|
Showing 1 - 12 of
12 matches in All Departments
With the rapid development of computing hardware, high-speed
network, web programming, distributed and parallel computing, and
other technologies, cloud computing has recently emerged as a
commercial reality. Software Reuse in the Emerging Cloud Computing
Era targets a spectrum of readers, including researcher,
practitioners, educators, and students and even part of the end
users in software engineering, computing, networks and distributed
systems, and information systems. The handbook will help to clarify
the present fast-advancing literature of the current state of art
and knowledge in the areas of the development and reuse of reusable
assets in emerging software systems and applications, as part of
the information science and technology literature. It will no doubt
expand the above literature, and promote the exchange and evolution
of the above advances in software reuse and cloud computing among
multiple disciplines, and a wide spectrum of research, industry,
and user communities.
This book addresses a controversial issue regarding SL-TL transfer
in the translation process, namely the question as to the dominant
route in English-Chinese and Chinese-English professional
consecutive interpretations, respectively: the form-based
processing route or meaning-based processing route. It presents a
corpus-assisted product study, in which the interpreting processing
patterns of culture-specific items (CSIs) are analyzed. The study
reveals that the dominant route in English vs. Chinese consecutive
interpreting varies under different circumstances. Four factors are
proposed to account for such differences: linguistic variables
(e.g., grammatical complexity of the unit), type of CSI, language
direction, and extra-linguistic variables (e.g., multilateral or
bilateral settings). In summary, the book systematically introduces
a corpus-assisted approach to translation process research, which
will benefit all readers who are interested in translation process
research but cannot employ neuroscientific measures.
This book gathers papers presented at the 9th International
Conference on Computer Engineering and Networks (CENet2019), held
in Changsha, China, on October 18-20, 2019. It examines innovations
in the fields of computer engineering and networking and explores
important, state-of-the-art developments in areas such as
Information Security, Information Hiding and Cryptography, Cyber
Security, and Intelligent Computing and Applications. The book also
covers emerging topics in computer engineering and networking,
along with their applications, discusses how to improve
productivity by using the latest advanced technologies, and
examines innovation in the fields of computer engineering and
networking, particularly in intelligent computing and security.
Concerns surrounding environmental sustainability have led to an
increase of interest in environmentally-friendly systems. In the
ICT realm, attention has been largely paid to green aspects of
hardware; however, it is equally necessary to address this issue
from the software perspective. Green Services Engineering,
Optimization, and Modeling in the Technological Age is a valuable
reference source of the latest scholarly research on the
implementation of green processes into software systems,
contributing novel principles, methodologies, and tools to improve
software development. Featuring comprehensive and timely coverage
on various areas in service strategy and modeling, engineering, and
sustainability, this publication is a pivotal reference source for
researchers, practitioners, advanced-level students, and end users
in the software development realm.
Recently, rapid and fundamental advances in computing technologies
have been driving the role and scope of software systems to a new
level. A number of new types of software systems are emerging,
among which service based systems, cloud computing, pervasive
computing, and Internet of Things are eminent examples. These
systems have imposed new challenges on their design, development,
testing and maintenance, and are demanding for new appropriate
approaches and tools. Advanced Design Approaches to Emerging
Software Systems: Principles, Methodology and Tools provides
relevant theoretical frameworks and the latest empirical research
findings in the area. This book will help to clarify the present
chaotic and confusing literature of the current state of the art
and knowledge in the areas of the design and engineering of the
many emerging software systems. This book also facilitates the
exchange and evolution of software engineering advances among
multiple disciplines, research, industry, and user communities.
It is well known that "fuzziness"-informationgranulesand fuzzy sets
as one of its formal manifestations- is one of important
characteristics of human cognitionandcomprehensionofreality. Fuzzy
phenomena existinnature and are encountered quite vividly within
human society. The notion of a fuzzy set has been introduced by L.
A. , Zadeh in 1965 in order to formalize human concepts, in
connection with the representation of human natural language and
computing with words. Fuzzy sets and fuzzy logic are used for mod-
ing imprecise modes of reasoning that play a pivotal role in the
remarkable human abilities to make rational decisions in an
environment a?ected by - certainty and imprecision. A growing
number of applications of fuzzy sets originated from the
"empirical-semantic" approach. From this perspective, we were
focused on some practical interpretations of fuzzy sets rather than
being oriented towards investigations of the underlying
mathematical str- tures of fuzzy sets themselves. For instance, in
the context of control theory where fuzzy sets have played an
interesting and practically relevant function, the practical facet
of fuzzy sets has been stressed quite signi?cantly. However, fuzzy
sets can be sought as an abstract concept with all formal
underpinnings stemming from this more formal perspective. In the
context of applications, it is worth underlying that membership
functions do not convey the same meaning at the operational level
when being cast in various contexts.
A Hundred Flowers Blossoming is a collection of literary essays
written by faculty members of Xi'an International Studies
University, China with two distinctive features. The first one is a
Chinese perspective on Western literary works, which is normally
not found in the scholarship in the West. The second is the
feministic stance demonstrated in most articles, as most of the
contributors are female. There are four parts in this collection.
