You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
He had seized the nine dragons that defied the heavens! With the Lightning Perception surrounded, one's soul would be reincarnated, reborn into the body of the trash, Lei Nian. What? Cultivation genius? I have the Nine Dragons Stone! Unconvinced? Close the door, let loose thunder!
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
At last here is the long-awaited, first Western-language reference guide focusing exclusively on Chinese literature from ca. 700 B.C.E. to the early seventh century C.E. Alphabetically organized, it contains no less than 1095 entries on major and minor writers, literary forms and "schools," and important Chinese literary terms. In addition to providing authoritative information about each subject, the compilers have taken meticulous care to include detailed, up-to-date bibliographies and source information. The reader will find it a treasure-trove of historical accounts, especially when browsing through the biographies of authors. Indispensable for scholars and students of pre-modern Chinese literature, history, and thought. Part Three contains Xia - Y. Part Four contains the Z and an extensive index to the four volumes.
Deep Learning: From Algorithmic Essence to Industrial Practice introduces the fundamental theories of deep learning, engineering practices, and their deployment and application in the industry. This book provides a detailed explanation of classic convolutional neural networks, recurrent neural networks, and transformer networks based on self-attention mechanisms, along with their variants, combining code demonstrations. Additionally, this book covers the applications of these models in areas including image classification, object detection, and semantic segmentation. This book also considers advancements in deep reinforcement learning and generative adversarial networks making it suitable fo...
Selected, peer reviewed papers from 2011 International Conference on Civil Engineering and Building Materials (CEBM 2011), July 29-31, 2011 Kunming, China
None
None
Selected, peer reviewed papers from the 2014 3rd International Conference on Mechanical Engineering and Materials (ICMEM 2014), November 5-6, 2014, Singapore