You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In Engendering the Woman Question, Zhang Yun examines the early Chinese women’s periodical press as a mixed-gender public space to explore men’s and women’s gender-specific approaches to a series of prominent topics central to the Chinese “woman question.”
Towards Neuromorphic Machine Intelligence: Spike-Based Representation, Learning, and Applications provides readers with in-depth understanding of Spiking Neural Networks (SNNs), which is a burgeoning research branch of Artificial Neural Networks (ANNs), AI, and Machine Learning that sits at the heart of the integration between Computer Science and Neural Engineering. In recent years, neural networks have re-emerged in relation to AI, representing a well-grounded paradigm rooted in disciplines from physics and psychology to information science and engineering.This book represents one of the established cross-over areas where neurophysiology, cognition, and neural engineering coincide with the...
This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.
The 4 volume set LNCS 12112-12114 constitutes the papers of the 25th International Conference on Database Systems for Advanced Applications which will be held online in September 2020. The 119 full papers presented together with 19 short papers plus 15 demo papers and 4 industrial papers in this volume were carefully reviewed and selected from a total of 487 submissions. The conference program presents the state-of-the-art R&D activities in database systems and their applications. It provides a forum for technical presentations and discussions among database researchers, developers and users from academia, business and industry.
This book critically examines the COVID-19 pandemic and its legal and biological governance using a multidisciplinary approach. The perspectives reflected in this volume investigate the imbrications between technosphere and biosphere at social, economic, and political levels. The biolegal dimensions of our evolving understanding of “home” are analysed as the common thread linking the problem of zoonotic diseases and planetary health with that of geopolitics, biosecurity, bioeconomics and biophilosophies of the plant-animal-human interface. In doing so, the contributions collectively highlight the complexities, challenges, and opportunities for humanity, opening new perspectives on how to inhabit our shared planet. This volume will broadly appeal to scholars and students in anthropology, cultural and media studies, history, philosophy, political science and public health, sociology and science and technology studies.
This book constitutes the refereed proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, held in Guangzhou, China, in May/June 2011. The 26 papers presented together with 6 short papers were carefully reviewed and selected from 108 submissions. They are grouped in sections on public key encryption, cloud security, security applications, post-quantum cryptography and side-channel attack, block ciphers and MACs, signature, secrete sharing and traitor tracing, system security and network security, and security protocols.
The three-volume set LNCS 12305, 12306, and 12307 constitutes the refereed proceedings of the Third Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2020, held virtually in Nanjing, China, in October 2020. The 158 full papers presented were carefully reviewed and selected from 402 submissions. The papers have been organized in the following topical sections: Part I: Computer Vision and Application, Part II: Pattern Recognition and Application, Part III: Machine Learning.
This major new biography of Mao uses extensive Russian documents previously unavailable to biographers to reveal surprising details about Mao’s rise to power and leadership in China. This major new biography of Mao uses extensive Russian documents previously unavailable to biographers to reveal surprising details about Mao’s rise to power and his leadership in China. Mao Zedong was one of the most important figures of the twentieth century, the most important in the history of modern China. A complex figure, he was champion of the poor and brutal tyrant, poet and despot. Pantsov and Levine show Mao’s relentless drive to succeed, vividly describing his growing role in the nascent Commun...
This book is about Zhejiang University, one of the oldest and most prestigious universities in China, which was forced to evacuate from the Hangzhou when the Japanese arrived in 1937 and began torturing civilians, raping women, bombing towns, burning farms, and destroying factories, homes, schools, and libraries. The faculty, staff, and students fled to a succession of towns where they sought refuge from the war and set up temporary classrooms to continue with their educational mission. This exodus lasted eight years and spanned over a thousand miles. They faced constant fear and worry due to malnutrition, disease, abject poverty, and enemy air strikes. But with the resilience and spirit of its faculty and students, the University survived to help revitalize a devastated nation.