You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This interdisciplinary volume of essays studies human rights in political prison literature, while probing the intersections of suffering, politics, and aesthetics in an interliterary and intercultural context. As the first book to explore the concept of global aesthetics in political prison narratives, it demonstrates how literary insight enhances the study of human rights. Covering varied geographical and geopolitical regions, this collection encourages comparative analyses and cross-cultural understanding. Seeking to interrogate linguistic, structural, and cultural constructions of the political prison experience, it highlights the literary aspects without losing sight of the political an...
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, which was held during December 7-11, 2020. The conference was planned to take place in Daejeon, South Korea, but changed to an online format due to the COVID-19 pandemic. The total of 85 full papers presented in these proceedings was carefully reviewed and selected from 316 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; encryption schemes.- post-quantum cryptography; cryptanalysis; symmetric key cryptography; message authentication codes; side-channel analysis. Part II: public key cryptography; lattice-based cryptography; isogeny-based cryptography; quantum algorithms; authenticated key exchange. Part III: multi-party computation; secret sharing; attribute-based encryption; updatable encryption; zero knowledge; blockchains and contact tracing.
This book is a study of the dual capital system of Ming dynasty China (1368-1644), with a focus on the administrative functions of the auxiliary Southern Capital, Nanjing. It argues that the immense geographical expanse of the Chinese empire and the poor communication infrastructure of pre-modern times necessitated the establishment of an additional capital administration for effective control of the Ming realm. The existence of the Southern Capital, which has been dismissed by scholars as redundant and insignificant, was, the author argues, justified by its ability to assist the primary Northern Capital better control the southern part of the imperial land. The practice of maintaining auxiliary capitals, where the bureaucratic structures of the primary capital were replicated in varying degrees, was a unique and valuable approach to effecting bureaucratic control over vast territory in pre-modern conditions. Nanjing translates into English as "Southern Capital" and Beijing as "Northern Capital".
This book explores acupuncture's remarkable evolution in the United States over the last fifty years as it transitioned from an obscure practice to a pivotal modality in complementary medicine. These pages chronicle acupuncture’s transformative journey within the dominant culture of Western scientific medicine, highlighting key milestones from the use of acupuncture in pain management to the NIH-sponsored open-access digital compendium of acupuncture points and related information. Through narratives detailing educational advancements, legislative battles, practical applications, and scientific research, the reader gains a comprehensive view of how acupuncture has navigated controversies and debates to secure its place in modern healthcare. This book traces acupuncture’s expanding role in the healthcare system, reflects on its historical significance, and considers its future in global health. Insightful commentary provides acupuncture practitioners, skeptics, and aficionados with a useful overview of acupuncture’s past, its current achievements and its promise for the future.
This two volume set (CCIS 398 and 399) constitutes the refereed proceedings of the International Symposium on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2013, held in Wuhan, China, in November 2013. The 136 papers presented, in addition to 4 keynote speeches and 5 invited sessions, were carefully reviewed and selected from 522 submissions. The papers are divided into 5 sessions: smart city in resource management and sustainable ecosystem, spatial data acquisition through RS and GIS in resource management and sustainable ecosystem, ecological and environmental data processing and management, advanced geospatial model and analysis for understanding ecological and environmental process, applications of geo-informatics in resource management and sustainable ecosystem.
The Twenty-Four Histories (Chinese: 二十四史) are the Chinese official historical books covering a period from 3000 BC to the Ming dynasty in the 17th century. The Han dynasty official Sima Qian established many of the conventions of the genre. Starting with the Tang dynasty, each dynasty established an official office to write the history of its predecessor using official court records. As fixed and edited in the Qing dynasty, the whole set contains 3213 volumes and about 40 million words. It is considered one of the most important sources on Chinese history and culture. The title "Twenty-Four Histories" dates from 1775 which was the 40th year in the reign of the Qianlong Emperor. This ...
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.