Professional Documents
Culture Documents
Download textbook Environmental Software Systems Infrastructures Services And Applications 11Th Ifip Wg 5 11 International Symposium Isess 2015 Melbourne Vic Australia March 25 27 2015 Proceedings 1St Edition Ralf Denz ebook all chapter pdf
Download textbook Environmental Software Systems Infrastructures Services And Applications 11Th Ifip Wg 5 11 International Symposium Isess 2015 Melbourne Vic Australia March 25 27 2015 Proceedings 1St Edition Ralf Denz ebook all chapter pdf
https://textbookfull.com/product/engineering-secure-software-and-
systems-7th-international-symposium-essos-2015-milan-italy-
march-4-6-2015-proceedings-1st-edition-frank-piessens/
https://textbookfull.com/product/trust-management-ix-9th-ifip-
wg-11-11-international-conference-ifiptm-2015-hamburg-germany-
may-26-28-2015-proceedings-1st-edition-christian-damsgaard-
jensen/
https://textbookfull.com/product/open-source-systems-adoption-
and-impact-11th-ifip-wg-2-13-international-conference-
oss-2015-florence-italy-may-16-17-2015-proceedings-1st-edition-
ernesto-damiani/
https://textbookfull.com/product/health-information-science-4th-
international-conference-his-2015-melbourne-australia-
may-28-30-2015-proceedings-1st-edition-xiaoxia-yin/
Data Driven Process Discovery and Analysis 5th IFIP WG
2 6 International Symposium SIMPDA 2015 Vienna Austria
December 9 11 2015 Revised Selected Papers 1st Edition
Paolo Ceravolo
https://textbookfull.com/product/data-driven-process-discovery-
and-analysis-5th-ifip-wg-2-6-international-symposium-
simpda-2015-vienna-austria-december-9-11-2015-revised-selected-
papers-1st-edition-paolo-ceravolo/
https://textbookfull.com/product/computational-science-and-its-
applications-iccsa-2018-18th-international-conference-melbourne-
vic-australia-july-2-5-2018-proceedings-part-iii-osvaldo-gervasi/
https://textbookfull.com/product/computational-science-and-its-
applications-iccsa-2018-18th-international-conference-melbourne-
vic-australia-july-2-5-2018-proceedings-part-v-osvaldo-gervasi/
Environmental
Software Systems
Infrastructures, Services
and Applications
123
IFIP Advances in Information
and Communication Technology 448
Editor-in-Chief
Kai Rannenberg, Goethe University Frankfurt, Germany
Editorial Board
Foundations of Computer Science
Jacques Sakarovitch, Télécom ParisTech, France
Software: Theory and Practice
Michael Goedicke, University of Duisburg-Essen, Germany
Education
Arthur Tatnall, Victoria University, Melbourne, Australia
Information Technology Applications
Erich J. Neuhold, University of Vienna, Austria
Communication Systems
Aiko Pras, University of Twente, Enschede, The Netherlands
System Modeling and Optimization
Fredi Tröltzsch, TU Berlin, Germany
Information Systems
Jan Pries-Heje, Roskilde University, Denmark
ICT and Society
Diane Whitehouse, The Castlegate Consultancy, Malton, UK
Computer Systems Technology
Ricardo Reis, Federal University of Rio Grande do Sul, Porto Alegre, Brazil
Security and Privacy Protection in Information Processing Systems
Yuko Murayama, Iwate Prefectural University, Japan
Artificial Intelligence
Tharam Dillon, Curtin University, Bentley, Australia
Human-Computer Interaction
Jan Gulliksen, KTH Royal Institute of Technology, Stockholm, Sweden
Entertainment Computing
Matthias Rauterberg, Eindhoven University of Technology, The Netherlands
IFIP – The International Federation for Information Processing
IFIP was founded in 1960 under the auspices of UNESCO, following the First
World Computer Congress held in Paris the previous year. An umbrella organi-
zation for societies working in information processing, IFIP’s aim is two-fold:
to support information processing within its member countries and to encourage
technology transfer to developing nations. As its mission statement clearly states,
The flagship event is the IFIP World Computer Congress, at which both invited
and contributed papers are presented. Contributed papers are rigorously refereed
and the rejection rate is high.
As with the Congress, participation in the open conferences is open to all and
papers may be invited or submitted. Again, submitted papers are stringently ref-
ereed.
The working conferences are structured differently. They are usually run by a
working group and attendance is small and by invitation only. Their purpose is
to create an atmosphere conducive to innovation and development. Refereeing is
also rigorous and papers are subjected to extensive group discussion.
