| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910566494903321 |
|
|
Autore |
Meyer Christine |
|
|
Titolo |
« Comme un autre Don Quichotte » : Intertextualités chez Canetti / / Christine Meyer |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Lyon, : ENS Éditions, 2021 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (247 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Literature (General) |
littérature |
intertextualité |
critique et interprétation |
Canetti, Elia |
Cervantes Saavedra, Miguel de |
Don Quijote de la Mancha |
Die Blendung |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Roman noir, parabole de la capitulation des intellectuels face à la montée du nazisme, Auto-da-fé de Canetti (dont le titre allemand Die Biendung signifie « L’Aveuglement ») est aussi une transposition magistrale de Don Quichotte. L’analogie entre les deux romans est si patente qu’elle n’a pas manqué d’être relevée par la critique, mais elle n’avait pas encore, à ce jour, fait l’objet d’une étude approfondie. Pire, elle n’a trop souvent servi qu’à alimenter l’idée reçue selon laquelle Elias Canetti serait un écrivain conventionnel, pour ne pas dire réactionnaire. Au moyen d’une analyse comparative précise, Christine Meyer met à jour le réseau de correspondances qui relient Auto-da-fé au chef-d’œuvre de Cervantès. Elle parvient ainsi à éclairer les enjeux multiples, à la fois esthétiques et philosophiques, de la transformation intertextuelle chez Canetti. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910483250103321 |
|
|
Titolo |
Intelligence and Security Informatics : Pacific Asia Workshop, PAISI 2010, Hyderabad, India, June 21, 2010 Proceedings / / edited by Hsinchun Chen, Michael Chau, Shu-Hsing Li, Shalini Urs, Srinath Srinivasa, G. Alan Wang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-280-38713-0 |
9786613565051 |
3-642-13601-X |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2010.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (183 p. 50 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 6122 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks |
Application software |
Database management |
Information storage and retrieval systems |
Data mining |
Cryptology |
Computer Communication Networks |
Computer and Information Systems Applications |
Database Management |
Information Storage and Retrieval |
Data Mining and Knowledge Discovery |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Terrorism Informatics and Crime Analysis -- Combined Detection Model for Criminal Network Detection -- An Association Model for Implicit Crime Link Analysis -- Design and Deployment of a National Detecting Stolen Vehicles Network System -- Fighting Cybercrime: A KM Perspective -- Transportation Infrastructure Security -- Trajectory |
|
|
|
|
|
|
|
|
|
|
|
Similarity of Network Constrained Moving Objects and Applications to Traffic Security -- An Emergent Traffic Messaging Service Using Wireless Technology -- Information Access and Security -- A Model for Detecting “Global Footprint Anomalies” in a Grid Environment -- Secure Anonymous Routing for MANETs Using Distributed Dynamic Random Path Selection -- MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches -- Data Encryption -- Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model -- Key Independent Decryption of Graphically Encrypted Images -- Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model -- JPEG Steganalysis Using HBCL Statistics and FR Index -- Data and Text Mining -- Text Mining Technique for Chinese Written Judgment of Criminal Case -- Exploration of Document Relation Quality with Consideration of Term Representation Basis, Term Weighting and Association Measure -- Identifying Controversial Issues and Their Sub-topics in News Articles -- Efficient Privacy Preserving K-Means Clustering -- A Fuzzy Threshold Based Modified Clustering Algorithm for Natural Data Exploration. |
|
|
|
|
|
|
Sommario/riassunto |
|
Intelligence and security informatics (ISI) is concerned with the study of the devel- ment and use of advanced information technologies and systems for national, inter- tional, and societal security-related applications. The annual IEEE International Conference series on ISI (http://www. isiconference. org/) was started in 2003. In 2006, the Workshop on ISI (http://isi. se. cuhk. edu. hk/2006/) was held in Singapore in c- junction with the Pacific Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2006), with over 100 contributors and participants from all over the world. This would become the start of a new series of ISI meetings in the Pacific Asia region. PAISI 2007 (http://isi. se. cuhk. edu. hk/2007/) was then held in Chengdu, China. PAISI 2008 (http://isi. se. cuhk. edu. hk/2008/) was held in Taipei, Taiwan, in conjunction with IEEE ISI 2008. PAISI 2009 (http://www. business. hku. hk/paisi/2009/) was held in Bangkok, Thailand, in conjunction with PAKDD 2009. These past ISI conferences and workshops brought together academic researchers, law enforcement and intel- gence experts, information technology consultants and practitioners to discuss their research and practice related to various ISI topics. These topics include ISI data m- agement, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastr- ture security, policy studies and evaluation, information assurance, enterprise risk management, information systems security, among others. |
|
|
|
|
|
|
|
| |