Javascript must be enabled to continue!
Theodosius II: Towards the Code (408–437)
View through CrossRef
AbstractThis chapter discusses Theodosius II's legislation up to March 16, 437, the date of the last law included in the Theodosian Code, and the quaestors who were responsible for drafting it. Theodosius II was the son of Arcadius, and he was only seven years old when the executive power was thrust on him. In this chapter, only ten of the 14 quaestors during the reign of Theodosius II are discussed, as well as the respective laws that they had drafted.
Title: Theodosius II: Towards the Code (408–437)
Description:
AbstractThis chapter discusses Theodosius II's legislation up to March 16, 437, the date of the last law included in the Theodosian Code, and the quaestors who were responsible for drafting it.
Theodosius II was the son of Arcadius, and he was only seven years old when the executive power was thrust on him.
In this chapter, only ten of the 14 quaestors during the reign of Theodosius II are discussed, as well as the respective laws that they had drafted.
Related Results
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
Joint Beamforming and Aerial IRS Positioning Design for IRS-assisted MISO System with Multiple Access Points
<p><code>Intelligent reflecting surface (IRS) is a promising concept for </code><code><u>6G</u></code><code> wireless communications...
Design of Malicious Code Detection System Based on Binary Code Slicing
Design of Malicious Code Detection System Based on Binary Code Slicing
<p>Malicious code threatens the safety of computer systems. Researching malicious code design techniques and mastering code behavior patterns are the basic work of network se...
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
Alih Kode Dan Campur Kode Dalam Interaksi Masyarakat Terminal Motabuik Kota Atambua
This research aims to describe the use of language in community interactions at the Motabuik terminal, Atambua City. The use of language in question is the form and function of cod...
Ammianus, Theodosius and Sallust's Jugurtha
Ammianus, Theodosius and Sallust's Jugurtha
The purpose of this paper is to examine Ammianus' treatment of the elder Theodosius and to suggest the existence of certain parallels between his account of Theodosius' suppression...
Educating Theodosius II
Educating Theodosius II
Abstract
This chapter examines the representation of Theodosius II as a pious ruler, enshrined by the accounts of the ecclesiastical historians Sozomen and Socrates....
Author Index
Author Index
Aalto, S., 2352
Abankwa, D., 32
Abd El‐Aleem, S.A., 650
Abizaid, A., 2488
Ackerman, S.L., 11
Adams, D.J., 2410
Agasse, F., 1459
Aggleton, J.P., 3291
Aguilar, J., 3006
Ahmed, S., 38...
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Systematic Evaluation of AI-Generated Python Code: A Comparative Study across Progressive Programming Tasks
Abstract
Background: AI-based code assistants are on the rise in software development as powerful technologies offering streamlining of code generation and better-quality c...