Publications arising from IFIP events vary. The papers presented at the IFIP
World Computer Congress and at open conferences are published as conference
proceedings, while the results of the working conferences are often published as
collections of selected and edited papers.
Any national society whose primary activity is about information processing may
apply to become a full member of IFIP, although full membership is restricted to
one society per country. Full members are entitled to vote at the annual General
Assembly, National societies preferring a less committed involvement may apply
for associate or corresponding membership. Associate members enjoy the same
benefits as full members, but without voting rights. Corresponding members are
not represented in IFIP bodies. Affiliated membership is open to non-national
societies, and individual and honorary membership schemes are also offered.
Ralf Denzer Robert M. Argent
Gerald Schimak Jiří Hřebíček (Eds.)
Environmental
Software Systems
Infrastructures, Services and Applications
13
Volume Editors
Ralf Denzer
Environmental Informatics Group
Goebenstrasse 40, 66117 Saarbrücken, Germany
E-mail: ralf.denzer@enviromatics.org
Robert M. Argent
Bureau of Meteorology
GPO Box 1289, Melbourne, VIC 3001, Australia
E-mail: r.argent@bom.gov.au
Gerald Schimak
Austrian Institute of Technology GmbH
Bundesstrasse 60, 2444 Seibersdorf, Austria
E-mail: gerald.schimak@ait.ac.at
Jiří Hřebíček
Masaryk University
Kamenice 126/3, 62500 Brno, Czech Republic
E-mail: hrebicek@iba.muni.cz
Then IFIP changed publisher and the third proceedings (ISESS 1999) were
published by IFIP publisher Kluwer Academic Press:
The sixth and seventh proceedings (ISESS 2005, ISESS 2007) were published,
but this time as electronic versions under IFIP ISBN:
The eight proceedings (ISESS 2009) were again published electronically, but
not under IFIP ISBN:
1
http://www.springer.com/series/6102
Preface VII
Today Springer also has the rights of the early Kluwer and Chapman & Hall
books (ISESS 1995, ISESS 1997, ISESS 1999), as Kluwer merged with Springer
in 2004 and Chapman & Hall had been bought by Kluwer in 1997. Therefore all
proceedings that were published by a publishing house are in one place today
and can be accessed through Springer. They are available as hard cover and/or
soft cover, as eBooks and (most of them) as individual articles.
The proceedings that were self- published under the copyright of IFIP are
being made available at this conference in a new form. Specific ISESS sessions
at IEMSS are available through the IEMSS web site2 . This book also contains
an overview article that gives a complete history of what ISESS has contributed
to the research community in the past 20 years3.
2
www.iemss.org
3
See: Ralf Denzer, Topics in Environmental Software Systems, in this book
VIII Preface
Acknowledgments
The editors are grateful to all authors for their valuable contribution to the
conference, and to the members of the Program Committee for their time spent
in reviewing more than 100 submissions.
Special thanks are given to representatives of the International Federation for
Information Processing and Working Group 5.11 for their kind support of the
organization of ISESS 2015. We thank all partners involved in the preparation
of this conference and all sponsors for their valuable support.
We would like to thank the following institutions and partners particularly:
Preface IX
This time a very special thank you goes to IFIP, in particular Eduard Dundler,
IFIP publications officer, and Erich Neuhold, IFIP TC5 chairman, for granting
the rights to re-publish the 2001–2009 proceedings as second editions in an effort
to make them publicly available. From now on, every article that has ever been
published is either available at Springer / Springer Link (1995, 1997, 1999, 2011,
2013, 2015 and future books) or via the website www.enviromatics.org (2001,
2003, 2005, 2007, 2009). This concludes a major achievement.
