You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Chinese military strategy written during the sixth century BC by Sun Zi, and is considered to be one of the oldest definitive works on military strategies and tactics of its time.
This monograph is an investigation of cliticization processes attested throughout Otfrid von Weissenburg's Old High German Evangelienbuch.Its central argument may be simply stated: attestations such as meg ih (
With the fast growth of Chinese economy, the number of people learning Chinese language is increasing rapidly throughout the world. A Handbook for Analyzing Chinese Characters is intended to help those studying Chinese as a second language. It includes 5073 most frequently used Chinese characters in reading and writing. To help learners identify the most important to the least important characters, the 5073 characters are grouped into five different usage levels. Besides, they are formed with pictographic characters, self-indicative characters, compound ideographic characters and radical phonetic characters according to their structures. Each character is described with the property of the character and clarified by an illustrative sentence.Zhifang Ren is a professor of English at China Medical University. He has previously written a book titled A Handbook of Analyzing English Vocabulary published in China. This is his second literary endeavor involving ten years of painstaking research and compilation.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.
This book constitutes the proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, held in Barcelona, Spain, in September 2018, and co-located with the 23rd European Symposium Research in Computer Security, ESORICS 2018. The 8 full papers were carefully reviewed and selected from 28 submissions. The focus of the workshop was on the following topics: cryptosystems and applied cryptography; modeling and risk assessment; and trust computing.
The Sinitic Civilization A Factual History through the Lens of Archaeology, Bronzeware, Astronomy, Divination, Calendar and the Annals The book covered the time span of history of the Sinitic civilization from antiquity, to the 3rd millennium B.C. to A.D. 85. A comprehensive review of history related to the Sinitic cosmological, astronomical, astrological, historical, divinatory, and geographical developments was given. All ancient Chinese calendars had been examined, with the ancient thearchs' dates examined from the perspective how they were forged or made up. The book provides the indisputable evidence regarding the fingerprint of the forger for the 3rd century A.D. book Shang-shu (remote...
Ch. 1. Some fundamental notions. 1.1. Definitions. 1.2. Components of a matrix. 1.3. Matrix functions. 1.4. Normal matrices -- ch. 2. Evolving systems -- ch. 3. Markov chains. 3.1. Non-negative matrices. 3.2. General properties -- ch. 4. Glass transition -- ch. 5. The Kerner model. 5.1. A simple example: Se-As glass -- ch. 6. Formal developments. 6.1. Spectral aspects. 6.2. Reducibility and regularity. 6.3. Projectors and asymptotics. 6.4. Continuum time -- ch. 7. Equilibrium, dissipation and ergodicity. 7.1. Recurrence, transience and periodicity. 7.2. Detailed balancing and reversibility. 7.3. Ergodicity -- ch. 8. Prelude -- ch. 9. Definition and main properties. 9.1. Bases. 9.2. Double Fo...