You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
An examination of instances, experiences, and spaces of early modern privacy. It opens new avenues to understanding the structures and dynamics that shape early modern societies through examination of a wide array of sources, discourses, practices, and spatial programmes.
This book constitutes the refereed proceedings of the 4th CCF Conference, NLPCC 2015, held in Nanchang, China, in October 2015. The 35 revised full papers presented together with 22 short papers were carefully reviewed and selected from 238 submissions. The papers are organized in topical sections on fundamentals on language computing; applications on language computing; NLP for search technology and ads; web mining; knowledge acquisition and information extraction.
This specially compiled, one-of-a-kind volume contains exemplary contributions from Wolf Prize laureates in agriculture. There is no higher prize than the Wolf Prize. Thus, the reader has the opportunity to learn from the very top in various aspects of this field. Indeed, the book includes a list of publications and the most important papers in plant and animal breeding, genetics, biochemistry and plant protection, biotechnology, as well as chemistry and the physics of soils. In this volume one can learn about the developments in particular fields in agriculture at the highest level through the scientific activities of its world-class contributors.
This book constitutes the joint refereed proceedings of the 5th CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2016, and the 24th International Conference on Computer Processing of Oriental Languages, ICCPOL 2016, held in Kunming, China, in December 2016. The 48 revised full papers presented together with 41 short papers were carefully reviewed and selected from 216 submissions. The papers cover fundamental research in language computing, multi-lingual access, web mining/text mining, machine learning for NLP, knowledge graph, NLP for social network, as well as applications in language computing.
This Research Topic is part of a series with: Multi-targeted Natural Products as Cancer Therapeutics: Challenges and Opportunities, Volume II Cancer remains a leading cause of disease-related deaths worldwide, despite recent advances in our understanding of cancer initiation, progression, and metastasis. Chemotherapy and radiotherapy have been used as standard non-surgical treatments of human cancer for decades, however, the survival rates of patients with cancer, especially those with advanced diseases are still very low due to the high toxicities of these treatments as well as the severe side effects. This fact has motivated researchers to discover new cancer therapeutics with minimum side...
Origins of the Organic Agriculture Debate takes an historical look at two contrasting streams of ideas. The first view comprises the flow of ideas in chemistry and biology that have created the conditions for modern medicine, modern food production and the biotechnological revolution. The second view is the "vitalist" reaction to the rise of modern science and the resulting rejection of modern agriculture. Contemporary proponents of "organic" agriculture and the anti-genetically modified food movement believe that "pure" food confers some special kind of virtue both on those who produce it and those who consume it. They fail to acknowledge that organic chemistry, genetics, and molecular biol...
description not available right now.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.