| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910452064703321 |
|
|
Titolo |
Modernism revisited [[electronic resource] ] : transgressing boundaries and strategies of renewal in American poetry / / edited by Viorica Patea and Paul Scott Derrick |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Amsterdam ; ; New York, NY, : Rodopi, c2007 |
|
|
|
|
|
|
|
ISBN |
|
1-282-26583-0 |
9786612265839 |
94-012-0488-8 |
1-4356-1187-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (252 p.) |
|
|
|
|
|
|
Collana |
|
DQR studies in literature ; ; 40 |
|
|
|
|
|
|
Altri autori (Persone) |
|
DerrickPaul Scott |
PâteaViorica |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
American poetry - 20th century - History and criticism |
Modernism (Literature) - History and criticism |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preliminary material / Editors Modernism Revisited -- INTRODUCTION / PAUL SCOTT DERRICK -- THE AURA OF MODERNISM / MARJORIE PERLOFF -- FROST’S SONNETS, IN AND OUT OF BOUNDS / BARRY AHEARN -- POUND AND WILLIAMS: THE LETTERS AS MODERNIST MANIFESTO / HÉLÈNE AJI -- PAO-HSIEN FANG AND THE NAXI RITES IN EZRA POUND’S CANTOS / ZHAOMING QIAN -- T. S. ELIOT’S THE WASTE LAND AND THE POETICS OF THE MYTHICAL METHOD / VIORICA PATEA -- POETRY AS UNGRAMMAR IN E. E. CUMMINGS’ POEMS / ISABELLE ALFANDARY -- WALLACE STEVENS’ POETRY OF RESISTANCE / BART EECKHOUT -- IN SEARCH OF WORDS FOR “MOON-VIEWING”: THE JAPANESE HAIKU AND THE SKEPTICISM TOWARDS LANGUAGE IN MODERNIST AMERICAN POETRY / GUDRUN M. GRABHER -- SPONTANEOUS, NOT AUTOMATIC: WILLIAM CARLOS WILLIAMS VERSUS SURREALIST POETICS / ERNESTO SUÁREZ-TOSTE -- INSTANCES OF THE JOURNEY MOTIF THROUGH LANGUAGE AND SELFHOOD IN SOME MODERNIST AMERICAN POETS / MANUEL BRITO -- FOR LOVE AND |
|
|
|
|
|
|
|
|
|
|
|
|
|
LANGUAGE: THE POETRY OF ROBERT CREELEY / HEINZ ICKSTADT -- MODERNIST REALISM AND LOWELL’S CONFESSIONAL STYLE / CHARLES ALTIERI -- NOTES ON CONTRIBUTORS / Editors Modernism Revisited -- INDEX / Editors Modernism Revisited. |
|
|
|
|
|
|
Sommario/riassunto |
|
Offering essays from some of the leading academic writers and younger scholars in the field of American studies from both the United States and Europe, this volume constitutes a rich and varied reconsideration of Modernist American poetry. Its contributions fall into two general categories: new and original discussions of many of the principal figures of the movement (Frost, Pound, Eliot, Williams, Cummings and Stevens) and reflections on the phenomenon of Modernism within a broader cultural context (the influence of Haiku, parallels and connections with Surrealism, responses to the Modernist accomplishment by later American poets). Because of its mixture of European and American perspectives, Modernism Revisited will be of vital interest to students and scholars of American literature and Modernism in general and of twentieth-century comparative literature and art. |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910778785203321 |
|
|
Titolo |
Risking the future : adolescent sexuality, pregnancy, and childbearing / / Panel on Adolescent Pregnancy and Childbearing, Committee on Child Development Research and Public Policy, Commission on Behavioral and Social Sciences and Education, National Research Council ; Cheryl D. Hayes, editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C. : , : National Academy Press, , 1987 |
|
|
|
|
|
|
|
ISBN |
|
1-280-22190-9 |
9786610221905 |
0-309-54263-4 |
0-585-03216-5 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (352 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Teenage mothers - United States |
Teenage pregnancy - United States |
Teenage pregnancy - United States - Prevention |
Youth - Sexual behavior - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographies and index. |
|
|
|
|
|
|
Nota di contenuto |
|
""Risking The Future""; ""Copyright""; ""Contents""; ""Foreword""; ""Preface""; ""Summary""; ""PRIORITIES FOR POLICIES AND PROGRAMS""; ""Goal 1: Reduce the Rate and Incidence of Unintended Pregnancy Among Adolescents, Especially Among School-Age Teenagers""; ""Goal 2: Provide Alternatives to Adolescent Childbearing and Parenting""; ""Goal 3: Promote Positive Social, Economic, Health, and Developmental Outcomes for Adolescent Parents and Their Children""; ""RECOMMENDATIONS FOR DATA COLLECTION AND RESEARCH""; ""Program Evaluation Research""; ""Data Collection"" |
""Research on Adolescent Sexual and Fertility Behavior"" ""Experimentation""; ""1 Introduction ""; ""THE NATURE OF THE PROBLEM""; ""THE SEARCH FOR SOLUTIONS""; ""PUBLIC POLICIES TOWARD ADOLESCENT PREGNANCY AND CHILDBEARING""; ""THE CHARGE TO THE PANEL""; ""A CONTEXTUAL FRAMEWORK""; ""STRUCTURE OF THE REPORT""; ""2 Trends in Adolescent Sexuality and Fertility ""; ""ADOLESCENTS IN THE UNITED STATES""; ""Marriage""; ""Schooling""; ""Employment""; ""THE POPULATION AT RISK OF PREGNANCY""; ""Fecundity""; ""Sexual Activity""; ""Contraceptive Use""; ""Estimating the Population at Risk of Pregnancy"" |
