You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Gentle Flame recounts the life and presents for the first time the hitherto unknown poetry of Dudley, Fourth Lord North. Born during the reign of Elizabeth I, reared in that of James I, elected to Parliament under Charles I, and retired to his country seat during the time of Charles II, the life an poetry of the Fourth Lord North deepens present-day understanding of an age that saw much social change.
None
This book describes the membership, business and procedure of the privy council during the minority of Henry VIII's son successor, Edward VI. It examines the policy-making, administrative and quasi-judicial functions of the central institution of Tudor government at a time of war, rebellion, financial instability, reform in the Church and potentially violent political change. Professor Hoak analyses the way in which, through the council - a body whose formal existence dated only from 1540 - the dukes of Somerset and Northumberland successively governed the realm in the effective absence of a king. He sheds light on the nature of Somerset's failure, Northumberland's purpose and achievements, as well as on the techniques by which he controlled both the king and council, and the politics of the Reformation in England at the moment of the Protestant's triumph, 1549-50. The book demonstrates the extent to which the Edwardian privy council confirmed and continued earlier 'revolutionary' reform in government; it establishes the uniqueness of the place of Edward's council in the history of Tudor government and of royal councils generally in the sixteenth-century Europe.
This two volume set LNCS 7016 and LNCS 7017 constitutes the refereed proceedings of the 11th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2011, held in Melbourne, Australia, in October 2011. The first volume presents 24 revised regular papers and 17 revised short papers together with the abstract of the keynote lecture - all carefully reviewed and selected from 85 initial submissions. The papers cover the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental results, and commercial components and systems and focus on two broad areas of parallel and distributed computing, i.e., architectures, algorithms and networks, and systems and applications.
Social media greatly enables people to participate in online activities and shatters the barrier for online users to create and share information at any place at any time. However, the explosion of user-generated content poses novel challenges for online users to find relevant information, or, in other words, exacerbates the information overload problem. On the other hand, the quality of user-generated content can vary dramatically from excellence to abuse or spam, resulting in a problem of information credibility. The study and understanding of trust can lead to an effective approach to addressing both information overload and credibility problems. Trust refers to a relationship between a t...
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
New interpretations of Jacobean court culture by an international group of specialists.