas Hardy’, a set of pseudo-philosophical essays. He performs soaring, sage-like meditations on individuality and its impediments: the state, work and money. As art history and Hardy’s novels start to provide resistants to Lawrence’s psychological projections of body and spirit, and of male and female, a freshness and fertility of invention provoke scintillating accounts, almost rewritings, of Hardy’s Jude the Obscure and Tess of the d’Urbervilles and the projection of a grand historiography of Europe, with Renaissance art as its pivot point. Empowered by Nietzsche’s daring example, this intellectual experiment is performed on the page without benefit of the truth-restraints of professional criticism. The Rainbow, a novel whose final version he would bring to completion only a few months later, benefited from Lawrence’s new, overweening confidence in rendering the subconscious. His inhabiting of emotions-on-the-page was now intimate and unbounded. Yet the three-generational family-saga form that Lawrence expanded in the final version could not readily accommodate the resulting extremes of emotion within a synthesising intellectual structure.
Amer Wahed, University of Texas Health Science Center, Houston,Jesse M. Jaso, University of Texas Southwestern Medical Center, Dallas,Brenda Mai, University of Texas Health Science Center, Houston
The Shrikhande graph, discovered by Indian Mathematician Sharadchandra Shankar Shrikhande in 1959, exhibits several unusual properties and occupies a pivotal position within discrete mathematics. Offering a unique introduction to graph theory and discrete mathematics, this book uses the example of the Shrikhande graph as a window through which these topics can be explored. Providing historical background, including the Euler conjecture and its demise, the authors explore key concepts including: Cayley graphs; topological graph theory; spectral theory; Latin squares; root systems. A novel and valuable resource for graduate students and researchers interested in graph theory, its history, and applications, this book offers a comprehensive exploration of the Shrikhande graph and its significance.
Amer Wahed, University of Texas Health Science Center, Houston,Jesse M. Jaso, University of Texas Southwestern Medical Center, Dallas,Brenda Mai, University of Texas Health Science Center, Houston
This chapter analyzes upcycling from the perspective of copyright infringement. Upcycling should be encouraged, especially as it makes recycling an attractive and exciting option for consumers. IP rights (IPRs) can however be seen as a barrier for such utilization of raw material. This is because traditional IP doctrines do not fully recognize these kinds of interests, despite sustainability’s fundamental relevance in society and in the Treaty of the Functioning of the EU. The chapter develops a new doctrinal standpoint to consider copyright infringements in these specific cases as a part of introducing a more general ‘sustainable lifespan’ principle in IPRs regulation.
This chapter describes how dependence on coffee and other primary commodities exacerbated foreign dependency, especially during fluctuations in global primary commodity prices. The chapter discusses the Rwandan Patriotic Front’s (RPF) origins, including the key paradigmatic ideological foundations of the party while discussing the civil war and the 1994 genocide. The chapter ends by outlining three periods of the evolution of political settlement under RPF rule. Between 1994 and 2000, RPF loyalists were rewarded, while there was increased concentration of power among Tutsi RPF members. In the 2000s, until the early 2010s, RPF leadership centralised control among a smaller clique within the RPF, with increasing elite fragmentation characterising this period. In the third phase after the early 2010s, there has been increased external reliance, and the visible threat of transnational coalitions, comprising RPF dissidents and disenchanted domestic elites, has emerged but been contained.
This chapter offers a selective overview of several structures that generalize the notion of a signed graph. The term ‘generalize’ is used informally to indicate that whenever a matrix associated with a given structure extends or includes the corresponding matrix of a signed graph, we do not insist on strict formal definitions. Because each structure comes with an extensive body of results on its own, the overview is necessarily concise and focuses on presenting the structures rather than detailing their full theoretical developments. In particular, the chapter discusses graphs defined by Hermitian matrices, including weighted graphs, various families of gain graphs, and both mixed and extended mixed graphs, treating each of these topics in meaningful depth.
Chapter 3 is concerned with the ‘non-royal’ (or ‘private’) charter corpus – that is, documents that were issued by individuals other than kings – from Kent, Mercia and Wessex between the 830s and 880s. The chapter provides an overview of this material’s content and its production contexts and processes. Canterbury dominates, since this is where a large majority of the surviving documents comes from, though there are glimpses of other settings too. A significant portion of the material from Canterbury relates to two particular ealdormannic families, though other documents demonstrate that lay and ecclesiastic people of lesser social standing also participated in documentary activity. The picture that emerges is diverse; varying practices and contexts, and different motivations for codification, reflect the richness of contemporary documentary culture. The following important themes are considered too: female participation, the relationship between royal and non-royal documentation, and the varied uses of Latin and Old English.
This chapter studies linear ternary codes generated by strongly regular signed graphs, connections between signed graphs and line systems in Euclidean space with fixed angles, and links between the spectrum of signed graphs and the skew spectrum of associated oriented graphs. We provide general characterizations and concrete constructions of efficient ternary codes, showing that those derived from adjacency matrices of strongly regular signed graphs are often optimal or satisfy conditions guaranteeing high performance, with the ternary Golay code as a notable example. The chapter also gives an upper bound on the size of line systems with specified angular properties, achieved exactly when the system corresponds to a signed graph with two eigenvalues. A central contribution of the part concerning oriented graphs is a fundamental spectral correspondence between signed graphs and associated oriented graphs, which enables the latter to be studied through the spectral theory of the former and is illustrated through several examples.