You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Since the 1949 Communist Revolution, China has devised nine different military strategies, which the People's Liberation Army (PLA) calls strategic guidelines. What accounts for these numerous changes? Active Defense offers the first systematic look at China's military strategy from the mid-twentieth century to today. Exploring the range and intensity of threats that China has faced, M. Taylor Fravel illuminates the nation's past and present military goals and how China sought to achieve them, and offers a rich set of cases for deepening the study of change in military organizations. Drawing from diverse Chinese-language sources, including memoirs of leading generals, military histories, and...
The 18th Australian Joint Conference on Artificial Intelligence (AI 2005) was held at the University of Technology, Sydney (UTS), Sydney, Australia from 5 to 9 December 2005. AI 2005 attracted a historical record number of submissions, a total of 535 papers. The review process was extremely selective. Out of these 535 submissions, the Program Chairs selected only 77 (14.4%) full papers and 119 (22.2%) short papers based on the review reports, making an acceptance rate of 36.6% in total. Authors of the accepted papers came from over 20 countries. This volume of the proceedings contains the abstracts of three keynote speeches and all the full and short papers. The full papers were categorized into three broad sections, namely: AI foundations and technologies, computational intelligence, and AI in specialized domains. AI 2005 also hosted several tutorials and workshops, providing an interacting mode for specialists and scholars from Australia and other countries. Ronald R. Yager, Geoff Webb and David Goldberg (in conjunction with ACAL05) were the distinguished researchers invited to give presentations. Their contributions to AI 2005 are really appreciated.
This book constitutes the refereed proceedings of the 4th International Conference on Applied Cryptography and Network Security, ACNS 2006, held in Singapore in June 2006. Book presents 33 revised full papers, organized in topical sections on intrusion detection and avoidance, cryptographic applications, DoS attacks and countermeasures, key management, cryptanalysis, security of limited devices, cryptography, authentication and Web security, ad-hoc and sensor network security, cryptographic constructions, and security and privacy.
This book constitutes the refereed proceedings of the Third International Conference on Grid ad Cooperative Computing, GCC 2004, held in Wuhan, China in October 2004. The 96 revised full papers and 62 revised short papers presented together with abstracts of 7 invited contributions were carefully reviewed and selected from a total of 427 papers submitted for the GCC 2004 main conference. The papers are organized in topical sections on grid services and Web services, grid middleware and toolkits, advanced resource reservation and scheduling, grid security, information grid and knowledge grid, p2p computing and automatic computing, and innovative grid applications
"This book covers the intricate worlds of thought, comprehension, intelligence, and knowledge through the scientific field of Cognitive Science, covering topics that have been pivotal at major conferences covering Cognitive Science"--Provided by publisher.
Selected, peer reviewed papers from the 2014 2nd International Conference on Sensors, Mechatronics and Automation (ICSMA 2014), December 28-29, 2014 Shenzhen, China
Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art resear...
With collaborative product development in a geographically distributed environment and global outsourcing becoming normal for many companies, it is imperative to bring academics, researchers and industrialists together to share research ideas and best practice. The European-Asia Symposium on Engineering Design and Manufacture (EASED 2004) provides such a platform and aims to increase the exchange of ideas and best practice among practitioners and researchers from two major global regions - Europe and Asia. As the manufacturing activities, associated with the design activities in European, American and Japan, are being transferred to Asia, it is timely to organise this International Symposium...
This book constitutes the proceedings of the International Symposium on Neural N- works (ISNN 2004) held in Dalian, Liaoning, China during August 19–21, 2004. ISNN 2004 received over 800 submissions from authors in ?ve continents (Asia, Europe, North America, South America, and Oceania), and 23 countries and regions (mainland China, Hong Kong, Taiwan, South Korea, Japan, Singapore, India, Iran, Israel, Turkey, H- gary, Poland, Germany, France, Belgium, Spain, UK, USA, Canada, Mexico, Venezuela, Chile, and Australia). Based on reviews, the Program Committee selected 329 hi- quality papers for presentation at ISNN 2004 and publication in the proceedings. The papers are organized into many to...