You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Enlightenment in Dispute is the first comprehensive study of the revival of Chan Buddhism in seventeenth-century China. Focusing on the evolution of a series of controversies about Chan enlightenment, Jiang Wu describes the process by which Chan reemerged as the most prominent Buddhist establishment of the time. He investigates the development of Chan Buddhism in the seventeenth century, focusing on controversies involving issues such as correct practice and lines of lineage. In this way, he shows how the Chan revival reshaped Chinese Buddhism in late imperial China. Situating these controversies alongside major events of the fateful Ming-Qing transition, Wu shows how the rise and fall of Chan Buddhism was conditioned by social changes in the seventeenth century.
The 13th International Conference on Virtual Systems and Multimedia was held in Brisbane, Australia in September 2007. This was the first time that VSMM was sited in Australia. The Australian conference theme reflected the country’s cultural heritage, both recent and past – Exchange and Experience in Space and Place. Of the many papers submitted under this theme we were able to identify three core sub-themes: Virtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered the diverse areas of heritage site and artifact reconstruction and analysis, Australian Aboriginal cultural heritage, training, notions of spirituality, human...
This book constitutes the refereed proceedings of the 21st International Symposium on Computer and Information Sciences, ISCIS 2006, held in Istanbul, Turkey in October 2006. The 106 revised full papers presented together with five invited lectures were carefully reviewed and selected from 606 submissions.
This book constitutes the refereed proceedings of the 7th Pacific Rim Conference on Multimedia, PCM 2006, held in Hangzhou, China in November 2006. The 116 revised papers presented cover a wide range of topics, including all aspects of multimedia, both technical and artistic perspectives and both theoretical and practical issues.
本书第1~3章是真实敦煌部分,介绍敦煌石窟艺术的形成与发展历史、敦煌石窟艺术的精华以及敦煌石窟艺术的保护与研究现状;第4~8章是虚拟敦煌部分,描述敦煌石窟信息的数字化获取、敦煌石窟虚拟展示、敦煌壁画虚拟修复与模拟演变、敦煌风格图案计算机辅助创作等方面的成果、关键的技术问题及其解决方案。
The four volume set assembled following The 2005 International Conference on Computational Science and its Applications, ICCSA 2005, held in Suntec International Convention and Exhibition Centre, Singapore, from 9 May 2005 till 12 May 2005, represents the ?ne collection of 540 refereed papers selected from nearly 2,700 submissions. Computational Science has ?rmly established itself as a vital part of many scienti?c investigations, a?ecting researchers and practitioners in areas ranging from applications such as aerospace and automotive, to emerging technologies such as bioinformatics and nanotechnologies, to core disciplines such as ma- ematics, physics, and chemistry. Due to the shear size ...
This book constitutes the refereed proceedings of the First International Conference on E-learning and Games, Edutainment 2006, held in Hangzhou, China in April 2006. The 121 revised full papers and 52 short papers presented together with the abstracts of 3 invited papers and those of the keynote speeches cover a wide range of topics, including e-learning platforms and tools, learning resource management, practice and experience sharing, e-learning standards, and more.
This book constitutes the refereed proceedings of the Second Symposium on Intelligence and Security Informatics, ISI 2004, held in Tucson, AZ, USA in June 2004. The 29 revised full papers and 12 revised short papers presented together with 6 extended abstracts of posters and 3 panel discussion summaries were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on bioterrorism and disease informatics; data access, privacy, and trust management; data management and mining; deception detection; information assurance and infrastructure protection; monitoring and surveillance; security policies and evaluation; and social network analysis.