You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Why does North Korea want to possess nuclear capabilities? In order to find the answer to this question, we must have an accurate understanding of the history and structure of the North Korean regime. So far, we have only formed conjectures and predictions regarding North Korea based on our own perspectives; we now need to deal with and consider North Korea “as is” to reach viable solutions to the issues North Korea presents. This volume contains analyses of the most salient, critical issues pertinent to understanding the North Korean regime, penned by representative Korean scholars of North Korea. As such, the book examines the historical formation of North Korea, the identities of thos...
This book constitutes the thoroughly refereed post-proceedings of the International Conference on Information Networking, ICOIN 2003, held at Cheju Island, Korea in February 2003. The 100 revised full papers presented were carefully selected during two rounds of reviewing and revision. The papers are organized in topical sections on high-speed network technologies, enhanced Internet protocols, QoS in the Internet, mobile Internet, network security, network management, and network performance.
First published in 1998. In this book the author presents the view that although many linguists have been interested in specific indefinites, their theories are not quite satisfactory in that they have only tried to explore some aspects of specific indefinites. This paper assumes a standard notion of specificity, i.e., the notion of someone having-in-mind an individual or a relation. Under this assumption, there is an attempt to review previous studies on specific indefinites, and propose a new theory of specificity which I believe can capture all aspects which the previous studies have explored. This leads us to a new information theory which is partially representational and partially denotational., and which is useful for dealing with conversational aspects, like the distinction between the speaker and the audience.
These proceedings are based on the 2013 International Conference on Future Information & Communication Engineering (ICFICE 2013), which will be held at Shenyang in China from June 24-26, 2013. The conference is open to all over the world, and participation from Asia-Pacific region is particularly encouraged. The focus of this conference is on all technical aspects of electronics, information, and communications ICFICE-13 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of FICE. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in FICE. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International Workshop on Information Security Applications, WISA 2011, held in Jeju Island, Korea, in August 2011. The 21 revised full papers presented were carefully reviewed and selected from 74 submissions. The workshop serves as a forum for new results from the academic research community as well as from the industry; the papers are focusing on all technical and practical aspects of cryptographic and non-cryptographic security applications.
This is a timely and comprehensive guide to one of the most volatile, misunderstood, and potentially dangerous states in the world, and one of great strategic importance to U.S. interests in Asia. Featuring a detailed "who's who" section, it covers politics, the economy, the military, education, and culture, and provides numerous vital statistical data.
description not available right now.
This volume constitutes the refereed proceedings of the International Conferences, EL, DTA and UNESST 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of education and learning, database theory and application and u- and e-service, science and technology.
This volume constitutes the refereed proceedings of the International Conferences, FGCN and DCA 2012, held as part of the Future Generation Information Technology Conference, FGIT 2012, Kangwondo, Korea, in December 2012. The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of grid and distributed computing, industrial environment, safety and health, and computer graphics, animation and game.
description not available right now.