You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th Chinese Lexical Semantics Workshop, CLSW 2017, held in Leshan, China, in May 2017. The 48 full papers and 5 short papers included in this volume were carefully reviewed and selected from 176 submissions. They are organized in the following topical sections: lexical semantics; applications of natural language processing; lexical resources; and corpus linguistics.
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2006, held in Berlin, Germany in July 2006. The 11 revised full papers presented were carefully reviewed and selected from 41 submissions. The papers are organized in topical sections on code analysis, intrusion detection, threat protection and response, malware and forensics, and deployment scenarios.
RIBA Book of British Housing Design looks at the design solutions developed during the 20th and the 21st centuries, and illustrates over 200 of the most successful projects. It provides an overview of the evolution of housing development, and includes present day schemes and estate regeneration as well as special sections on housing in Scotland and Northern Ireland. The photographs and plans of historic and contemporary projects can be used to show design approaches to clients, committees and, in the case of regeneration, with local communities. Looking back into history will indicate which design approaches have been successful. This fully updated 2nd edition includes a new chapter on the development of design concepts and projects built since 1999. It illustrates current trends that have been developing since the turn of the new century, and emphasises the concept of creating sustainable communities. The use of colour photographs adds a new dimension to the first edition in making it possible to appreciate more readily the materials used in the design of the housing and its environment.
This thoroughly revised and updated fourth edition of The Sustainable Urban Development Reader combines classic and contemporary readings to provide a broad introduction to the topic that is accessible to general and undergraduate audiences. The Reader begins by tracing the roots of the sustainable development concept in the nineteenth and twentieth centuries through classic readings. It then explores dimensions of urban sustainability, including land use and urban design, transportation, ecological planning and restoration, energy and materials use, economic development, social and environmental justice, and green architecture and building. Additional sections cover tools for sustainable de...
Selected, peer reviewed papers from the 4th International Conference on Technology of Architecture and Structure, (ICTAS 2011), September 22-24, 2011, Xi'an, China
This book proposes and systematically discusses four trends of thoughts in contemporary Chinese urban design. As the first book to systematically introduce contemporary Chinese urban design thoughts, this book objectively displays the macroscopic picture of contemporary urban design development of China from the time dimension, sorting out seven historical stages and three disputes. This book is mainly divided into two parts. The first part focuses on the vertical description, taking the major events in the seven historical stages as the context, combing the macro picture of the development of contemporary urban design in China in the last 100 years, and describing the three controversies in...
To defend against computer and network attacks, multiple, complementary security devices such as intrusion detection systems (IDSs), and firewalls are widely deployed to monitor networks and hosts. These various IDSs will flag alerts when suspicious events are observed. This book is an edited volume by world class leaders within computer network and information security presented in an easy-to-follow style. It introduces defense alert systems against computer and network attacks. It also covers integrating intrusion alerts within security policy framework for intrusion response, related case studies and much more.
None