Conference Chair
Robert Argent Bureau of Meteorology, Australia
Program Chair
Ralf Denzer Environmental Informatics Group, Germany
Organizing Committee
Robert Argent Bureau of Meteorology, Australia
Ralf Denzer Environmental Informatics Group, Germany
Jiri Hrebicek Masaryk University, Czech Republic
Gerald Schimak Austrian Institute of Technology, Austria
Program Committee
Gab Abramowitz University of New South Wales, Australia
Ioannis Athanasiadis Democritus University of Thrace, Greece
Allesandro Annoni Joint Research Center, Italy
Dan Ames Brigham Young University, USA
Robert Argent Bureau of Meteorology, Australia
Lars Bernard Technical University of Dresden, Germany
Arne Berre SINTEF, Norway
Lindsay Botten National Computational Infrastructure,
Australia
Ralf Denzer Environmental Informatics Group, Germany
Albert van Dijk Australian National University, Australia
Peter Fischer-Stabel Hochschule Trier, Germany
Peter Fitch CSIRO, Australia
Steven Frysinger James Madison University, USA
Omar el Gayar Dakota State University, USA
Lars Gidhagen SMHI, Sweden
Reiner Güttler Environmental Informatics Group, Germany
Denis Havlik Austrian Institute of Technology, Austria
Daryl Hepting University of Regina, Canada
XII Organization
Joining the Dots: Using Linked Data to Navigate between Features and
Observational Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Robert A. Atkinson, Peter Taylor, Geoffrey Squire, Nicholas J. Car,
Darren Smith, and Mark Menzel
An SMS and Email Weather Warning System for Sheep Producers . . . . . 131
Anna Weeks, Malcolm McCaskill, Matthew Cox,
and Subhash Sharma
Mobile Field Data Collection for Post Bushfire Analysis and African
Farmers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Bradley Lane, Nicholas J. Car, Justin Leonard, Felix Lipkin,
and Anders Siggins
1 Introduction
As the trend towards data-intensive cyberscience picks up pace, scientists are
becoming increasingly concerned about data provenance. As consumers of data,
scientists need to know: Where did this data come from? Is it good enough for
me to use? Can I trust it? As producers of data and expert opinion, scientists
need to ensure their results are scientifically credible, repeatable, and justified
by the methods used and the reasoned interpretations made.
Knowledge of the history of a piece of information (where it came from, what it
was generated for, and the workflow that generated it) is known as “provenance”,
although the terms “audit trail”, “lineage” and “pedigree” are common synonyms.
Understanding the provenance of a piece of information can be as important as
the information itself. Using provenance, it should be possible to understand
whether or not a piece of information is fit for the intended purpose or whether
the information should be trusted.
R. Denzer et al. (Eds.): ISESS 2015, IFIP AICT 448, pp. 1–18, 2015.
c IFIP International Federation for Information Processing 2015
2 K. Taylor et al.
2 The PMM
Like the Capability Maturity Model (CMM) [12], the PMM contains a matrix
of capabilities described at five levels of maturity. The capabilities are grouped
into Provenance Business, Data Management, Provenance Capture, Provenance
Representation and Storage, Provenance Retrieval, and Usability.
A Provenance Maturity Model 3
Table 1. (Continued)
Hardware/platform Information on the hardware environment when a work-
flow is executed
Provenance capture integra- How integrated is the collection of provenance records in
tion the process execution? For example does the carrying out
of the process generate provenance transparently or are
the provenance records obtained by post-processing log
files or independent data entry?
Provenance quality How trustworthy is the provenance record that is kept?
Sophistication of automa- How automated is the capture of provenance record; for
tion example manually or embedded into workflow processes
PROVENANCE REPRE- These capabilities discuss the static aspect of provenance
SENTATION & STORAGE information; in between creating it and using it
Provenance format Do the provenance records adhere to a standard, and
is that standard an international one or bespoke to the
organisation?
Provenance language How formalised is the content of the provenance records;
for example free text or a strictly controlled language
(with specific meanings)
Provenance security Can the provenance records be validated or can they be
corrupted or altered after collection; is there a way to
determine if corruption has occurred?
PROVENANCE RE- These capabilities address the methods and support for
TRIEVAL obtaining provenance information
Provenance availability How easy it is for people (or systems) to access the prove-
nance records?
Provenance discovery How easy is it to find the particular provenance record
they need?
Licence to use provenance Are the conditions of use of the provenance itself well
understood?
PROVENANCE USABIL- These capabilities refer to how provenance can be, or is,
ITY used: what is it all for?
Human readable What attention is given to supporting the human inter-
pretation of the provenance record?
Repeatable by automation Can a workflow be repeated using the provenance records
to identify all components and parameters that were used
in the original workflow?
Reusable, that is, repeatable Can a workflow be repeated using the provenance records
with improvement but also allow deliberate substitutions; for example, an
updated model or new dataset?
Transparent Can you see what judgement decisions were made, and
why?
Answerable (variation in re- Can the provenance records identify the component that
sults can be explained) is the source of error or difference within a workflow with
respect to an alternative?
Cross-disciplinary Is everyone talking the same language? Are they being
application forced inappropriately to talk the same language?
A Provenance Maturity Model 5
The five levels of maturity (columns) are labelled and described as follows
where the original CMM title Repeatable has been replaced with Tactical to avoid
conflicts with the use of that term in the study of provenance. The descriptions
of each level have been modified to be more appropriate for provenance.
