{"component": "clause", "props": {"groups": [{"samples": [{"hash": "8VVQL1VQqtA", "uri": "/it/contracts/8VVQL1VQqtA#references", "label": "Convenzione Quadro", "score": 32.7082500103, "published": true}, {"hash": "1Xhzn9yqL07", "uri": "/it/contracts/1Xhzn9yqL07#references", "label": "Convenzione Quadro", "score": 31.5932820216, "published": true}, {"hash": "7E1jVz7wZ5", "uri": "/it/contracts/7E1jVz7wZ5#references", "label": "Convenzione Quadro", "score": 28.7608917875, "published": true}], "snippet": "Barbato C, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 F, \u2587\u2587\u2587\u2587\u2587\u2587 C. (2009) \u2587. Biomed. Biotechnol., 2009:871313. - \u2587\u2587\u2587\u2587 D, et al. (2008) Stem Cells. 26:2564. Chiancone E, \u2587\u2587\u2587\u2587 P. Front Biosci. (2010) 15:122-31 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 L, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 I, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 C, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 I, \u2587\u2587\u2587\u2587\u2587 MV \u201c2009 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 25 11940\u2013 11946 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 E, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587, (2007) J Gene Med. 9:265-74. \u2587\u2587\u2587\u2587\u2587 C, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 A (2008) Nature Phys. 4:794. De Angelis et al. (2008) Nano Letter, 8:2321. De Angelis et al. (2009) Nature Nanotech. 5:67. Dobrowolny G, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587, \u2587\u2587\u2587\u2587\u2587\u2587 L, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 C, \u2587\u2587\u2587\u2587 \u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 L, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 N, \u2587\u2587\u2587\u2587\u2587\u2587 A. (2005) \u2587. Cell. Biol. 168:193. Dobrowolny G, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587 A. (2008a) Neurol. Res. 30:131 Dobrowolny G, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 E, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 C, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 Z, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 N, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 F, \u2587\u2587\u2587\u2587 G, \u2587\u2587\u2587\u2587\u2587\u2587 M, and \u2587\u2587\u2587\u2587\u2587\u2587 A. (2008b) Cell Metabolism 8:425. \u2587\u2587\u2587\u2587\u2587 RA, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 GJ, \u2587\u2587\u2587\u2587 CH. (2006) Am J Physiol Regul Integr Comp Physiol. 290:R773-84. \u2587\u2587\u2587\u2587\u2587 R, \u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 T, \u2587\u2587\u2587\u2587\u2587 K, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 A, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 T, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 T, \u2587\u2587\u2587\u2587\u2587 G G, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. (2005) Curr. Biol. 15:587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587, \u2587\u2587\u2587 KP, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 G, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 T, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 B, \u2587\u2587\u2587\u2587\u2587 N, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 R. (2004) Nature, 432:235. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 E, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 N (2006) \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 38(Supplement): S20\u2013S24. Kalir S, \u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587 U (2005) Mol Syst Biol. 1, 2005; Karumbayaram S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 BG, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587 JA, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 L, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 A, \u2587\u2587\u2587\u2587\u2587\u2587 AE, \u2587\u2587\u2587\u2587\u2587 AT, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 SA, Wiedau-\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 HI, \u2587\u2587\u2587\u2587\u2587 WE. (2009) Stem Cells, 27:806.", "snippet_links": [], "size": 3, "hash": "b01ca358bb9197886a23a3965884a22c", "id": 1}, {"samples": [{"hash": "8VVQL1VQqtA", "uri": "/it/contracts/8VVQL1VQqtA#references", "label": "Convenzione Quadro", "score": 32.7082500103, "published": true}, {"hash": "1Xhzn9yqL07", "uri": "/it/contracts/1Xhzn9yqL07#references", "label": "Convenzione Quadro", "score": 31.5932820216, "published": true}, {"hash": "7E1jVz7wZ5", "uri": "/it/contracts/7E1jVz7wZ5#references", "label": "Convenzione Quadro", "score": 28.7608917875, "published": true}], "snippet": "Accapezzato D, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 V, \u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587 LV, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 A, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 MU, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 V. Hepatic expansion of a virus-specific regulatory CD8(+) T cell population in chronic hepatitis C virus infection. J Clin Invest. 