You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book considers the Tang response to the collapse of the Uighur steppe empire in 840 C.E. and the large number of refugees who fled to China's northern frontier. It examines the workings of late Tang bureaucracy through translations of some seventy relevant Chinese documents.
This book constitutes the thoroughly refereed postproceedings of the First International Colloquium on Theoretical Aspects of Computing, ICTAC 2004. The 34 revised full papers presented together with 4 invited contributions were carefully selected from 111 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on concurrent and distributed systems, model integration and theory unification, program reasoning and testing, verification, theories of programming and programming languages, real-time and co-design, and automata theory and logics.
This exhaustive cumulative guide covers the changes in key personnel and administrative institutions from 1968 to the present. It traces the career paths of the many high officials within the numerous governmental, military, educational, and economic organizations in China. The directory also provides information on major institutions in China by following the restructuring, division, and mergers of organizations. This new edition includes new sections on trade organizations; special administrative regions; museums, libraries, and galleries; banks and insurance companies; and social and community mass organizations.
This book gathers peer-reviewed proceedings of the 3rd International Conference on Innovative Computing (IC 2020). This book aims to provide an open forum for discussing recent advances and emerging trends in information technology, science, and engineering. Themes within the scope of the conference include Communication Networks, Business Intelligence and Knowledge Management, Web Intelligence, and any related fields that depend on the development of information technology. The respective contributions presented here cover a wide range of topics, from databases and data mining, networking and communications, the web and Internet of Things, to embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Readers such as students, researchers, and industry professionals in the fields of cloud computing, Internet of Things, machine learning, information security, multimedia systems, and information technology benefit from this comprehensive overview of the latest advances in information technology. The book can also benefit young investigators looking to start a new research program.
Coal mining continues to make advances, especially in the areas of safety and environmental protection as a result of mining. This book contains nine peer-reviewed articles on green coal mining that address most of the important issues associated with improving coal mining. These issues include the protection of water above coal mines, both surface and ground water, and the subsidence that occurs during and after mining with methods to limit it and methods of rehabilitation. Additional issues include mine entry and production area support and methods to control gas emissions.
The Wen xuan, compiled by Xiao Tong (501-531) is the oldest surviving anthology of Chinese literature arranged by genre. It contains a total of 761 pieces of prose and verse by 130 writers from the late Zhou dynasty to the Liang dynasty (ca. 4th century B.C. to 6th century A.D.) The selection includes most of the best examples of fu (rhapsodies) and shi (lyric poems) from the Han, Wei, Jin, and North-South Dynasties periods, as well as representative examples of other early genres such as letters, memorials, prefaces, imperial edicts, inscriptions, epitaphs, laments, elegies, and eulogies. This anthology was one of the primary sources of literary knowledge for educated Chinese in the premode...
In this present internet age, risk analysis and crisis response based on information will make up a digital world full of possibilities and improvements to peopleās daily life and capabilities. These services will be supported by more intelligent systems and more effective decisionmaking. This book contains all the papers presented at the 4th Inter
None