You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book analyzes the discovery of Chinese logic as a paradigmatic case of the epistemic shifts that have shaped interpretations of China’s intellectual heritage. Reconstructing the transcultural genealogy of a modern discourse, it adds a neglected chapter to the global history of philosophy.
This book constitutes the proceedings of the 16th International Conference on Service-Oriented Computing, ICSOC 2018, held in Hangzhou, China, in November 2018. The 63 full papers presented together with 3 keynotes in this volume were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: Microservices; Services and Processes; Service Trust and Security; Business Services and Processes; Edge + IoT Services; Social and Interactive Services; Recommendation; Service Analytics; Quality of Service; Service Engineering; Service Applications; Service Management.
This book constitutes the refereed proceedings of the 17th World Congress on Services, SERVICES 2021, held as part of the Services Conference Federation, SCF 2021, in December 2021. The conference was held virtually due to the COVID-19 pandemic. The 7 full papers and 2 short papers presented were carefully reviewed and selected from 43 submissions. The papers cover topics in the field of Advertising Services, Banking Services, Broadcasting & Cable TV Service, Business Services, Communications Services, Government Services, Real Estate Operations Services, Schools and Education Services, Healthcare Services, and much more.
This book aims to analyze how and why China takes a state-managed marketization approach (SMMA) to energy security against the backdrop of global efforts of decarbonization and intensified strategic competition between China and the United States. How, and why, does China's SMMA work? Taking an evolving, historical perspective, this book explores China’s perception of energy security, the policy process, institutional restructuring in China's petroleum industry, China's foreign energy quest, and the ramifications of the Chinese approach on the international energy market and on world decarbonization. To demonstrate to what extent China’s SMMA differs from other countries, it also makes a comparative analyses of the approaches by China, the US and India. This book will keenly interest scholars of the Chinese political economy, climate change, and geopolitics.
This book comprehensively covers corrosion and corrosion protection in China in the areas including infrastructure, transportation, energy, water environment, as well as manufacturing and public utilities. Furthermore, it presents a major consulting project of Chinese Academy of Engineering, which was the largest corrosion investigation project in Chinese history, including the corresponding methods, processes and corrosion protection strategies, and provides valuable information for numerous industries. Sharing essential insights into corrosion prediction and decision-making, this book will help to decrease costs and extend the service life of equipment and facilities; accordingly, it will benefit scientists and engineers working on corrosion research and protection, as well as economists and government employees.
This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 – Security and Privacy of Internet of Things; TSP 2019 – Trust, Security and Privacy for Emerging Applications; SCS 2019 – Sensor-Cloud Systems; UbiSafe 2019 – UbiSafe Computing; ISSR 2019 – Security in e-Science and e-Research; CMRM 2019 – Cybersecurity Metrics and Risk Modeling.
Shale resource systems include conventional source rocks, unconventional resources such as shale gas and shale oil system. Regardless of the type of shale resource system, the issues of petroleum formation processes (including petroleum generation, migration and storage) are very important in petroleum evaluation and exploration. Because of the complicated and different geological settings in the world, the evaluation approaches and workflows may not be easily implemented following those from successful examples. Thus, the mechanisms of petroleum formation are fundamental for petroleum exploration and production all over in the world. The reason this special issue focuses on the shale system is because the shale system is not only the main source rock type but also the main unconventional reservoir type in the world.
This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.