2004; 113:963-72. \u2587\u2587\u2587, \u2587. et al. Stem cell-like glioma cells promote tumor angiogenesis through vascular endothelial growth factor. Cancer Res 66, 7843-8 (2006). \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 D, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, Campese AF, Felli MP, \u2587\u2587\u2587\u2587\u2587\u2587 A, Screpanti I. Notch3: from subtle structural differences to functional diversity. Oncogene. 2008 Sep 1;27(38):5092-8. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 G, \u2587\u2587\u2587\u2587\u2587\u2587 G, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 D, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 S, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 A. CCL3 and CXCL12 regulate trafficking of mouse bone marrow NK cell subsets. Blood 2008; 111:3626-34. \u2587\u2587\u2587\u2587\u2587\u2587 P, \u2587\u2587\u2587\u2587\u2587 PG, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 PJ. Mesenchymal stem cells: revisiting history, concepts, and assays. Cell Stem Cell. 2008; 2:313-9. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 SW, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 D, \u2587\u2587\u2587\u2587\u2587\u2587 E, \u2587\u2587\u2587\u2587\u2587\u2587 T, \u2587\u2587\u2587\u2587 M, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 J, \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 O, \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 M. Bmi1 controls tumor development in an Ink4a/Arf-independent manner in a mouse model for glioma. Cancer Cell. 2007; 12:328-41. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. et al. A perivascular niche for brain tumor stem cells. Cancer Cell 11, 69-82 (2007).", "snippet_links": [], "size": 3, "hash": "124722699a0654f7aceb4683c4aa12d7", "id": 2}, {"samples": [{"hash": "hBx8JwKGwQy", "uri": "/it/contracts/hBx8JwKGwQy#references", "label": "Accordo Di Programma", "score": 26.7366616147, "published": true}], "snippet": "[1] \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2014. The core design of \u2587\u2587\u2587\u2587\u2587\u2587, a demonstrator for the European lead-cooled reactors, Nucl. Eng. and Des., Vol. 278, 287-301. [2] OECD/NEA, 2014. Technology Roadmap Update for Generation IV Nuclear Energy Systems, . [3] \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2014. Ottimizzazione del progetto di nocciolo di \u2587\u2587\u2587\u2587\u2587\u2587. Ricerca di Sistema Elettrico, Technical Report ADPFISS-LP2-050. [4] Lodi, F., et al., 2015. Characterization of the new \u2587\u2587\u2587\u2587\u2587\u2587 core configuration. Ricerca di Sistema Elettrico, Technical Report ADPFISS-LP2-085. [5] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2002. The ERANOS code and data system for Fast Reactor neutronic analyses, Proc. Int. Conf. on the New Frontiers of Nuclear Technology: reactor physics, safety and high- performance computing, PHYSOR 2002, Seoul, Korea, October 7-10th. [6] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., et al., 1995. RELAP5/MODE3 code manual, NUREG/CR\u20135535, INEL\u201395/174, Idaho National Engineering Laboratory. [7] \u2587\u2587\u2587\u2587, \u2587., et al., 2016. ANTEO+: a sub-channel code for thermal-hydraulic analysis of liquid metal cooled systems, Nucl. Eng. and Des., Vol. 301, 128-152. [8] \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2006. The \u2587\u2587\u2587\u2587-3.1 Nuclear Data Library, NEA Data Bank, OECD, \u2587\u2587\u2587\u2587 Report 21, NEA N_6190. [9] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., 1997. Physics documentation of Eranos: the Ecco cell code, CEA Tech. Rep. DERSPRC-LEPh-97-001. [10] \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., et al., 1993. TGV: a coarse mesh 3 dimensional diffusion-transport module for the CCRR/ERANOS code system, Tech. Rep. CEA DRNR-SPCILEPh-93-209. [11] OECD-NEA, 2011. Technical and economical aspects of load following with nuclear power plants. [12] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2014. A preliminary approach to the \u2587\u2587\u2587\u2587\u2587\u2587 control strategy, Progress in Nuclear Energy, Vol. 73, 113-128. [13] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., et al., 2014. Studi preliminari di tecniche di monitoraggio del nocciolo di \u2587\u2587\u2587\u2587\u2587\u2587. Ricerca di Sistema Elettrico, ENEA Technical Report ADPFISS-LP2-051.", "snippet_links": [{"key": "studi-preliminari", "type": "clause", "offset": [1742, 1759]}], "size": 2, "hash": "8c9fd88a4a5a8b9c59f5a509fb2a28d9", "id": 