1.

Record Nr.

UNINA9910796042303321

Titolo

The reception of ancient virtues and vices in modern popular culture [[e-book] ] : beauty, bravery, blood and glory / / edited by Eran Almagor and Lisa Maurice

Pubbl/distr/stampa

Leiden ; ; Boston : , : Brill, , 2017

ISBN

90-04-34772-0

Descrizione fisica

1 online resource (438 pages) : illustrations

Collana

Metaforms: studies in the reception of classical antiquity ; ; v. 11

Altri autori (Persone)

AlmagorEran

MauriceLisa <1968->

Disciplina

809.933583

Soggetti

Civilization, Classical, in mass media

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction: Ancient Virtues and Vices in Modern Popular Culture / Eran Almagor and Lisa Maurice -- Re-enacting Ancient Virtues and Vices / Eran Almagor and Lisa Maurice -- Staging Ancient Virtues and Vices / Eran Almagor and Lisa Maurice -- The House of Atreus as a Reflection of Contemporary Evil: Performance Reception and The Oresteia / Lisa Maurice -- Thornton Wilder’s The Alcestiad or A Life in the Sun / Hanna M. Roisman -- Herodotus on Stage: The Modern Greek Play “Candaules’ Wife” by Margarita Liberaki / Ariadne Konstantinou -- Screening Ancient Virtues and Vices / Eran Almagor and Lisa Maurice -- Can You Dig It? Heroes and Villains from Xenophon’s Anabasis to Walter Hill’s The Warriors (1979) / Eran Almagor -- Hercules’ Choice: Virtue, Vice and the Hero of the Twentieth-Century Screen / Emma Stafford -- Deconstructing Oedipus: Woody Allen’s Mighty Aphrodite and the Classical Tradition / Anna Foka -- Caligula and Drusilla in the Modern Imagination / Emma Southon -- “Salome, Nice Girl”: Rita Hayworth and the Problem of the Hollywood Biblical Vamp / Lloyd Llewellyn-Jones -- Representations of the Christian Female Virtue in Roman Film Epics: The Sign of the Cross (1932) and Quo Vadis (1951) / Panayiota Mini -- Ancient Virtues and Vices in the Modern World / Eran Almagor and Lisa Maurice -- Ancient Virtues and Vices in Modern Greece / Eran Almagor and Lisa Maurice -- Philip, Alexander and Macedonia: Between Greek Virtue and Barbarian Pleasure / Maria



Pretzler -- From Giscard d’Estaing to Syntagma Square: The Use and Abuse of Ancient Greece in the Debate on Greece’s eu Membership / Luca Asmonti -- The Great God Pan Never Dies! / Aggeliki Koumanoudi -- Ancient Virtues and Vices in Modern Jewish Existence / Eran Almagor and Lisa Maurice -- In These Days, in That Season: The Nationalization of the Maccabees / David M. Schaps -- A Double Edged Sword—The Power of Bar-Kosibah: From Rabbinic Literature to Popular Culture / Haim Weiss -- What Has Rome to Do with Jerusalem? The Reception of Turnus Rufus and Rabbi Akivah in the Talmud and in Contemporary Israel / Gabriel Danzig.

Sommario/riassunto

In Ancient Virtues and Vices in Modern Popular Culture , Eran Almagor and Lisa Maurice offer a comprehensive collection of chapters dealing with the reception of antiquity in popular media of the modern era (19th-21st centuries). These media include theatrical plays, cinematic representations, Television drama, popular newspapers or journals, poems and outdoor festivals. For the first time in Classical Reception Studies, ancient Jewish literature and imagery are included in the discussion. The focus of the volume is both the continuity and variance between ancient and modern sets of values, which appear in the new interpretations of the ancient stories, figures and protagonists.



2.

Record Nr.