""PREGNANCY AND ITS RESOLUTION"" ""Pregnancy""; ""Births""; ""Abortion""; ""Marriage Before Childbearing (Legitimation)""; ""Adoption""; ""Nonmarital Childbearing""; ""Future Projections""; ""DATA ISSUES""; ""Surveys""; ""Record Systems""; ""Data From Service Programs""; ""CONCLUSIONS""; ""3 The Societal Context ""; ""FAMILY CHANGES""; ""Family Structure""; ""Patterns of Marriage""; ""Patterns of Women's Employment and Unemployment""; ""Family Income""; ""SOCIETAL CHANGES""; ""Poverty Status""; ""Women's Roles and Norms of Sexual Behavior""; ""Youth Culture"" |
""Technological Change: Television"" ""CONCLUSION""; ""4 Determinants of Adolescent Sexual Behavior and Decision Making ""; ""DETERMINANTS OF ADOLESCENT SEXUAL ACTIVITY""; ""Individual Characteristics""; ""Family Characteristics""; ""Peer Group Influence""; ""DETERMINANTS OF CONTRACEPTIVE USE""; ""Age at Initiation""; ""Nature of the Relationship""; ""Academic Aspirations and Achievement""; ""Knowledge of Reproduction and Contraception""; ""Acceptance of One's Own Sexuality and Attitude About Contraception""; ""Developmental Characteristics""; ""Parental Support and Controls"" |
""DETERMINANTS OF ABORTION"" ""Unintendedness""; ""Academic Aspirations and Achievement""; ""Contraceptive Use""; ""Family Characteristics""; ""Peer Influences""; ""Access to Abortion Services""; ""DETERMINANTS OF MARRIAGE BEFORE CHILDBEARING (LEGITIMATION)""; ""Race and Socioeconomic Status""; ""Age""; ""Availability of Financial Assistance""; ""DETERMINANTS OF ADOPTION""; ""DETERMINANTS OF NONMARITAL CHILDBEARING""; ""Race""; ""Attitudes Toward Nonmarital Childbearing""; ""Poverty and Unemployment""; ""Availability of Financial Assistance""; ""CONCLUSION""; ""5 Consequences of Adolescent Childbearing "" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910828606003321 |
|
|
Autore |
Goods Caleb |
|
|
Titolo |
Greening auto jobs : a critical analysis of the green job solution / / Caleb Goods |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Lanham, Maryland ; ; London, England : , : Lexington Books, , 2014 |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-7391-9925-0 |
0-7391-8981-6 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (263 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Green movement - Australia |
Job creation - Australia |
Automobile industry and trade - Australia |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Contents; List of Figures; List of Tables; Preface and Acknowledgments; List of Abbreviations; Ch01. Introduction; Ch02. What is a Green Job?; Ch03. Green Jobs as an Environmental and Economic Battleground; Ch04. The Response of Some Key Australian Unions to Green Jobs; Ch05. The Automotive Industry; Ch06. Crisis in the Global Automotive Industry and the Green Shift; Ch07. Green Cars, Green Jobs; Ch08. Analyzing the Green Shift; Ch09. Conclusion; Bibliography; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Greening Auto Jobs: A Critical Analysis of the Green Job Solution provides a major contribution to the growing and important field of environmental sociology and labor studies by providing a theoretical and practical understanding of how the broader political-economic relations of society affect the relationship between labor and the environment. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
4. |
Record Nr. |
UNINA9910865259403321 |
|
|
Autore |
Li Shaofeng |
|
|
Titolo |
Backdoor Attacks against Learning-Based Algorithms / / by Shaofeng Li, Haojin Zhu, Wen Wu, Xuemin (Sherman) Shen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (161 pages) |
|
|
|
|
|
|
Collana |
|
Wireless Networks, , 2366-1445 |
|
|
|
|
|
|
Altri autori (Persone) |
|
ZhuHaojin |
WuWen |
ShenXuemin (Sherman) |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Wireless communication systems |
Mobile communication systems |
Machine learning |
Computer Communication Networks |
Wireless and Mobile Communication |
Machine Learning |
Xarxes d'ordinadors |
Sistemes de comunicació sense fil |
Aprenentatge automàtic |
Llibres electrònics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Literature Review of Backdoor Attacks -- Invisible Backdoor Attacks in Image Classification Based Network Services -- Hidden Backdoor Attacks in NLP Based Network Services -- Backdoor Attacks and Defense in FL -- Summary and Future Directions. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for |
|
|
|
|
|
|
|
|
|
|
training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning. Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters. The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms. |
|
|
|
|
|
| |