You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Over many centuries, women on the Chinese stage committed suicide in beautiful and pathetic ways just before crossing the border for an interracial marriage. Uncrossing the Borders asks why this theatrical trope has remained so powerful and attractive. The book analyzes how national, cultural, and ethnic borders are inevitably gendered and incite violence against women in the name of the nation. The book surveys two millennia of historical, literary, dramatic texts, and sociopolitical references to reveal that this type of drama was especially popular when China was under foreign rule, such as in the Yuan (Mongol) and Qing (Manchu) dynasties, and when Chinese male literati felt desperate about their economic and political future, due to the dysfunctional imperial examination system. Daphne P. Lei covers border-crossing Chinese drama in major theatrical genres such as zaju and chuanqi, regional drama such as jingju (Beijing opera) and yueju (Cantonese opera), and modernized operatic and musical forms of such stories today.
The three volume set LNAI 7506, LNAI 7507 and LNAI 7508 constitutes the refereed proceedings of the 5th International Conference on Intelligent Robotics and Applications, ICIRA 2012, held in Montreal, Canada, in October 2012. The 197 revised full papers presented were thoroughly reviewed and selected from 271 submissions. They present the state-of-the-art developments in robotics, automation and mechatronics. This volume covers the topics of adaptive control systems; automotive systems; estimation and identification; intelligent visual systems; application of differential geometry in robotic mechanisms; unmanned systems technologies and applications; new development on health management, fault diagnosis, and fault-tolerant control; biomechatronics; intelligent control of mechanical and mechatronic systems.
"The turn of the third century CE—known as the Jian’an era or Three Kingdoms period—holds double significance for the Chinese cultural tradition. Its writings laid the foundation of classical poetry and literary criticism. Its historical personages and events have also inspired works of poetry, fiction, drama, film, and art throughout Chinese history, including Internet fantasy literature today. There is a vast body of secondary literature on these two subjects individually, but very little on their interface. The image of the Jian’an era, with its feasting, drinking, heroism, and literary panache, as well as intense male friendship, was to return time and again in the romanticized n...
This book constitutes the proceedings of the 11th International Conference on Network and System Security, NSS 2017, held in Helsinki, Finland, in August 2017. The 24 revised full papers presented in this book were carefully reviewed and selected from 83 initial submissions. The papers are organized in topical sections on Cloud and IoT Security; Network Security; Platform and Hardware Security; Crypto and Others; and Authentication and Key Management. This volume also contains 35 contributions of the following workshops: Security Measurements of Cyber Networks (SMCN-2017); Security in Big Data (SECBD-2017); 5G Security and Machine Learning (IW5GS-2017); of the Internet of Everything (SECIOE-2017).
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed fi...
This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023. The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
The 1st International Conference on Disruptive Technologies in Computing and Communication Systems (ICDTCCS - 2023) has received overwhelming response on call for papers and over 119 papers from all over globe were received. We must appreciate the untiring contribution of the members of the organizing committee and Reviewers Board who worked hard to review the papers and finally a set of 69 technical papers were recommended for publication in the conference proceedings. We are grateful to the Chief Guest Prof Atul Negi, Dean – Hyderabad Central University, Guest of Honor Justice John S Spears -Professor University of West Los Angeles CA, and Keynote Speakers Prof A. Govardhan, Rector JNTU ...