Initial(Chaotic). It is characteristic of provenance treatment at this level that
it is (typically) undocumented and in a state of dynamic change, tending to
be driven in an ad hoc, uncontrolled and reactive manner by users or events.
This provides a chaotic or unstable approach to provenance management
and provenance services and certainly implies that any services developed
will be of very low functionality and scope.
Tactical. It is characteristic of provenance treatment at this level that many
aspects of data production and management are carried out with record-
keeping in mind. Some attention is being made to ensure that identified
processes are repeatable in some circumstances, possibly with consistent re-
sults. Discipline is unlikely to be rigorous, but where it exists it may help to
ensure that following an audit trail is possible under stress.
Defined. It is characteristic of provenance treatment at this level that there are
sets of defined and documented standard processes established and routinely
followed. These standard processes both require and enable standard tools
to be developed and used. Such tools both assist in the implementation of
the processes and offer provenance services to derive value from provenance
across the organization or community.
Managed. It is characteristic of provenance treatment at this level that it has
become uncontroversial: moved into the background as well-managed prac-
tices that are embedded in the fabric of business, travelling smoothly from
project to project. It is consistently and effectively controlled and widely
used.
Optimising. It is a characteristic of provenance management at this level that
the focus is on continually improving performance of provenance manage-
ment itself as a lever for continuous improvement of performance of the
underlying scientific or administrative processes, through both incremental
and innovative technological improvements. Provenance is a highly valued
component of business delivering transparency, accountability and knowl-
edge management.
The full PMM matrix of 33 capabilities by 5 maturity levels is included at the
end of this paper.
3 Evaluation
The PMM was used for requirements elicitation for three projects of two gov-
ernment science agencies in August 2013, over a two-day workshop. Background
material was provided, including the PMM evaluation of some existing tools,
many of which were known to the participants, such as ISO-19115-LE [6] and
Prov-O [7]. The workshop included a half-day of presentations on the nature of
6 K. Taylor et al.
provenance and some known tools and methods; brief presentations on the se-
lected projects’ goals; an introduction on the PMM and how to use it; a hands-on
application of PMM to the three projects in project groups; a subsequent require-
ments documentation exercise; a plenary analysis of consequent requirements for
the agency as a whole; and the joint development of an architecture sketch for
the agency-wide provenance management. Those who were present for the full
two days excluding the PMM developers and facilitators, that is 13 people, were
surveyed at the beginning and again at the end of the workshop.
The survey participants were invited to respond to 21 questions of which 18
were phrased on a 5-level balanced Likert scale and all 21 included requests
for free-text comments. In some cases participants indicated responses either in
between or spanning consecutive levels; in all cases these have been treated as if
the lowest (i.e. least positive) level was selected.
The lowest-scoring question overall was the pre-workshop question “Please rate
your familiarity in dealing with issues or tools relating to provenance (1=not all
aware, 5=extremely aware)”, for which the minimal response was 1, the maxi-
mum 5, and the average 3.2. The highest-scoring question overall was the post-
workshop “The approach to provenance management for your project will benefit
by the application of the PMM as you have used it in the workshop (1=strongly
disagree, 5=strongly agree)”. The minimum response was 3 and the maximum
was 5, with average 4.8. Other high-scoring questions referred to the contri-
bution of the PMM towards developing user requirements. The lowest-scoring
post-workshop question (average 3.7) referred to the ease of determining eval-
uation criteria, an element of the PMM application methodology that is out of
scope for this paper. We can conclude that the participants found the PMM
worthwhile.
The participants were also invited to suggest needs for clarification or other
improvement to the PMM version that was used in the workshop. The PMM
presented here has had some wording and sequencing adjustments since the
workshop to take account of those suggestions.
4 Related Work
We have evaluated some existing tools and methods with respect to the PMM
in order to provide some benchmarks to assist in interpretation of the PMM,
and on the other hand, to assist project designers to locate tools that might help
them achieve desired maturity levels. In this context, Prov-O [7] features due
to its potential contribution towards high-maturity provenance Representation
and Storage, therefore also contributing to high maturity Retrieval and Usability.
Because of both its underlying flexible graph representation, and the ontology
inference coupled with domain-specific ontology extensions, it is possible to use
it to traverse widely differing domain-oriented provenance records through se-
mantic, executable mappings to Prov-O, such as described in [3]. This can be
done even when the primary record-keeping may be entirely ontology-unaware,
such as is enabled by the mapping from ISO19115 Lineage to Prov-O [14].
