GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • GEOMAR Katalog / E-Books  (2)
Publikationsart
  • GEOMAR Katalog / E-Books  (2)
  • Artikel  (127)
Datenquelle
Sprache
Erscheinungszeitraum
DDC
  • 1
    Online-Ressource
    Online-Ressource
    Milton : Taylor & Francis Group
    Schlagwort(e): Translating and interpreting--China
    Beschreibung / Inhaltsverzeichnis: Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Figures -- Tables -- Contributors -- Acknowledgements -- Editors' Introduction -- Part I Chinese Translation in Academic Settings -- 1 the Chinese Tradition of Translation Studies: Review, Reconstruction and Modernisation -- 1.1 Introduction: Chinese Tradition of Translation Studies Defined -- 1.1.1 the Idea of 'Tradition' -- 1.1.2 'translation Studies' and 'Chinese' Defined -- 1.1.3 Representing the Chinese TS Tradition -- 1.2 Reconstruction of the Chinese TS Tradition -- 1.3 Identity and Engagement -- 1.3.1 A Self-contained Identity? -- 1.3.2 Critical Engagement -- 1.4 From 'Taking Home' to 'Going Global' -- 1.4.1 'Taking Home' -- 1.4.2 'Going Global' -- 1.4.3 'Theory' vs. 'Discourse' -- 1.4.4 Emergence of Empirical and Analytical Research -- 1.5 Future Directions Beyond Utilitarianism -- 1.5.1 Utilitarianism Critiqued -- 1.5.2 Norms in Chinese and Xin-Da-Ya in English -- 1.5.3 Cross-lingual Naming in Translation -- 1.6 Concluding Remarks -- Notes -- Further Reading -- References -- 2 Global Chinese Translation Programmes: An Overview of Chinese English Translation/Interpreting Programmes -- 2.1 Introduction -- 2.2 Design of the Study -- 2.2.1 Investigation Questions -- 2.2.2 Investigation Methods -- Targeted Online Search -- Survey and/or Extended Discussions -- 2.2.3 Participants in the Data Collection -- 2.3 Findings of the Study -- 2.3.1 Growth of the Discipline -- Rapid Growth of Mti in China and Bumpy/Cyclic Growth Internationally -- Driven by the Market and Other Factors -- 2.3.2 Maturity of Chinese-English Translation and Interpreting -- Full Academic Progression Structure -- Full Curricula -- Non-text Based Teaching and Non-hierarchically Based Teaching -- Informed by Modern Theories -- Inclusion of Research -- Differentiation Through Specialisation.
    Materialart: Online-Ressource
    Seiten: 1 online resource (653 pages)
    Ausgabe: 1st ed.
    ISBN: 9781317383024
    Serie: Routledge Language Handbooks Series
    DDC: 495.1802
    Sprache: Englisch
    Anmerkung: Description based on publisher supplied metadata and other sources
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Computer security-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (377 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319764511
    Serie: Advances in Intelligent Systems and Computing Series ; v.733
    DDC: 005.8
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2017) -- Honorary Chairs -- General Chairs -- International Advisory Committee -- Program Chairs -- Publicity Chairs -- Publication Chairs -- Organizing Chairs -- Organizing Committee -- Technical Program Committee -- Contents -- Algorithms and Security Analysis -- A Social Tagging Recommendation Model Based on Improved Artificial Fish Swarm Algorithm and Tensor D ... -- Abstract -- 1 Introduction -- 2 Data Clustering Based on Improved AFSA -- 2.1 AFSA and Its Improvement -- 2.2 Clustering Analysis Based on the Improved AFSA -- 3 Tensor Model and Recommendation Algorithm -- 3.1 Tensor and Tensor Decomposition -- 3.2 Tensor Decomposition with Dynamic Incremental Updating -- 3.3 Tensor Modeling and Recommendation Algorithm -- 4 Experiment Design and Data Analysis -- 4.1 Testing Datasets -- 4.2 Algorithm Evaluation Indices -- 4.3 Experiment Results and Discussions -- 5 Conclusion -- Acknowledgements -- References -- Research on the Nearest Neighbor Representation Classification Algorithm in Feature Space -- Abstract -- 1 Introduction -- 2 Representation Based Classification -- 3 The Classification of the Nearest Neighbor Representation in Feature Space -- 