You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regular papers and 15 short papers were carefully reviewed and selected from 105 submissions. The topics range from security and privacy in machine learning to differential privacy, which are currently hot research topics in cyber security research.
This book initiatively and systematically presents the latest discoveries in the context of shipwreck archaeology in China, telling the exciting story of the wrecks’ distribution, connotation and the research advances and empirically reconstructing the development of overseas trade and maritime cultures along the Maritime Silk Road, which flourished for more than 2000 years. The book features numerous high-quality images and comprehensively describes and reviews the development of the methodologies and technologies used in China’s underwater archaeology and underwater cultural heritage administration in recent decades.
In past twenty years or so, information technology has influenced and changed every aspect of our lives and our cultures. Without various IT-based applications, we would find it difficult to keep information stored securely, to process information and business efficiently, and to communicate information conveniently. In the future world, ITs and information engineering will play a very important role in convergence of computing, communication, business and all other computational sciences and application and it also will influence the future world's various areas, including science, engineering, industry, business, law, politics, culture and medicine. The International Conference on Informat...
This book summarizes the systematic research on the Neolithic cultures of Taiwan, based on the latest archaeological discoveries, and focusing on the maritime interactions between mainland southeast China, Taiwan, and southeast Asia during (5600-1800 BP). The study demonstrates and sheds light on the distinctiveness of Taiwan’s Neolithic cultures, their interactions with the external cultures of its surrounding regions, the maritime cultural diffusion and early seafaring across sea regions like the Taiwan Strait, Bashi channel and South China Sea. Drawing on the author’s deep understanding of Taiwan and its surrounding regions, the book also incorporates recent archeological findings by ...
Two of the most destructive moments of state violence in the twentieth century occurred in Europe between 1933 and 1945 and in China between 1959 and 1961 (the Great Leap famine). This is the first book to bring the two histories together in order to examine their differences and to understand if there are any similar processes of transmission at work. The author expertly ties in the Taiwanese civil war between Nationalists and Communists, which included the White Terror from 1947 to 1987, a less well-known but equally revealing part of twentieth-century history. Personal and family stories are told, often in the individual’s own words, and then compared with the public accounts of the same events as found in official histories, commemorations, school textbooks and other forms of public memory. The author presents innovative and constructive criticisms of social memory theories in order to make sense both of what happened and how what happened is transmitted.
Deep Learning models are at the core of artificial intelligence research today. It is well known that deep learning techniques are disruptive for Euclidean data, such as images or sequence data, and not immediately applicable to graph-structured data such as text. This gap has driven a wave of research for deep learning on graphs, including graph representation learning, graph generation, and graph classification. The new neural network architectures on graph-structured data (graph neural networks, GNNs in short) have performed remarkably on these tasks, demonstrated by applications in social networks, bioinformatics, and medical informatics. Despite these successes, GNNs still face many cha...
Applies the 'life history' of objects approach to China's prehistoric, early dynastic and more recent material culture.
Green Communications and Networking introduces novel solutions that can bring about significant reductions in energy consumption in the information and communication technology (ICT) industry-as well as other industries, including electric power. Containing the contributions of leading experts in the field, it examines the latest research advances
How humanity brought about the climate crisis by departing from its evolutionary trajectory 15,000 years ago—and how we can use evolutionary principles to save ourselves from the worst outcomes. Despite efforts to sustain civilization, humanity faces existential threats from overpopulation, globalized trade and travel, urbanization, and global climate change. In A Darwinian Survival Guide, Daniel Brooks and Salvatore Agosta offer a novel—and hopeful—perspective on how to meet these tremendous challenges by changing the discourse from sustainability to survival. Darwinian evolution, the world’s only theory of survival, is the means by which the biosphere has persisted and renewed itse...