3}, {"samples": [{"hash": "bYeKWoXnk0c", "uri": "/it/contracts/bYeKWoXnk0c#references", "label": "Recruitment Approval", "score": 33.3474043208, "published": true}], "snippet": "Gofynnir i chi, os gwelwch yn dda, roi manylion am ddau unigolyn sy\u2019n fodlon cyflwyno geirda sy\u2019n canolbwyntio ar y meini prawf uchod yn gyffredinol yn ogystal \u00e2\u2019ch gonestrwydd personol chi. Lle mae\u2019n berthnasol, hoffai\u2019r Panel Dethol dderbyn geirda gan un canolwr mewn capasiti proffesiynol / gwaith. Fodd bynnag, oherwydd natur y penodiad gofynnir i chwi beidio \u00e2 chyflwyno enwau cynghorwyr neu weithwyr y Cyngor neu gyfeillion neu berthnasau agos cynghorwyr neu weithwyr y Cyngor fel canolwyr. Please provide details of two persons who would be willing to provide references with particular regard to the above criteria generally and also to your personal integrity. Where applicable, it would be desirable for the Selection Panel to receive a reference from one referee in a professional / working capacity. However, owing to the nature of the appointment, the names of councillors or Council employees or close friends or relatives of councillors or Council employees should not be put forward as referees.", "snippet_links": [], "size": 1, "hash": "4744dceabbd59dceac99ec6b452fcdb7", "id": 4}, {"samples": [{"hash": "ePy4xahHqRg", "uri": "/it/contracts/ePy4xahHqRg#references", "label": "Public Finance Research Papers", "score": 29.9658945261, "published": true}], "snippet": "\u2587\u2587\u2587\u2587\u2587, \u2587., (1999), The Questionable Ascent of \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Stanford Law Review, Vol. 51, No. 6, pp. 1547-\u00ad\u20101589 \u2587\u2587\u2587\u2587\u2587, \u2587., (1998), Default rules for incomplete contracts, The New Palgrave Dictionary of Economics and the Law, \u2587\u2587\u2587\u2587\u2587\u2587 (ed.) vol. I, London. \u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1989) Filling Gaps in Incomplete Contracts: An Economic Theory of Default Rules, The Yale Law Journal, Vol. 99, No. 1, pp. 87-\u00ad\u2010130. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, G., (1970), The market for lemons: quality uncertainty and the market mechanism, Quartely Journal of Economics, n. 85, pp. 488-\u00ad\u2010500. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2009) Liability for Contractual Negotiations in English Law: Looking for the Litmus Test, InDret Revista para el an\u00e1lisis del derecho, VOL. 1, PP. 2-\u00ad\u201021. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1998), The economic basis of damages for breach of contract, The Journal of Legal Studies, Vol. 1, No. 2, pp. 277-\u00ad\u2010304. BASS, N., (2009) Eleventh hour collapse: an elements-\u00ad\u2010based comparison of the German doctrine of culpa in contrahendo and Australian principles of pre-\u00ad\u2010contractual liability, Macquarie Journal of Business Law, Vol. 6, pp. 217-\u00ad\u2010238. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587, S., (1991), Information and the scope of liability for breach of contract: the rule of \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Journal of Law, Economics and Organization, Vol. 7, pp. 284-\u00ad\u2010312. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1999), Reconsidering contractual liability and the incentive to reveal information, Stanford Law Review, Vol. 51, No. 6, pp. 1615-\u00ad\u20101627. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., BEN-\u00ad\u2010SHAHAR, O., (2001), Precontractual reliance, The Journal of Legal Studies, Vol. 30, No. 2, pp. 423-\u00ad\u2010457. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, F., (1963), La responsabilit\u00e0 precontrattuale, Urbino. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1987), \u2587\u2587\u2587\u2587\u2587 in contrahendo, in Contratto e impresa, pag. 295. \u2587\u2587\u2587-\u00ad\u2010\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2009), Pre-\u00ad\u2010closing liability, \u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587 Law & Economics Working Paper no. 498 (2d series) \u2587\u2587\u2587\u2587\u2587\u2587\u2587, M., (1972), Rapporto precontrattuale e dovere di correttezza, (Osservazioni in tema di recesso dalla trattativa), in Rivista trimestrale di diritto processuale civile, pag. 962 ss.. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2000), Diritto Civile, Vol. 3, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 Editore, Milano. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1983), The contract-\u00ad\u2010tor boundary and the economics of insurance, The Journal of Legal Studies, Vol. 12, No. 2, pp. 241-\u00ad\u2010266 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2008), Mistake and Disclosure in a Model of Two-\u00ad\u2010Sided Informational Inputs, \u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/\u2587\u2587\u2587\u2587\u2587\u2587\u2587_\u2587\u2587\u2587\u2587\u2587\u2587/\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587.