A Provenance Maturity Model 7
5 Conclusion
We present the Provenance Maturity Model as a part of a structured approach to
developing requirements for provenance management in data-intensive science.
The PMM lays out many characteristics of provenance management in a matrix
where preferred options may be considered and selected in the context of some
evaluation criteria. We found that scientists recognise the value of a structured
approach to requirements elicitation that ensures the depth and breadth of the
issues are considered and that aspects are not overlooked. The value of the
framework in clarifying the language in an “industry standard” approach is also
appreciated.
We recommend using the PMM in a workshop environment once the scientific
content of a project is well enough understood to commence. We recommend de-
veloping an evaluation criteria then proceeding to check cells in the PMM by
consensus, adding additional rows if necessary. Later, system and software re-
quirements can be developed in a conventional way, with frequent reference to the
instantiated PMM. A record of tools and business processes that have previously
been benchmarked by the PMM can help to fill in a solution architecture. Much
later, the PMM can help to review provenance goals and to consider advancing
the maturity.
In future work we would like to re-evaluate the PMM in an alternative cultural,
organisational and problem context, and also to track the influence on project
results through project life-cycle case studies.
References
1. Ackland, R., Taylor, K., Lefort, L., Cameron, M.A., Rahman, J.: Semantic Ser-
vice Integration for Water Resource Management. In: Gil, Y., Motta, E., Ben-
jamins, V.R., Musen, M.A. (eds.) ISWC 2005. LNCS, vol. 3729, pp. 816–828.
Springer, Heidelberg (2005)
2. Adams, N., Haller, A., Krumpholz, A., Taylor, K.: A semantic lab notebook—
report on a use case modelling an experiment of a microwave-based quarantine
method. In: Linked Science (LISC 2013), vol. 1116, CEUR proceedings (October
2013)
3. Compton, M., Corsar, D., Taylor, K.: Sensor data provenance: SSNO and PROV-O
together at last. To appear 7th International Semantic Sensor Networks Workshop
(October 2014)
4. De Roure, D.: Towards computational research objects. In: Proceedings of the 1st
International Workshop on Digital Preservation of Research Methods and Arte-
facts, DPRMA 2013, pp. 16–19. ACM, New York (2013)
5. Di Stefano, M., Fox, P., Beaulieu, S., Maffei, A., West, P., Hare, J.: Enabling the
integrated assessment of large marine ecosystems: Informatics to the forefront of
science-based decision support. In: AGU Fall Meeting, number Poster IN51A-1689,
San Fancsisco, American GeoPhysical Union (December 2012)
6. ISO 19115-2:2009 geographic information - metadata - part 2: Extensions for im-
agery and gridded data. ISO19115-2 Standard (2009)
7. Lebo, T., Sahoo, S., McGuinness, D., Belhajjame, K., Cheney, J., Corsar, D.,
Garijo, D., Soiland-Reyes, S., Zednik, S., Zhao, J.: PROV-O: The PROV ontology.
W3C Recommendation (2013), http://www.w3.org/TR/prov-o/ (accessed April
23, 2014)
8. Liu, Q., Zhao, X., Taylor, K., Lin, X., Squire, G., Kloppers, C., Miller, R.: To-
wards semantic comparison of multi-granularity process traces. Knowledge-Based
Systems 52, 91–106 (2013)
9. Lopez, F.J., Barrera, J.: Linked map VGI provenance schema. Deliverable D1.6.1,
Planet Data Network of Excellence (March 2014)
10. Ma, X., Fox, P., Tilmes, C., Jacobs, K., Waple, A.: Capturing provenance of global
change information. Nature Climate Change 4(6), 409–413 (2014)
11. Page, K., Palma, R., Hołubowicz, P., Klyne, G., Soiland-Reyes, S., Cruickshank, D.,
Cabero, R.G., Cuesta, E.G., Roure, D.D., Zhao, J., Gómez-Pérez, J.M.: From work-
flows to research objects: An architecture for preserving the semantics of science. In:
2nd International Workshop on Linked Science 2012: Tackling Big Data (LISC2012),
Boston, USA, vol. 951. CEUR Proceedings (November 2012)
12. Paulk, M.C., Curtis, B., Chrissis, M.B., Weber, C.V.: Capability maturity model,
version 1.1. IEEE Software 10(4), 18–27 (1993)
13. Power, R., Wise, C., Robinson, B., Squire, G.: Harmonising web feeds for emer-
gency management. In: Piantadosi, J., Anderssen, R.S., Boland, J. (eds.) MODSIM
2013, 20th International Congress on Modelling and Simulation, pp. 2194–2200.