UNINA9910830309403321

Autore

Wu Yulei

Titolo

AI and machine learning for network and security management / / Yulei Wu, Jingguo Ge and Tong Li

Pubbl/distr/stampa

Piscataway, New Jersey ; ; Hoboken, New Jersey : , : IEEE Press : , : Wiley, , [2023]

©2023

ISBN

1-119-83590-9

1-119-83589-5

1-119-83588-7

Descrizione fisica

1 online resource (338 pages)

Collana

IEEE Press series on networks and services management

Disciplina

006.3

Soggetti

Computer networks - Security measures - Data processing

Artificial intelligence

Machine learning

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Table of Contents -- Title Page -- Copyright -- Author Biographies -- Preface -- Acknowledgments -- Acronyms -- 1 Introduction -- 1.1 Introduction -- 1.2 Organization of the Book -- 1.3 Conclusion -- References -- 2 When Network and Security Management Meets AI and Machine Learning -- 2.1 Introduction -- 2.2 Architecture of Machine Learning‐Empowered Network and Security Management -- 2.3 Supervised Learning -- 2.4 Semisupervised and Unsupervised Learning -- 2.5 Reinforcement Learning -- 2.6 Industry Products on Network and Security Management -- 2.7 Standards on Network and Security Management -- 2.8 Projects on Network and Security Management -- 2.9 Proof‐of‐Concepts on Network and Security Management -- 2.10 Conclusion -- References -- Notes -- 3 Learning Network Intents for Autonomous Network Management* -- 3.1 Introduction -- 3.2 Motivation -- 3.3 The Hierarchical Representation and Learning Framework for Intention Symbols Inference -- 3.4 Experiments -- 3.5 Conclusion -- References -- Notes -- 4 Virtual Network Embedding via Hierarchical Reinforcement Learning1 -- 4.1



Introduction -- 4.2 Motivation -- 4.3 Preliminaries and Notations -- 4.4 The Framework of VNE‐HRL -- 4.5 Case Study -- 4.6 Related Work -- 4.7 Conclusion -- References -- Note -- 5 Concept Drift Detection for Network Traffic Classification -- 5.1 Related Concepts of Machine Learning in Data Stream Processing -- 5.2 Using an Active Approach to Solve Concept Drift in the Intrusion Detection Field -- 5.3 Concept Drift Detector Based on CVAE -- 5.4 Deployment and Experiment in Real Networks -- 5.5 Future Research Challenges and Open Issues -- 5.6 Conclusion -- References -- Note -- 6 Online Encrypted Traffic Classification Based on Lightweight Neural Networks* -- 6.1 Introduction -- 6.2 Motivation -- 6.3 Preliminaries -- 6.4 The Proposed Lightweight Model.

6.5 Case Study -- 6.6 Related Work -- 6.7 Conclusion -- References -- Notes -- 7 Context‐Aware Learning for Robust Anomaly Detection* -- 7.1 Introduction -- 7.2 Pronouns -- 7.3 The Proposed Method - AllRobust -- 7.4 Experiments -- 7.5 Discussion -- 7.6 Conclusion -- References -- Note -- 8 Anomaly Classification with Unknown, Imbalanced and Few Labeled Log Data -- 8.1 Introduction -- 8.2 Examples -- 8.3 Methodology -- 8.4 Experimental Results and Analysis -- 8.5 Discussion -- 8.6 Conclusion -- References -- Notes -- 9 Zero Trust Networks -- 9.1 Introduction to Zero‐Trust Networks -- 9.2 Zero‐Trust Network Solutions -- 9.3 Machine Learning Powered Zero Trust Networks -- 9.4 Conclusion -- References -- 10 Intelligent Network Management and Operation Systems -- 10.1 Introduction -- 10.2 Traditional Operation and Maintenance Systems -- 10.3 Security Operation and Maintenance -- 10.4 AIOps -- 10.5 Machine Learning‐Based Network Security Monitoring and Management Systems -- 10.6 Conclusion -- References -- 11 Conclusions, and Research Challenges and Open Issues -- 11.1 Conclusions -- 11.2 Research Challenges and Open Issues -- References -- Index -- End User License Agreement.