4 Numerical Experiments -- 4.1 Results of Experiments on Standard Two-Class Datasets -- 4.2 Results of Experiment on Face Databases -- 5 Conclusion -- References -- A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM -- Abstract -- 1 Introduction -- 2 The Proposed Algorithm of Aesthetic QR Code -- 2.1 The Improved Salient Region Detection Algorithm -- 2.2 The Generation of SPBVM -- 2.3 The Synthetic Strategy -- 3 Experimental Results -- 3.1 Comparison Results with and Without Salient Region Detection -- 3.2 Correctness of QR Code Decoding. , 3.3 Comparison of Different Aesthetic QR Code Algorithms -- 4 Conclusion -- Acknowledgments -- References -- Compact Cat Swarm Optimization Algorithm -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Virtual Population and Sampling Mechanism -- 2.2 The Perturbation Vector Updating Rule -- 2.3 Cat Swarm Optimization -- 2.3.1 Seeking Mode -- 2.3.2 Tracing Mode -- 3 Compact Cat Swarm Optimization Algorithm -- 3.1 Initialization and Perturbation Vector Updating Rules -- 3.2 Seeking Mode -- 3.3 Tracing Mode -- 3.4 The Implementation Procedure and Details -- 4 Experimental Results and Analyze -- 4.1 Memory Usage for All Compared Algorithms -- 4.2 Comparisons for Convergence Result -- 5 Conclusion -- References -- Cryptanalysis and Detection Systems -- Copy-Move Forgery Detection Based on Local Gabor Wavelets Patterns -- Abstract -- 1 Introduction -- 2 Local Gabor Wavelets Patterns -- 3 The Proposed Method -- 3.1 Image Pre-processing -- 3.2 Feature Extraction with LGWP -- 3.3 Matching Block Pairs -- 3.4 Post-processing -- 4 Experimental Results -- 5 Conclusions -- References -- A Hybrid Intrusion Detection System for Contemporary Network Intrusion Dataset -- Abstract -- 1 Introduction -- 1.1 Cluster Analysis -- 1.2 Feature Selection -- 2 Methodology -- 2.1 Dataset -- 2.2 Discretization -- 2.3 Cluster Analysis -- 2.4 Correlation Based Feature Selection -- 2.5 Machine Learning Algorithm -- 3 Implementation and Results -- 3.1 Evaluation Metrics -- 3.2 Results with Cluster Analysis -- 3.3 Results with Enhanced Anomaly Model -- 3.4 Results with Proposed Method -- 3.5 Additional Testing -- 3.6 Compared with Other Work -- 4 Conclusions -- References -- Mitigating DoS Attacks in SDN Using Offloading Path Strategies -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Example -- 4 Experiment -- 5 Conclusion -- Acknowledgement -- References. , An Extension of Attack Trees -- Abstract -- 1 Introduction -- 2 Attack Trees -- 3 Graph Model: Attack Graphs -- 4 The Most Dangerous Path -- 5 Conclusion -- Acknowledgement -- References -- Face Detection in a Complex Background Using Cascaded Conventional Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Multi-scale Representation -- 2.2 Face Detection -- 3 The Proposed Approach -- 3.1 Overall Framework -- 3.2 Design of Cascade Network Architecture -- 3.3 Training -- 4 Experiments -- 4.1 Data Analysis -- 4.2 Evaluation on Face Detection -- 4.3 The Effectiveness of Joint Face Detection and Facial Landmarks -- 5 Conclusion -- References -- Cryptanalysis on the Anonymity of Li et al.'s Ciphertext-Policy Attribute-Based Encryption Scheme -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Access Structure -- 3 The Review of Li et al.'s Scheme -- 4 The Proposed Attack Method -- 4.1 Overview -- 4.2 The Proposed Attack -- 4.3 Analysis -- 4.4 A Simple Illustration -- 5 Conclusion -- Acknowledgement -- References -- Overlapping Community Detection with Two-Level Expansion by Local Clustering Coefficients -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Quality of Community Detection -- 2.2 Seed Set Expansion -- 3 Research Method -- 3.1 Seed Set Construction -- 3.2 Seed Set Expansion -- 4 Experiment Results -- 5 Conclusion -- References -- IoT and E-commerce Applications -- Writing Security Specification with Things That Flow -- Abstract -- 1 Introduction -- 2 Flowthing Model -- 3 Case Study -- 4 Conclusions -- References -- Automatically Generating Aspect Taxonomy for