Modelling and Simulation Society of Australia and New Zealand (December 2013)
14. Shu, Y., Taylor, K.: ISO 19115 lineage ontology (January 2013) (accessed November
2013)
15. Shu, Y., Taylor, K., Hapuarachchi, P., Peters, C.: Modelling provenance in hydro-
logic science: A case study on streamflow forecasting. Journal of Hydroinformatics
(2012)
A Provenance Maturity Model 9
16. Taylor, K., Austin, T., Cameron, M.: Charging for information services in
service-oriented architectures. In: Proceedings, International Workshop on Busi-
ness Services Networks (BSN 2005), Workshop of IEEE International Conference
on e-Technology,e-Commerce and e-Service, Kong Kong, pp. 112–119 (March 2005)
17. Woodcock, R., Simons, B., Duclaux, G., Cox, S.: AuScope’s use of standards to
deliver earth resource data. In: Geophysical Research Abstracts, volume
12:EGU2010-1556. European GeoPhysical Union General Assembly (2010)
10 K. Taylor et al.
CORO
151. Tradussi Dione, come nel testo: forse più giustamente dovea dire
Dionea, da Dione che Omero dà per madre a Venere. Esiodo la dice
figlia dell’Oceano e di Teti, e fa nascere Venere dalle spume del mare.
152. Delia, soprannome di Diana, dall’isola di Delo, ove era nata. Vedi
Virgilio, Eglog. 3, v. 67.
153. Ibla, monte della Sicilia, celebre per lo squisito miele che vi si
raccoglieva. Due città sicule portavano questo nome, Hybla major e
Hybla parva, sulla costa orientale, le cui rovine veggonsi tuttavia in riva
al mare. I colli che la circondano, lungo il fiume Alabus, sono in tutte le
stagioni coperti di fiori, di piante odorifere, di timo e di sermolino, d’onde
le api traggono anche presentemente il più squisito miele. Già induce a
credere che il miele d’Ibla, tanto vantato dagli antichi, fosse raccolto
presso d’Ibla la piccola.
154. Enna, città in luogo eminente in mezzo della Sicilia. Le praterie dei
dintorni, inframmezzate da limpidi ruscelli, indorse di sempre
verdeggianti boschi e di fiori odorosi, erano considerate come il
soggiorno prediletto di Cerere. Fu in quella bellissima campagna che
venne rapita la di lei figlia Libera, più nota sotto il nome di Proserpina.
156. Amiclea od Amicla, città antica italiana, che dissero fabbricata dai
compagni di Castore e Polluce, i cui abitanti astenevansi da ogni
nutrimento animale. Furono distrutti dai serpenti, de’ quali abbondava il
suo paese. Erano grandi osservatori del silenzio, onde taciti li chiamò
Virgilio: Tacitis regnavit Amiclis (Æneid. lib. 10, v. 565) e qui pure nel
Pervigilium vien designata Amicla d’essersi perduta col silenzio: forse
non avendo invocato soccorso a tempo quando era devastata dai
serpenti.
157.
158. Vedi nel Vol. I. il Cap. VIII. — I Templi, dove si parla di quello di Iside.
162. Vol. II. Cap. XII, p. 106-113. Milano, 1873. Presso Felice Legros, editore.
163.
164. V. 346-49:
165.
. . . . a poco a poco
Te aggregheranno del bel numer uno
Quei che accerchian la fronte in lunghe bende,
E tutto avvolgon di monili ’l collo.
Ne’ penetrali lor, con ampie tazze
E ventraia di tenera porcella
Placan la Bona Dea. Ma quelle soglie,
Con rito inverso, or non avvien che tocchi
Piè femminile: a’ soli maschi l’ara
Apresi de la Dea. Lungi, o profane!
Alto s’intona; no, che qui non geme
Tibia ispirata da femmineo labbro.
Tal’orgie i Batti usar fra tede arcane
Solean, stancando l’Attica Cotitto.
Id., Ibid. Trad. di Gargallo.
166.
. . . Via, fuori
. . . . qual vergogna! S’alzi
Da l’equestre cuscin, chi non possiede
L’equestre censo; e de’ mezzan d’amore
Vi sottentrino i figli, in qual sia chiasso
Nati pur sien. Costinci applauda il figlio
Del grasso banditor tra la ben nata
Da’ rezïari giovinaglia, e quella
Degli accoltellatori.
V. 153-158. — Tr. Gargallo.
167.
168.
170.
171.
172.
