This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.
This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains how to design and implement pervasive middleware and real application systems, covering nearly all aspects related to pervasive computing. Key technologies in the book include pervasive computing-oriented resource management and task migration, mobile pervasive transaction, human computer interface, and context collection-oriented wireless sensor networks.
This empirical study examines the learning problem of the argument structure of psych predicates such as «The dog frightens John» and the related V-ing adjectives such as «The dog is frightening to John». The problem is theoretically interesting because of the marked nature of the thematic role mapping of these sentences in relation to the principle of the Uniformity of Theta Assignment Hypothesis (UTAH). The problem is highly relevant to our understanding of second language acquisition, as this is known to be a prevalent difficulty among language learners. The author has framed the learning problem within a coherent parametric framework drawing on a sophisticated critical review of the syntax/semantics literature and theories of L2 development. The author has specifically developed a theory, the «Semantic Salience Hierarchy Model» (SSHM), to explain the learning process. The significance of the model is not confined only to this particular study, as the issues related to the L2 acquisition of other causative verbs can also be examined within this model. The findings of this study also bear implications to TESOL.
This book explores the experiences of ethnic performers' in a small Chinese city. Introducing the concept of ‘intimacy as a lens’, the author examines intimate negotiations involving emotions, sense of self and relationships as a way of understanding wider social inequalities.
This book begins with the dynamic characteristics of the covering layerbedrock type slope, containing monitoring data of the seismic array, shaking table tests, numerical analysis and theoretical derivation. Then it focuses on the landslide mechanism and assessment method. It also proposes a model that assessing the hazard area based on the field investigations. Many questions, exercises and solutions are given. Researchers and engineers in the field of Geotechnical Engineering and Anti-seismic Engineering can benefit from it.
Due to the lack of a uniform schema for Web documents and the sheer amount and dynamics of Web data, both the effectiveness and the efficiency of information management and retrieval of Web data is often unsatisfactory when using conventional data management techniques. Web community, defined as a set of Web-based documents with its own logical structure, is a flexible and efficient approach to support information retrieval and to implement various applications. Zhang and his co-authors explain how to construct and analyse Web communities based on information like Web document contents, hyperlinks, or user access logs. Their approaches combine results from Web search algorithms, Web clustering methods, and Web usage mining. They also detail the necessary preliminaries needed to understand the algorithms presented, and they discuss several successful existing applications. Researchers and students in information retrieval and Web search find in this all the necessary basics and methods to create and understand Web communities. Professionals developing Web applications will additionally benefit from the samples presented for their own designs and implementations.
One of the earliest literary works of mankind is in the form of fables. Bedside stories told to children by mothers or grannies contained a great deal of fables. Fables are made up of amusing anecdotes which are interesting, educational, thought-provoking, delightful and enjoyable to people of all ages. Ancient these fables may seem, but when they are summarised into their pithy titles, they become idioms of common usage among the people even to these modern days. This book contains more than 70 Chinese fables that have been handed down from ancient times, told with lively comic illustrations by Chinese cartoonist Tian Hengyu who is renowned for his expressive illustrations with crisp and clear-cut lines. You are sure to be amused as you go through all these ancient stories and you will also be amazed by the subtlety and succinctness of meaning conveyed by them.
New Approaches of Protein Function Prediction from Protein Interaction Networks contains the critical aspects of PPI network based protein function prediction, including semantically assessing the reliability of PPI data, measuring the functional similarity between proteins, dynamically selecting prediction domains, predicting functions, and establishing corresponding prediction frameworks. Functional annotation of proteins is vital to biological and clinical research and other applications due to the important roles proteins play in various biological processes. Although the functions of some proteins have been annotated via biological experiments, there are still many proteins whose functions are yet to be annotated due to the limitations of existing methods and the high cost of experiments. To overcome experimental limitations, this book helps users understand the computational approaches that have been rapidly developed for protein function prediction. Provides innovative approaches and new developments targeting key issues in protein function prediction Presents heuristic ideas for further research in this challenging area
Incomplete Information System and Rough Set Theory: Models and Attribute Reductions" covers theoretical study of generalizations of rough set model in various incomplete information systems. It discusses not only the regular attributes but also the criteria in the incomplete information systems. Based on different types of rough set models, the book presents the practical approaches to compute several reducts in terms of these models. The book is intended for researchers and postgraduate students in machine learning, data mining and knowledge discovery, especially for those who are working in rough set theory, and granular computing. Dr. Xibei Yang is a lecturer at the School of Computer Science and Engineering, Jiangsu University of Science and Technology, China; Jingyu Yang is a professor at the School of Computer Science, Nanjing University of Science and Technology, China.
The terms gender and sex in both western and Chinese culture, and professional area, seems complex and sometimes confusing. Previous studies have examined gender expectation within (Kroska, 2003) and across (Baxter, 1997; Zhou, Dawson, Herr, & Stukas, 2004) cultures, and many have focused on traits of different genders, especially Bem's (1974) measurement which has been widely discussed. In order to explore the difference between Mandarin Chinese and English speakers on gender stereotype, an online survey with English and simplified Chinese language version was conducted. Twenty-one daily life activities were examined in this survey to measure gender stereotype. Data was mainly collected from American and Chinese social media, and from advertisements at some universities in both countries. The results show that English speakers had a lower variance of scores on gender expectations according to the twenty-one daily life activities than Chinese speakers did, suggesting Chinese speakers hold stronger gender stereotypes. There was no effect for sex at birth and no interaction between language and sex. Future studies could examine other differences in beliefs about gender stereotype that may occur between cultures.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.