04651nam 2200661Ia 450 991045174690332120200520144314.01-282-29183-197866122918383-540-79594-410.1007/978-3-540-79594-0(CKB)1000000000491391(EBL)364222(OCoLC)288579204(SSID)ssj0000391217(PQKBManifestationID)11273273(PQKBTitleCode)TC0000391217(PQKBWorkID)10337616(PQKB)10109167(DE-He213)978-3-540-79594-0(MiAaPQ)EBC364222(PPN)129062391(Au-PeEL)EBL364222(CaPaEBR)ebr10252009(CaONFJC)MIL229183(EXLCZ)99100000000049139120081024d2008 uy 0engur|n|---|||||txtccrNortheast Asia[electronic resource] ripe for integration? /Vinod K. Aggarwal ... [et al.], editors1st ed. 2009.Berlin Springer20081 online resource (282 p.)The political economy of the Asia PacificInternational conference proceedings.3-642-44417-2 3-540-79593-6 Includes bibliographical references and index.Economic and Security Institution Building in Northeast Asia: An Analytical Overview -- South Korea's Regional Economic Cooperation Policy: The Evolution of an Adaptive Strategy -- Rhetoric or Vision? Chinese Responses to U.S. Unilateralism -- Under Pressure: Japan's Institutional Response to Regional Uncertainty -- North Korea's Strategy for Regime Survival and East Asian Regionalism -- Impassive to Imperial? Russia in Northeast Asia from Yeltsin to Putin -- Security in Northeast Asia: Time for New Architecture? -- The Future of Northeast Asia's Institutional Architecture.Can regional mechanisms better institutionalize the increasing complexity of economic and security ties among the countries in Northeast Asia? As the international state system undergoes dramatic changes in both security and economic relations in the wake of the end of the Cold War, the Asian financial crisis, and the attack of 9/11, this question is now at the forefront of the minds of both academics and policymakers. Still, little research has been done to integrate the analysis of security and economic analysis of changes in the region within a broader context that will give us theoretically-informed policy insights. Against this backdrop, this book investigates the origins and evolution of Northeast Asia's new institutional architecture in trade, finance, and security from both a theoretical and empirical perspective. Northeast Asia is a region of great strategic significance in the international system. This book brings together an impressive array of scholars to analyze the prospects for deeper regional integration in Northeast Asia. Insightful and theoretically framed, this is crucial reading for anyone interested in understanding the dynamics of economic, political, and security relations in one of the world's most important and fascinating regions. Christopher M. Dent, University of Leeds The editors have assembled a distinguished group of country and regional specialists in this innovative project on the shifting institutional dynamics of Northeast Asia. The systematic application of a framework that facilitates comparison of international strategic and economic interests, domestic power dynamics, and elite beliefs across the major players in the region is one of the book's major contributions. The chapters, combining empirical richness and theoretical sophistication, give particular attention to the interaction between regional and global institutions on the one hand and country characteristics on the other. With many commentators arguing that a new institutional framework is needed to address security issues in Northeast Asia, the publication of Northeast Asia: Ripe for Integration is particularly timely. John Ravenhill, Australian National University .Political economy of the Asia Pacific.GlobalizationAsiaEast AsiaElectronic books.Globalization337.15341.24341.2473MiAaPQMiAaPQMiAaPQBOOK9910451746903321Northeast Asia1188221UNINA06422nam 22006735 450 99646637150331620200705131036.03-030-34139-910.1007/978-3-030-34139-8(CKB)4100000009759183(DE-He213)978-3-030-34139-8(MiAaPQ)EBC5971327(PPN)255496842(EXLCZ)99410000000975918320191102d2019 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSmart Computing and Communication[electronic resource] 4th International Conference, SmartCom 2019, Birmingham, UK, October 11–13, 2019, Proceedings /edited by Meikang Qiu1st ed. 2019.Cham :Springer International Publishing :Imprint: Springer,2019.1 online resource (XIV, 412 p. 203 illus., 133 illus. in color.) Information Systems and Applications, incl. Internet/Web, and HCI ;119103-030-34138-0 Includes bibliographical