You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Long March, the first such expedition in history, was made by the Chinese Workers' and Peasants' Red Army under the leadership of the Chinese Communist Party and Chairman Mao Tsetung during the period of 1934-36. Covering 25,000 li (12,500 kilometres), the march ended in victory after breaching heavy enemy encirclements and overcoming innumerable dangers and difficulties. This book is a record of the author's six years from 1930, when he served first as Chairman Mao Tsetung's orderly and then as bodyguard. Here are his impressions of the Chairman's life and work, focussing on the Long March, and of the Red Army in time of trial. These reminiscences of the revolution highlight the historical events of that period and bring out vividly Chairman Mao's revolutionary outlook and plain living.
None
None
Autonomic computing and networking (ACN), a concept inspired by the human autonomic system, is a priority research area and a booming new paradigm in the field. Formal and Practical Aspects of Autonomic Computing and Networking: Specification, Development, and Verification outlines the characteristics, novel approaches of specification, refinement, programming and verification associated with ACN. The goal of ACN and the topics covered in this work include making networks and computers more self-organized, self- configured, self-healing, self-optimizing, self-protecting, and more. This book helpfully details the steps necessary towards realizing computer and network autonomy and its implications.
This book lays out all the latest research in the area of multimedia data hiding. The book introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, digital watermarking fundamentals and requirements of watermarking. It moves on to cover the recent advances in multimedia signal processing, before presenting information hiding techniques including steganography, secret sharing and watermarking. The final part of this book includes practical applications of intelligent multimedia signal processing and data hiding systems.