Listing 1 - 10 of 66 | << page >> |
Sort by
|
Choose an application
After toppling the Ming dynasty, the Qing conquerors forced Han Chinese males to adopt Manchu hairstyle and clothing. Yet China’s new rulers tolerated the use of traditional Chinese attire in performances, making theater one of the only areas of life where Han garments could still be seen and where Manchu rule could be contested.Staging Personhood uncovers a hidden history of the Ming–Qing transition by exploring what it meant for the clothing of a deposed dynasty to survive onstage. Reading dramatic works against Qing sartorial regulations, Guojun Wang offers an interdisciplinary lens on the entanglements between Chinese drama and nascent Manchu rule in seventeenth-century China. He reveals not just how political and ethnic conflicts shaped theatrical costuming but also the ways costuming enabled different modes of identity negotiation during the dynastic transition. In case studies of theatrical texts and performances, Wang considers clothing and costumes as indices of changing ethnic and gender identities. He contends that theatrical costuming provided a productive way to reconnect bodies, clothes, and identities disrupted by political turmoil. Through careful attention to a variety of canonical and lesser-known plays, visual and performance records, and historical documents, Staging Personhood provides a pathbreaking perspective on the cultural dynamics of early Qing China.
Costume --- Clothing and dress --- Theater --- Theater and society --- History --- Social aspects
Choose an application
This book constitutes the proceedings of the 17th International Conference on Web Information Systems and Applications, WISA 2020, held in Guangzhou, China, in September 2020. The 42 full papers and 16 short papers presented were carefully reviewed and selected from 165 submissions. The papers are grouped in topical sections on world wide web, recommendation, query processing and algorithm, natural language processing, machine learning, graph query, edge computing and data mining, data privacy and security, and blockchain.
Data mining. --- Artificial intelligence. --- Database management. --- Application software. --- Computers. --- Data Mining and Knowledge Discovery. --- Artificial Intelligence. --- Database Management. --- Information Systems Applications (incl. Internet). --- Computing Milieux. --- Computer Applications. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data base management --- Data services (Database management) --- Database management services --- DBMS (Computer science) --- Generalized data management systems --- Services, Database management --- Systems, Database management --- Systems, Generalized database management --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- World Wide Web
Choose an application
This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
Computer security. --- Data protection. --- Computers. --- Computer organization. --- Principles and Models of Security. --- Security. --- Information Systems and Communication Service. --- Computer Systems Organization and Communication Networks. --- Organization, Computer --- Electronic digital computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer networks --- Computer security
Choose an application
This book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. SpaCCS 2020 is held jointly with the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020).
Computer security. --- Computers. --- Computer communication systems. --- Data protection. --- Principles and Models of Security. --- Information Systems and Communication Service. --- Computer Communication Networks. --- Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Computer security --- Computer networks
Choose an application
Choose an application
Ubiquitous computing. --- Computer security. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Pervasive computing --- UbiComp (Computer science) --- Electronic data processing --- Embedded computer systems --- Protection --- Security measures --- Distributed processing --- Seguretat informàtica --- Computació ubiqua --- Computació ubiqua.
Choose an application
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
Application software. --- Artificial intelligence. --- Data protection. --- Computer engineering. --- Computer networks. --- Social sciences—Data processing. --- Computer and Information Systems Applications. --- Artificial Intelligence. --- Data and Information Security. --- Computer Engineering and Networks. --- Computer Application in Social and Behavioral Sciences. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Computers --- Distributed processing --- Design and construction --- Computer security --- Data processing. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
"Throughout Chinese history, almost all the "conquest" dynasties forced Chinese people to conform to the rulers' ethnic clothing and hairstyle in the wake of the conquests. This was no different in the early Qing period, when Manchu rulers forced their style on the Han majority. However, the theater was one of the only areas of life that was not permeated by Manchu culture and where Han costumes remained. In Exile to the Stage: Costuming and Personhood in Early Qing Drama, Guojun Wang explores clothing and costumes as indices of ethnic and gender identities during the Ming-Qing transition"--
Chinese drama --- Clothing and dress in literature --- Theater --- Theater and society --- Costume --- Clothing and dress --- History and criticism --- History --- History --- History
Choose an application
"Throughout Chinese history, almost all the "conquest" dynasties forced Chinese people to conform to the rulers' ethnic clothing and hairstyle in the wake of the conquests. This was no different in the early Qing period, when Manchu rulers forced their style on the Han majority. However, the theater was one of the only areas of life that was not permeated by Manchu culture and where Han costumes remained. In Exile to the Stage: Costuming and Personhood in Early Qing Drama, Guojun Wang explores clothing and costumes as indices of ethnic and gender identities during the Ming-Qing transition"--
Chinese drama --- Clothing and dress in literature --- Theater --- Theater and society --- Costume --- Clothing and dress --- History and criticism --- History
Choose an application
Listing 1 - 10 of 66 | << page >> |
Sort by
|