references and index.A Survey of Deep Learning Applied to Story Generation. -- A Smart Roll Wear Check Scheme for Ensuring the Rolling Quality of Steel Plates -- An Improved Prediction Model for the Network Security Situation -- A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles -- An Improved Assessment Method for the Network Security Risk -- A High-Performance Storage System Based with Dual RAID Engine -- An Universal Perturbation Generator for Black-box Attacks against Object Detectors -- A Brief Survey on Cyber Security Attack Entrances and Protection Strategies of Intelligent Connected Vehicle -- Hierarchically Channel-wise Attention Model for Clean and Polluted Water Images Classification -- Energy-efficient Approximate Data Collection and BP-based Reconstruction in UWSNs -- I2P Anonymous Communication Network Measurement and Analysis -- Plot Digitizing over Big Data Using Beam Search -- Trust-aware Resource Provisioning for Meteorological Workflow in Cloud -- Do Top Socail APPS Effect Voice Call? Evidence from Propensity Score Matching Methods -- Cognitive Hierarchy Based Coexistence and Resource Allocation for URLLC and eMBB -- Smart Custom Package Decision for Mobile Internet Services -- A Space Dynamic Discovery Scheme for Crowd Flow of Urban City -- Automated Classification of Attacker Privileges Based on Deep Neural Network -- nnD: Shallow Neural Network Based Collision Decoding in IoT communications -- Subordinate Relationship for Enterprise Employees Based on Directed Link Prediction -- An Elephant Ow Detection Method Based on Machine Learning -- AI Enhanced Automatic Response System for Resisting Network Threats -- A Cross-Plane Cooperative DDoS Detection and Defense Mechanism in Software-De ned Networking -- EIGRP to OSPF Migration in Production Network -- A Hardware Trojan Detection Method Design Based on TensorFlow -- Resolving the Loop in High-Level SDN Program for Multi-Table Pipeline Compilation -- An Enhanced JPEG Compression Method Based on Accurate DC Coefficients Recovery -- A Performance Evaluation Method of Coal- red Boiler Based on Neural Network -- Analysis and Prediction of Commercial Big Data Based on WIFI Probe -- Design and Optimization of Camera HAL Layer Based on Android -- Music Rhythm Customized Mobile Application Based on Information Extraction -- Computational Challenges and Opportunities in Financial Services -- A Shamir Threshold Model Based Recoverable IP Watermarking Scheme -- Applications of Machine Learning Tools in Genomics: A Review -- Hierarchical Graph Neural Networks for Personalized Recommendations with User-session Context -- Coattention-based Recurrent Neural Networks for Sentiment Analysis of Chinese Texts -- Design and Implementation of Small-scale Sensor Network Based on Raspberry Pi -- Research on Template-based Factual Automatic Question Answering Technology -- A Novel Scheme for Recruitment Text Categorization Based on KNN Algorithm -- Machine Learning for Cancer Subtype Prediction with FSA Method -- Autonomous Vehicle Communication In V2X Network With LoRa Protocol. .This book constitutes the refereed proceedings of the 4th International Conference on Smart Computing and Communications, SmartCom 2019, held in Birmingham, UK, in October 2019. The 40 papers presented in this volume were carefully reviewed and selected from 286 submissions. They focus on both smart computing and communications fields and aimed to collect recent academic work to improve the research and practical application in the field.Information Systems and Applications, incl. Internet/Web, and HCI ;11910Computer communication systemsArtificial intelligenceApplication softwareComputer networksSecurity measuresOptical data processingComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Mobile and Network Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28050Image Processing and Computer Visionhttps://scigraph.springernature.com/ontologies/product-market-codes/I22021Computer communication systems.Artificial intelligence.Application software.Computer networksSecurity measures.Optical data processing.Computer Communication Networks.Artificial Intelligence.Information Systems Applications (incl. Internet).Mobile and Network Security.Image Processing and Computer Vision.004.6Qiu Meikangedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466371503316Smart Computing and Communication1939023UNISA