Anyone who deals with time anomalies and time travel almost automatically encounters ancient chronicles and legends about people who have consciously or unconsciously made a time leap.
This book brings together explorations of embodied writing and contributions to the Writing Differently movement in management and organisation studies - in terms of content, style, format, and development.
The gripping story of Taiwan, from the flood myths of ancient legend to its 'Asian Tiger' economic miracle - and the looming threat of invasion by China.
This book is the first of its kind to apply a global perspective to Elisabeth Noelle-Neumann’s Spiral of Silence theory within the context of the social media era.
This book examines the body of law relating to occupation and analogous forms of territorial control, including the issues surrounding various types of military occupation and the domination of territory and people abroad.
Russlands InformationskriegNach dem Zerfall der Sowjetunion naherten sich Ost und West an euphorisch und uberzeugt, bestehende Unterschiede durch vermeintlich gemeinsame Ziele ausgleichen zu konnen.
Critical Communication Research with Global Inclusivity provides a critical lens through which to prepare, engage and read communication research methods.
A Madagascar, le taux d'incidence de la pauvrete extreme a repris, ces quelques annees, une courbe ascendante, pour atteindre aujourd'hui le niveau record de 75,7 %.
This two-set volume LNAI 16138-16139 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12–15, 2025.
This book constitutes the refereed proceedings of the workshops held at the 44th International Conference on Conceptual Modeling, ER 2025, which took place in Poitiers, France, during October 20–23, 2025.
This book constitutes the proceedings of the 27th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2025, held in Kathmandu, Nepal, during October 9–11, 2025.
Routledge Handbook on Civil Society in the Middle East and North Africa provides a comprehensive and multidimensional exploration of civil society across the MENA region, tracing its historical emergence, diverse expressions, and contemporary transformations.
This book provides a history of the South China Sea conflict and lays out the stakes for each of the bordering states and China's interaction with them - namely, Vietnam, the Philippines, Brunei, Malaysia, Taiwan, and Indonesia; it also examines the U.
This book constitutes the refereed proceedings of 3 workshops held at the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, in Nieuwport, Curacao, in March 2018.
Seit der Gründung des Bundesministeriums für wirtschaftliche Zusammenarbeit und Entwicklung (BMZ) im Jahr 1961 wurde die deutsche Entwicklungszusammenarbeit (EZ) durch 14 Minister*innen unterschiedlicher politischer und biographischer Prägung gestaltet.
This book focuses on agentic AI security, providing a comprehensive guide to the theoretical foundations and practical techniques required to secure the increasingly prevalent AI agent systems.
This textbook, now in its third edition, provides a broad and accessible introduction to both continuous and discrete dynamical systems, the theory of which is motivated by examples from a wide range of disciplines.
After four hundred years of Ottoman rule followed by a little over two decades as part of the French Mandate, Lebanon finally gained independence in 1943.
This two-set volume LNAI 16138-16139 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12–15, 2025.
This book analyzes Persian carpets through the holistic and multifaceted perspective of cultural linguistics and semiotics, unveiling the deep connections between art, tradition, and collective memory.
This book revisits the embrace of liberal capitalism in post-communist Eastern Europe to show that recent concerns about the rise of populist movements obfuscate the limits and the contradictions inherent in the concept.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.
This book refers to an innovative and comprehensive convergence of modern computing systems and intelligent communication networks with latest computing technologies, including edge computing, 5G/6G networks, Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), and blockchain-driven communication systems, and also provides information about how advanced processors work with edge integration and parallel computing to deliver faster data analysis and how AI incorporates with ML for decision making , predicative analysis, and automation This book approaches its subject by seamlessly integrating foundational principles with the latest advancements in smart computing What sets this work apart is its multidisciplinary perspective—blending computing, electronics, information theory, and real-time communications to address the challenges and opportunities of next-generation intelligent networks.
In the 1970s, cities across the United States and Western Europe faced a deep social and political crisis that challenged established principles of planning, economics and urban theory.
Quiconque s'interesse aux anomalies temporelles et aux voyages dans le temps tombe presque automatiquement sur d'anciennes chroniques et legendes relatant des individus ayant, consciemment ou inconsciemment, fait un saut dans le temps.
How to Run a Successful Airbnb BusinessIn a world where flexibility, independence, and passive income are more attainable than ever, short-term rentals have opened a door to life-changing opportunity.
This book constitutes the refereed proceedings of the First International Conference on Constructive Approaches for Security Analysis and Design of Embedded Systems, CASCADE 2025, held in Saint-Etienne, France, during April 2–4, 2025.
This three-volume set LNCS constitutes the proceedings of several Satellite Workshops held in parallel with the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, during June 2025.