E-Commerce Domains to Assist Sentiment Mining -- 1 Introduction -- 1.1 Application -- 2 Related Work -- 2.1 Novelty -- 3 Proposed System -- 3.1 Review Crawler -- 3.2 Aspect Generator -- 3.3 Taxonomy Model -- 4 Evaluation -- 4.1 Experiment. , 4.2 Observations -- 4.3 Results -- 4.4 Feature Identification -- 4.5 Taxonomy Evaluation -- 4.6 Annotation Speed-up -- 5 Future Work -- 6 Conclusion -- References -- History Management for Network Information of IoT Devices -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Network Information Collection Tool -- 2.2 Analyzing Time-Series Data -- 3 Target Selection for History Management of Network Information -- 3.1 Collecting Network Information -- 3.2 Vulnerability Matching Information -- 3.3 Structure of History Management Set for Target Information -- 3.4 Analysis of Time-Series Data Using Euclidean Distance -- 4 Scenario Based Utilization Plan -- 4.1 Utilization of History Management in Infringement by Unauthorized Device in Wireless Network -- 5 Conclusion -- Acknowledgement -- References -- Privacy and Cloud Computing -- A Noise Generation Scheme Based on Huffman Coding for Preserving Privacy -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Preliminary -- 3.2 Building Noise Matrix -- 3.3 Data Perturbation Procedure -- 4 Experiments -- 5 Conclusions -- References -- Privacy-Preserving Outsource Computing for Binary Vector Similarity -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Garbled Circuits -- 2.2 CP-ABE -- 3 System Framework -- 3.1 Key Generation -- 3.2 Data Uploading -- 3.3 Data Searching -- 4 Proposed Scheme -- 5 Discussion -- 6 Conclusion -- Acknowledgements -- References -- Strategies to Improve Auditing Performance and Soundness for Cloud Computation -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 Cloud Computing System Model, Assumptions, and Security Requirements -- 2.2 Secure Cloud Computation Auditing -- 3 Our Proposed Data Strategy -- 3.1 Our Brief Cloud Computation Delegation and Auditing Scheme -- 3.2 The Off-Line Easy-Auditor Improving Strategy. , 3.3 The Function-Based Improving Strategy -- 3.4 The Mixed Improving Strategy -- 4 Conclusions -- References -- Information Hiding and Secret Sharing -- Reversible Image Steganography for Color Image Quantization Based on Lossless Index Coding -- Abstract -- 1 Introduction -- 2 The Proposed Technique -- 3 Simulation Results -- 4 Conclusions -- Acknowledgments -- References -- Capacity on Demand Steganography Through Adaptive Threshold Strategy -- Abstract -- 1 Introduction -- 2 Data Hiding by Adaptive Threshold Strategy -- 2.1 Adaptive Threshold Generation Scheme -- 2.2 The Embedding Procedure -- 2.3 The Extracting Procedure -- 3 Experimental Results and Discussion -- 3.1 Experimental Results -- 3.2 Discussion -- 4 Conclusion -- References -- Shamir's Secret Sharing Scheme in Parallel -- Abstract -- 1 Introduction -- 2 Shamir's TSSS -- 3 Sequential TSSS Algorithms -- 3.1 Sharing a Number -- 3.2 Sharing a Binary Data -- 4 Parallel Algorithms for Shamirʼs TSSS -- 5 Experimental Results -- 6 Concluding Remarks -- References -- Network Security and Applications -- A Cognitive Global Clock Synchronization Protocol in WSNs -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 Main Strategies of CGCSP -- 3.1 Synchronization Process of CGCSP -- 4 CGCSP Implementation -- 5 Simulations and Performance Evaluation -- 5.1 Simulation Setup -- 5.2 Synchronization Accuracy -- 5.3 Energy Consumption -- 5.4 Performance Comparison -- 6 Conclusions and Future Research Direction -- Acknowledgements -- References -- A Generic Web Application Testing and Attack Data Generation Method -- Abstract -- 1 Introduction -- 1.1 Motivation and Objective -- 1.2 Overview -- 2 Background -- 2.1 Symbolic Execution -- 2.2 Web Security Issues -- 3 Related Work -- 3.1 Static/Dynamic Analysis Based Attack Detection -- 3.2 Symbolic Execution Based Attack Detection -- 4 Method. , 4.1 Symbolic Environment.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...