-\u00ad\u2010\u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, (2002), The Economics of Contracts. Theories and Applications, Cambridge University Press. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., (1965), An Economic Theory of Clubs, Economica, 32, pp. 1-\u00ad\u201014. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1980), Breach of contract and the common law duty to perform in good faith, Harvard Law Review, Vol. 94, No. 2, pp. 369-\u00ad\u2010404. CARRESI, F., (1965), In tema di responsabilit\u00e0 precontrattuale, in Temi, pag. 447. \u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., (2000), The Acquisition of \u2587\u2587\u2587\u2587\u2587\u2587 Body by General Motors, 43 Journal of Law and Economics, Vol 15. \u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., (1960), The problem of social cost, Journal of Law and Economics, Vol. 1. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1993), The present differences between the civil law and common law worlds with regard to culpa in contrahendo, Tilburg Foreign Law Review, Vol. 2, pp. 341-\u00ad\u2010369 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1996), Offer, acceptance and efficient reliance, Stanford Law Review, Vol. 48, No. 3, pp. 481-\u00ad\u2010553. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587., (2000), Theories of Contract Law: General, in \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 e \u2587. \u2587\u2587 \u2587\u2587\u2587\u2587\u2587 (eds.), Encyclopedia of Law and Economics, vol. IV, \u2587\u2587\u2587\u2587\u2587. \u2587\u2587\u2587\u2587\u2587, \u2587.\u2587., (2010) Integrating preliminary agreements into the interference torts, Columbia Law Review, Vol. 110, pp. 1253-\u00ad\u2010 1293. \u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, S., (1996), Holdups, standard breach remedies, and optimal investment, The American Economic Review, Vol. 86, No. 3, pp. 478-\u00ad\u2010501. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, M.A., (1992), The Principle of \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, California Law Review, Vol. 80, No. 3, pp. 563-\u00ad\u2010613. \u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2006), Contracting with Diversely Naive Agents, Review of Economic Studies Vol. 73, pp. 689\u2013714. \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587., (1961), The Obligation to Bargain in Good Faith, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587 Review, Vol. 47, No. 6, pp. 988-\u00ad\u20101013. \u2587\u2587\u2587\u2587\u2587, C., \u2587\u2587\u2587\u2587\u2587, R., (1980), Enforcing Promises: An Examination of the Basis of Contract, The Yale Law Journal, Vol. 89, No. 7, pp. 1261-\u00ad\u20101322. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587, M., (1993), Judicial Modification of Contracts Between Sophisticated Parties: A More Complete View of Incomplete Contracts and Their Breach, Journal of Law, Economics and Organization Vol. 9 pp. 230-\u00ad\u2010233. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, R., (2006), Charter on the law and economics of contracts, The Handbook of Law and Economics, Elsevier. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (2004), Investment, Information, and promissory liability, University of Pennsylvania Law Review, Vol. 152, pp. 1923-\u00ad\u20101946. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., (1990), Strategic Bargaining and the Economic Theory of Contract Default Rules, The Yale Law Journal, Vol. 100, No. 3, pp. 615-\u00ad\u2010664.", "snippet_links": [{"key": "responsabilit\u00e0-precontrattuale", "type": "clause", "offset": [1615, 1645]}, {"key": "dovere-di-correttezza", "type": "clause", "offset": [1894, 1915]}, {"key": "diritto-civile", "type": "clause", "offset": [2057, 2071]}], "size": 1, "hash": "eae9e64efa5b374c6375e346f13963a6", "id": 5}, {"samples": [{"hash": "5wJpHK06fPY", "uri": "/it/contracts/5wJpHK06fPY#references", "label": "Contract Collusion and Public Intervention", "score": 21.6291789854, "published": true}], "snippet": "\u2587\u2587\u2587\u2587\u2587, \u2587., \u2587\u2587\u2587\u2587\u2587\u2587, \u2587.\u2587. and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u201cOptimal Cartel Equi- libria with Imperfect Monitoring\u201d. Journal of Economic Theory 39, 251\u201369, 1986.", "snippet_links": [], "size": 1, "hash": "6404bc5acd2e76d81bb92be55aa40568", "id": 6}, {"samples": [{"hash": "3RM3dc58exy", "uri": "/it/contracts/3RM3dc58exy#references", "label": "Accordo Economico", "score": 35.3410687524, "published": true}], "snippet": "1 Maca J. et al. Drug Information Journal, vol.40: 463-473, 2006", "snippet_links": [], "size": 1, "hash": "a5a0ec6b1c0999eb949e1b76de56d168", "id": 7}, {"samples": [{"hash": "lY66OlQ5kcv", "uri": "/it/contracts/lY66OlQ5kcv#references", "label": "Contrastive Analysis of Legal Terms", "score": 32.9102863412, "published": true}], "snippet": "\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587. 