173.
174.
175. Dissi già nel capitolo de’ Teatri come le cortigiane fossero nel
quattordicesimo gradino del teatro, citando all’uopo il Satyricon di
Apulejo.
177.
179.
180.
181. Fu Sotade poeta di Tracia, che scrisse in verso ogni sorta di libidini, e
sembra che scrivesse in quel genere che i Francesi chiamano poesie
fuggitive e che in latino diconsi commatæ, cioè incise, spartite. Così le
chiama Quintiliano; e pare che a’ tempi di lui fossero conosciute,
perciocchè egli proibisse agli istitutori di parlarne a’ giovinetti.
Intitolavansi quelle poesie del poeta Sotade Cinaedos, per cui Marziale
lo chiama Cinedo, ed altri chiama Jonico quel poema, giacchè l’epiteto
di jonico davasi a tutto ciò ch’era molle e lascivo. Visse questo poeta a’
tempi di Tolomeo, che il fece gittare in mare entro una cassa di piombo.
. . . . . Canidia, figlia
D’Albuzio, a’ suoi nemici erbe e veleno.
Tr. Gargallo.
187.
188.
189. Con una sacra indegnazione e con maggior calore per avventura di
Persio, Turno, vissuto sotto il regno di Nerone e vecchio sotto quello
degli imperatori di casa Flavia, compose satire che quello imperante
stigmatizzarono a fuoco. Vuolsi che le sue composizioni non publicasse
finchè visse quel tiranno; ma se ciò fosse, sarebbe stato minore il suo
coraggio, nè di lui avrebbe Marziale potuto dettare il seguente
epigramma:
191. Son note le pazze e infami nozze di Nerone con Sporo, celebrate
publicamente in Roma. Questo verso ricorda quello della Sat. II di
Giovenale:
193. Geta è altro favorito, che eccitò sotto Nerone una sedizione a Roma. Di
lui parla Tacito nel lib. II, cap. 72 delle Storie.
199.
..... Ascondere
Con segni intelligenti
I lusinghieri accenti.
201.
202.
Noti il lettore come Plauto usi della parola scœno, invece di cœno, come
dai Sabini si usava allora sostituire nella pronunzia la s al c. Così
scœlum per cœlum, scœna per cœna. La medesima cosa si fa oggidì,
in alcune parti d’Italia e massime in Toscana.
203.
204. Il comico latino che di queste femmine se ne intendeva, nella già citata
commedia del Pœnulus non dimenticò la scorta diobolaria, che
retribuivasi di due oboli, che è la stessa moneta del dupondium, e a
siffatte sciagurate accenna pur Seneca nel Lib. VI Controversiarum, in
quel passo: Itane decem juvenes perierunt propter dupondios duos?
205.
ARGIRIPPO
Non sono morto affatto, ancor mi resta
Qualche poco di vita, e quel che chiedi
Ancor darti poss’io; ma darò solo
Che tu rimanga in mio possesso e sappia
Che un anno intero tu mi serva e intanto
Presso di te nessun altro tu ammetta.
CLEERETA
E se tu il vuoi, quanti ho in mia casa schiavi
Evirerò; ma se d’avermi brami,
Il singrafo mi reca, e come chiedi
E come piace a te, dettane i patti:
Ma insiem portami il prezzo, agevolmente
Il resto accetterò. Son dei lenoni
Pari alle porte de’ gabellieri,
S’apron se paghi, se no, restan chiuse.
206.
DIABOLO
Fra me, l’amica mia e la mezzana
Leggine i patti, perocchè poeta
In codesti negozi unico sei.
Suvvia, mostrami il singrafo che hai scritto.
208.
210.
211.
212. «Porgi l’acqua fredda, o ragazzo.» Notisi il fridam per frigidam quanto
s’accosti alla nostra parola fredda.
213. «Una bianca m’apprese a odiar le brune.» Vedi Vol. I. Cap. Le Vie, ecc.
217.
218. «E le misere madri di null’altro più pregavano se non che fosse loro
concesso di raccogliere l’estremo sospiro de’ figli.»
Ed io tua madre,
Io cui l’esequie eran dovute, e ’l duolo
D’un cotal figlio, non t’ho chiusi gli occhi.
222. «Affermavano passarsi sotto terra l’altra vita dei morti.» Tuscul. 1, 16.
223.
. . . . e con supremi
Richiami amaramente al suo sepolcro
Rivocammo di lui l’anima errante.
Æneid. Lib. III, 67, 68. Tr. Ann. Caro.
