You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"It is generally believed that Mao Zedong’s populism was an abrupt departure from traditional Chinese thought. This study demonstrates that many of its key concepts had been developed several decades earlier by young May Fourth intellectuals, including Liu Fu, Zhou Zuoren, and Gu Jiegang. The Chinese folk-literature movement, begun at National Beijing University in 1918, changed the attitudes of Chinese intellectuals toward literature and toward the common people. Turning their backs on “high culture” and Confucianism, young folklorists began “going to the people,” particularly peasants, to gather the songs, legends, children’s stories, and proverbs that Chang-tai Hung here describes and analyzes. Their focus on rural culture, rural people, and rural problems was later to be expanded by the Chinese Communist revolutionaries."
Receptions of Greek and Roman Antiquity in East Asia is an interdisciplinary, collaborative, and global effort to examine the receptions of the Western Classical tradition in a cross-cultural context. The inclusion of modern East Asia in Classical reception studies not only allows scholars in the field to expand the scope of their scholarly inquiries but will also become a vital step toward transcending the meaning of Greco-Roman tradition into a common legacy for all of human society.
This book constitutes the refereed proceedings of the 13th International Conference on Information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
The11thInternationalConferenceonInformationandCommunicationsSecurity (ICICS 2009) was held in Beijing, China during December 14–17, 2009. The ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate developments in the state of the art. In previous years, ICICS has taken place in the UK (2008), China (2007, 2005, 2003, 2001 and 1997), USA (2006), Spain (2004), Singapore (2002), and Australia (1999). On each occasion, as on this one, the proceedin...
To many Chinese, the rise and expansion of Japanese power during the years between the two Sino-Japanese wars (1895–1945) presented a paradox: With its successful modernization, Japan became a model to be emulated; yet as the country’s imperial ambitions on the continent grew, it posed an ever-increasing threat. Drawing on an extraordinary array of source materials, Lu Yan shows that this attraction to and apprehension of Japan prompted the Chinese to engage in a variety of long-term relationships with the Japanese. Re-understanding Japan examines transnational and transcultural interactions between China and Japan during those five dramatic and tragic decades at the intimate level of pe...
The financial crisis and the ensuing Great Recession alerted those seeking to protect old-age security, about the extreme risks confronting the financial and political institutions comprising our retirement system. The workforce of today and tomorrow must count on longer lives and deferred retirement, while at the same time it is taking on increased responsibility for managing retirement risk. This volume explores new ways to think about, manage, and finance longevity risk, capital market risk, model risk, and regulatory risk. The book offers an in-depth analysis of the 'black swans' that threaten private and public pensions around the world such as capital market shocks, surprises to longevity, regulatory/political risk, and errors in modelling, will all have profound consequences for stakeholders ranging from pension plan participants, plan sponsors, policymakers, and those who seek to make retirement more resistant. This book analyzes such challenges to retirement sustainability, and it explores ways to better manage and finance them. Insights provided help build retirement systems capable of withstanding what the future will bring.
This book presents the theory and methodology of geographical data acquisition, providing comprehensive coverage ranging from the definition of geo-referencing systems and transformation between these systems to the acquisition of geographical data using different methods. The material provides readers with a good understanding of the nature of spatial data, the accuracy of spatial data, and the theory behind various data acquisition methodologies.
Religious Studies in Contemporary China Collection, Taoism gathers together English translations of seventeen articles originally published in the People’s Republic of China between 1947 and 2006, and republished together in 2008 as part of an edited volume of representative works in PRC Taoist studies.
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
Digital manipulation of landform is revolutionizing how our built environment is designed and constructed. On a technical level, three dimensional geometric modeling of topography has its origins at the interface of geographic information systems (GIS) and computer aided geometric modeling (CAD): the former with its representations of spatial attribute information with digital terrain in several representations (Triangulated Irregular Networks, contour lines, etc. ); the latter focusing primarily on the parameterization and combination of geometric primitives. The broadening of these two disciplines to embrace new surveying and navigation advances, e. g. global positioning systems (GPS), tog...