Chinese Cyber Nationalism offers the first comprehensive examination of the social and ideological movement that mixes Confucian cultural traditions and advanced media technology. Over the past decade, the Internet has increasingly become a communication center, organizational platform, and channel of execution by which Chinese nationalistic causes have been promoted throughout the world.
Chinese Cyber Nationalism offers the first comprehensive examination of the social and ideological movement that mixes Confucian cultural traditions a...
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012, held in Beijing, China, in May/June 2012. The 92 revised full papers presented were carefully reviewed and selected from 278 papers. The topics covered are architecture for trusted computing systems, trusted computing platform, trusted systems build, network and protocol security, mobile network security, network survivability and other critical theories and standard systems, credible assessment, credible measurement and metrics, trusted...
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2012...
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013, held in Beijing, China, in November 2013. The 49 revised full papers presented were carefully reviewed and selected from 267 papers. The topics covered are trustworthy infrastructure; security, survivability and fault tolerance; standards, evaluation and certification; trustworthiness of services.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Distributed Computing and Services, ISCTCS 2013...
This work covers areas including: artificial intelligence and database systems; natural language database queries processing; intelligent query guidance systems; imprecise queries analysis; handling of users' misconceptions; direct answer and co-operative response; and knowledge acquisition.
This work covers areas including: artificial intelligence and database systems; natural language database queries processing; intelligent query guidan...