227. «Le anime di virtù maggiore si chiamano Mani, quelle che son nel nostro
corpo diconsi Genii; fuori di esso, Lemuri; se infestano colle loro
scorrerie le case, Larve; ma se pel contrario ci son favorevoli, si
chiamano Lari famigliari.» De Deo Socratis.
228. V. 91-96.
. . . . la buon’anima,
Che già siede novizia in riva a Lete,
Trema del tetro barcajuol, nè spera
Varcar su la sua barca il morto stagno;
Miser! nè il può senza il triente in bocca.
Tr. Gargallo.
231. Storia Popolare degli Usi Funebri Indo-Europei. Milano, Fratelli Treves,
1873, pag. 19. — Perchè alla vera dottrina è sempre gentilezza d’animo
congiunta, l’illustre scrittore mi volle onorato del dono di questa sua
opera, che mi tengo cara e della quale pubblicamente il ringrazio. E
come no, se a’ dì nostri solo compenso a chi si pasce di studio sono o la
noncuranza o la calunnia? Oggi è vezzo di portar la politica anche ne’
giudizi letterarii, e chi non s’imbranca coi gerofanti della politica è punito
colla cospirazione del silenzio.
233.
Di lutti non plebei teste il cipresso.
Pharsal. III, 442.
Spiacquemi non usar qui della versione notissima del conte F. Cassi,
perchè in questo passo si cavò d’impiccio, col dire semplicemente i
funebri cipressi.
. . . . In pianti, in ululati
Di donne in un momento si converse
La reggia tutta, e insino al ciel n’andaro
Voci alte e fioche, e suon di man con elle.
Tr. A. Caro.
235.
236. «Io Sesto Anicio Pontefice attesto avere costui onestamente vissuto.»
Bannier, Spiegazione delle favole.
237. «Da qualche anno in qua non si offerse altro sguardo del popolo romano
una pompa così solenne e memorabile, come i publici funerali di Virginio
Rufo, non meno egregio ed illustre, che fortunato cittadino.» Lib. II.
epist. 1, Tr. Paravia.
238. «Detti furono siticini coloro che solevano cantare canti lamentevoli a
titolo d’onore, quando a taluno si facevano i funerali e recavansi a
seppellire.»
239.
Spargete lagrime,
Querele alzate,
Lutto e gramaglie
Or simulate,
Del triste coro
Echeggi il Foro.
245. «La nostra prosapia di tal guisa congiunge alla santità dei re, che assai
possono in mezzo agli uomini, la maestà degli dei che sono i padroni dei
re.» Svetonio, In Cæs. VI. Giulio Cesare da parte di madre si diceva
discendere da Anco Marzio, re.
248.
249. «Addio: noi ti seguiremo tutti nell’ordine nel quale la natura avrà voluto.»
251. Phaleræ. Erano piastre d’oro, d’argento o altro metallo lavorate che si
portavano sul petto, come attesta Silvio Italico nell’emistichio:
253.
. . . . . Altri gridando
Le pire intorno, elmi, corazze e dardi
E ben guarnite spade e freni e ruote
Avventaron nel fuoco e de’ nemici
Armi d’ogni maniera, arnesi e spoglie;
Altri i lor proprii doni, e degli uccisi
Medesmi vi gittar l’armi infelici
E gli infelici scudi, ond’essi invano
S’eran difesi.
Lib. XI, 193-196. Tr. Caro.
255.
. . . . . in ordinanza
Tre volte armati a pie’ la circondaro
E tre volte a cavallo, in mesta guisa
Ululando, piangendo, e l’armi e ’l suolo
Di lagrime spargendo.
Lib. XI, 188-190.
256. Annal. Lib. II. VII. Il Davanzati così traduce: «Nè Cesare combattè gli
assedianti (i Catti), perchè al grido del suo venire sbandarono, spiantato
nondimeno il nuovo sepolcro delle legioni di Varo, per onoranza del
padre si torneò.» In nota a questo passo, Enrico Bindi, nell’edizione del
Le Monnier 1852 vol. I. p. 65, pose: «Di questo costume antichissimo
detto decursio, vedi Senofonte nel sesto di Ciro, Dione, 55; Svetonio in
Nerone. Il Lipsio cita Omero, Virgilio, Livio, Lucano e Stazio.»
. . . . il camposanto
De la plebaglia...
260. V. 124-129.
262.
. . . . E di natura impero
Ma il pianto impon, se di fanciulla adulta
C’incontriam ne l’esequie, e se bambino,
Negato al rogo da l’età, si infossa.
Tr. Gargallo.