1994. Language Shock: Understanding the Culture of Conversation. New York: \u2587\u2587\u2587\u2587\u2587\u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587. 2009. Isomorphism and Anisomorphism in the Translation of Legal Texts. In \u2587. \u2587\u2587\u2587\u2587\u2587 & \u2587. \u2587\u2587\u2587\u2587 & \u2587. \u2587\u2587\u2587\u2587\u2587 (eds.), Translation Issues in Language and Law, 182-192. Hampshire: Springer.", "snippet_links": [], "size": 1, "hash": "35edceb4db5704a932ea518eeda41df9", "id": 8}, {"samples": [{"hash": "8dE7fAEjPWj", "uri": "/it/contracts/8dE7fAEjPWj#references", "label": "Not Applicable", "score": 31.1648615262, "published": true}], "snippet": "\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 (deceased) v Austria (Communication No. 5/2005) (United Nations Committee on the Elimination of Discrimination against Women August 6, 2007). Action Aid. (2021). Cronache di un'occasione mancata. Il sistema antiviolenza italiano \u2587\u2587\u2587\u2587'era \u2587\u2587\u2587\u2587\u2587 ripartenza. ActionAid. (2020). Tra retorica e realt\u00e0 - Dati e proposte sul sistema antiviolenza in Italia. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587. (2000). Stereotypes and the Shaping of Identity. California Law Review, 41-53. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587., & \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, C. (2021). Global Media Monitoring Project 2020 Italy. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587. (2017). Femicide, Gender and Violence. Discourses and Counterdiscourses in Italy. London: Palgrave Macmillan.", "snippet_links": [{"key": "united-nations", "type": "definition", "offset": [63, 77]}, {"key": "il-sistema", "type": "clause", "offset": [210, 220]}], "size": 1, "hash": "00beaa664fe102c8e5c671756b7eff2f", "id": 9}, {"samples": [{"hash": "icekqeMnTOL", "uri": "/it/contracts/icekqeMnTOL#references", "label": "Technical Report", "score": 19.0, "published": true}], "snippet": "[1] Mart\u00b4\u0131n Abadi, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 4(15):706\u2013734, 1993. [2] Mart\u00b4\u0131n \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587. A logical view of composition. The- oretical Computer Science, 114(1):3\u201330, 1993. [3] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. A logic for contracts. Technical Report DISI-09-034, DISI - Universit`a di Trento, 2009. [4] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. A calculus for long running transactions. In Proc. FMOODS, 2003. [5] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u00b4an \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Theoretical foundations for compensations in flow composition languages. In Proc. POPL, 2005. [6] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. CC-Pi: A constraint-based language for specifying service level agreements. In Proc. ESOP, 2007. [7] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587. \u2587. \u2587. \u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. A trace \u2587\u2587\u2587\u2587\u2587- tics for long-running transactions. In 25 Years Communicating Sequential Processes, 2004. [8] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. A basic contract language for web services. In Proc. ESOP, 2006. [9] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. A theory of con- tracts for web services. ACM Transactions on Programming Languages and Systems, 31(5), 2009. [10] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Contracts for mobile processes. In Proc. CONCUR, volume 5710 of Lecture Notes in Computer Science. Springer, 2009. [11] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Extending the concept of transaction com- pensation. IBM Systems Journal, 41(4):743\u2013758, 2002. [12] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Structured communica- tions with concurrent constraints. In Proc. Trustworthy Global Computing (TGC), volume 5474 of Lecture Notes in Computer Science. Springer, 2008. [13] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u00b4\u2587\u2587\u2587\u2587, \u2587\u00b4\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 Bhar- \u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587. A secure compiler for session abstractions. Journal of Computer Security, 16(5):573\u2013636, 2008. [14] Aspassia Daskalopulu and \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Towards electronic contract performance. In Proc. 12th International Workshop on Database and Expert Systems Applications, 2001. [15] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587, and I.V. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. CTR-S: A logic for specifying contracts in semantic web services. In Proc. WWW04, 2004. [16] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. An authorization logic with explicit time. In Proc. CSF, 2008. [17] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Tutorial introduction to the algebraic approach of graph grammars. In Proc. of the Workshop on Graph-Grammars and Their Ap- plication to Computer Science, 1987. [18] \u2587. \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Temporal and modal logic. In Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B), pages 995\u2013 1072. North-Holland Pub. Co./MIT Press, 1990. [19] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Sagas. In SIGMOD Conference, 1987. [20] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587 and Mart\u00b4\u0131n Abadi. A modal deconstruction of access control logics. In Proc. FoSSaCS, pages 216\u2013230, 2008. [21] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587- \u2587\u2587\u2587\u2587. Normative autonomy and normative co-ordination: Declarative power, representation, and mandate. Artificial Intelligence and Law, 12(1-2):53\u2013 81, 2004. [22] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Generative communication in \u2587\u2587\u2587\u2587\u2587. ACM Transactions on Programming Languages and Systems, 7(1):80\u2013112, 1985. [23] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. The representation of e-contracts as default theories. In New Trends in Applied Artificial Intelli- gence, 2007. [24] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Towards a unified approach to encodability and separation results for process calculi. In Proc. CONCUR, 2008. [25] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Representing business contracts in RuleML. Interna- tional Journal of Cooperative Information Systems, 14(2-3), 2005. [26] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587. \u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Knowledge and common knowledge in a distributed environment. J. ACM, 37(3):549\u2013587, 1990. [27] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Contract-based discovery and adaptation of web services. In SFM, 2009. [28] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587 and Bj\u00a8\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. The fusion calculus: Expressiveness and symmetry in mobile processes. In LICS, 1998. [29] The PCL web site. \u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587.\u2587\u2587/\u223c\u2587\u2587\u2587\u2587\u2587\u2587/PCL. [30] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. Structural cut elimination - I. intuitionistic and classical logic. Information and Computation, 157(1/2):84\u2013141, 2000. [31] \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587. A formal language for electronic contracts. In Proc. FMOODS, 2007. [32] \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. The \u03c0-calculus: A Theory of Mobile Processes. Cambridge University Press, 2001. [33] \u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, and \u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587. Semantic foun- dations of concurrent constraint programming. In Proc. POPL, pages 333\u2013 352. ACM, 1991. [34] \u2587\u2587\u2587\u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587. Intuitionistic propositional logic is polynomial-space complete. Theoretical Computer Science, 9:67\u201372, 1979. [35] \u2587\u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587 and \u2587\u2587\u2587\u2587 \u2587\u2587\u2587 \u2587\u2587\u2587\u2587\u2587. Constructivism in Mathematics, vol.", "snippet_links": [{"key": "web-services", "type": "definition", "offset": [1110, 1122]}], "size": 1, "hash": "6920c9e77d0e2cdceea8680742318311", "id": 10}], "next_curs": "ClMSTWoVc35sYXdpbnNpZGVyY29udHJhY3Rzci8LEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhNyZWZlcmVuY2VzIzAwMDAwMDBhDKIBAml0GAAgAA==", "clause": {"children": [["design-codes", "Design Codes"], ["the-static-cb", "The Static CB"], ["test-circuit", "Test Circuit"], ["prototype", "Prototype"]], "parents": [["plasma-disruption-simulation", "Plasma Disruption Simulation"], ["discussion-of-results", "Discussion of results"]], "size": 54, "title": "References", "id": "references", "related": [["interpretazione", "Interpretazione", "Interpretazione"], ["norme-transitorie", "Norme transitorie", "Norme transitorie"], ["disposizioni-transitorie", "Disposizioni transitorie", "Disposizioni transitorie"], ["interpretazione-autentica", "Interpretazione autentica", "Interpretazione autentica"], ["diritto-di-accesso", "Diritto di accesso", "Diritto di accesso"]], "related_snippets": [], "updated": "2025-07-07T12:37:53+00:00"}, "json": true, "cursor": ""}}