Part One is titled 'A Room of Her Own' and shows the feminist
approach to literary works. Part Two is titled 'Through the Chinese
Lens, ' as it presents a Chinese perspective in the analysis of the
literary works. 'Form Is Meaning' is the title of Part Three, which
approaches literary works from a structuralist perspective. Part
Four includes two articles: one exploring the theme of death in
Joyce's Dubliners and the other reexamining the images of
Faulkner's Trio of Hunting Tales
This book gathers papers presented at the 9th International
Conference on Computer Engineering and Networks (CENet2019), held
in Changsha, China, on October 18-20, 2019. It examines innovations
in the fields of computer engineering and networking and explores
important, state-of-the-art developments in areas such as
Information Security, Information Hiding and Cryptography, Cyber
Security, and Intelligent Computing and Applications. The book also
covers emerging topics in computer engineering and networking,
along with their applications, discusses how to improve
productivity by using the latest advanced technologies, and
examines innovation in the fields of computer engineering and
networking, particularly in intelligent computing and security.
It is well known that "fuzziness"-informationgranulesand fuzzy sets
as one of its formal manifestations- is one of important
characteristics of human cognitionandcomprehensionofreality. Fuzzy
phenomena existinnature and are encountered quite vividly within
human society. The notion of a fuzzy set has been introduced by L.
A. , Zadeh in 1965 in order to formalize human concepts, in
connection with the representation of human natural language and
computing with words. Fuzzy sets and fuzzy logic are used for mod-
ing imprecise modes of reasoning that play a pivotal role in the
remarkable human abilities to make rational decisions in an
environment a?ected by - certainty and imprecision. A growing
number of applications of fuzzy sets originated from the
"empirical-semantic" approach. From this perspective, we were
focused on some practical interpretations of fuzzy sets rather than
being oriented towards investigations of the underlying
mathematical str- tures of fuzzy sets themselves. For instance, in
the context of control theory where fuzzy sets have played an
interesting and practically relevant function, the practical facet
of fuzzy sets has been stressed quite signi?cantly. However, fuzzy
sets can be sought as an abstract concept with all formal
underpinnings stemming from this more formal perspective. In the
context of applications, it is worth underlying that membership
functions do not convey the same meaning at the operational level
when being cast in various contexts.
|
Systems and Computer Technology - Proceedings of the 2014 Internaional Symposium on Systems and Computer technology, (ISSCT 2014), Shanghai, China, 15-17 November 2014 (Hardcover)
Yunfei Chen, Xiaodong Liu, Lipo Wang, Chunlei Ji, Qiang Sun, …
|
R6,732
Discovery Miles 67 320
|
Ships in 12 - 19 working days
|
This volume consists of papers presented at the 2014 International
Symposium on Systems and Computer Technology (ISSCT 2014, Shanghai,
China, 15-17 November 2014). The demand for systems and informatics
have been constantly increasing, as more and more computer
applications have been built. Great efforts have been made to
improve the state of the art in the technologies for computer-based
applications. ISSCT 2014 aimed to advance these technologies to a
new level and to encourage development of computer-based
applications to be more reliable and efficient. The submissions,
from all parts of the world, cover a variety of areas, including
Control and Automation Systems, Power and Energy Systems,
Intelligent Systems, Computer Systems and Applications,
Communications and Networking, Image, Video, and Signal Processing,
Data Engineering and Data Mining, and Software Engineering.
This book addresses a controversial issue regarding SL-TL transfer
in the translation process, namely the question as to the dominant
route in English-Chinese and Chinese-English professional
consecutive interpretations, respectively: the form-based
processing route or meaning-based processing route. It presents a
corpus-assisted product study, in which the interpreting processing
patterns of culture-specific items (CSIs) are analyzed. The study
reveals that the dominant route in English vs. Chinese consecutive
interpreting varies under different circumstances. Four factors are
proposed to account for such differences: linguistic variables
(e.g., grammatical complexity of the unit), type of CSI, language
direction, and extra-linguistic variables (e.g., multilateral or
bilateral settings). In summary, the book systematically introduces
a corpus-assisted approach to translation process research, which
will benefit all readers who are interested in translation process
research but cannot employ neuroscientific measures.
This conference proceeding is a collection of the papers accepted
by the CENet2021 - the 11th International Conference on Computer
Engineering and Networks held on October 21-25, 2021 in Hechi,
China. The topics focus but are not limited to Internet of Things
and Smart Systems, Artificial Intelligence and Applications,
Communication System Detection, Analysis and Application, and
Medical Engineering and Information Systems. Each part can be used
as an excellent reference by industry practitioners, university
faculties, research fellows and undergraduates as well as graduate
students who need to build a knowledge base of the most current
advances and state-of-practice in the topics covered by this
conference proceedings. This will enable them to produce, maintain,
and manage systems with high levels of trustworthiness and
complexity.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R391
R362
Discovery Miles 3 620
Loot
Nadine Gordimer
Paperback
(2)
R391
R362
Discovery Miles 3 620
|