01105oam 2200289z- 450 991073439170332120001215115320.03-7489-2244-2(CKB)4100000011492749(EXLCZ)99410000001149274920211110c1997uuuu -u- -engDer Kampf um einen weltweiten Tarifvertrag Probleme des deutschen Arbeitsrechts bei der Verbesserung der Arbeitsbedingungen auf Billigflaggenschiffen /Wolfgang DäublerNomos Verlagsgesellschaft mbH & Co. KG3-7890-4880-1 Collective labor agreementsMerchant marineGermanyMerchant marinersLegal status, laws, etcGermanyFlags of convenienceGermanyCollective labor agreementsMerchant marineMerchant marinersLegal status, laws, etc.Flags of convenience344.4301/890413875Däubler Wolfgang229942BOOK9910734391703321Der Kampf um einen weltweiten Tarifvertrag3401769UNINA02622nam 2200493z- 450 991059812640332120220425(CKB)4920000001372328(oapen)https://directory.doabooks.org/handle/20.500.12854/80914(PPN)261576771(oapen)doab80914(EXLCZ)99492000000137232820202204d2020 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierQuand Minerve passe les monts. Modalités littéraires de la circulation des savoirs (Italie-France, Renaissance-XVIIe siècle)PessacPresses Universitaires de Bordeaux20201 online resource (188 p.)S@voirs humanistes1979-1-03-000800-5 Two people who do not speak the same language meet. One writes the name of the other: a fugitive, timeless and banal scene. Only a modest written record remains. Thanks to it, however, we can, centuries later, re-experience the exact moment of this exchange. Sometimes the fugitively captured name will be the only vestige of completely extinct languages. For epigraphies of fragmentary attestation, understanding that it is a proper name, isolating it and deciphering it is in itself a first task. It is then necessary to analyze the treatment of this name in the language of reception, the required adaptations and retrace the context in which the object was written. With these few pieces, the background image of the cultural and linguistic puzzle of ancient societies is reconstituted. This book aims to constitute and leaf through the album of a dozen of these linguistic snapshots all around the ancient Mediterranean.Quand Minerve passe les monts. Modalités littéraires de la circulation des savoirs Literature: history and criticismbicsscbelles lettresdiffusionhumanismItalian influenceknowledgeliteraturepopularisationreadershipsciencetranslationvernacularisationLiterature: history and criticismRoudière-Sébastien Carineedt1306354Roudière-Sébastien CarineothBOOK9910598126403321Quand Minerve passe les monts. Modalités littéraires de la circulation des savoirs (Italie-France, Renaissance-XVIIe siècle)3028423UNINA07872nam 22006495 450 991042771860332120251225183615.0981-15-8083-910.1007/978-981-15-8083-3(CKB)4100000011435683(DE-He213)978-981-15-8083-3(MiAaPQ)EBC6348876(PPN)25529638X(EXLCZ)99410000001143568320200912d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierArtificial Intelligence and Security 6th International Conference, ICAIS 2020, Hohhot, China, July 17–20, 2020, Proceedings, Part I /edited by Xingming Sun, Jinwei Wang, Elisa Bertino1st ed. 2020.Singapore :Springer Nature Singapore :Imprint: Springer,2020.1 online resource (XXIX, 719 p. 337 illus., 187 illus. in color.) Communications in Computer and Information Science,1865-0937 ;1252Includes index.981-15-8082-0 Fast Texture Image Retrieval Using Learning Copula Model of Multiple DTCWT -- Joint Generic Learning and Multi-SourceDomain Adaptation on Unsupervised FaceRecognition -- Reset Attack: An Attack Against Homomorphic Encryption-based Privacy-Preserving Deep Learning System -- Intelligent Contract for Power Market Transaction Based on the BlockChain -- Survey on Zero-trust Network Security -- A Novel Consensus Algorithm for Alliance Chain -- A Novel Thematic Network Data Collector Based on Simulated Annealing Hybrid Genetic Algorithm -- The Study of Fog Computing Security Situation Prediction in Industrial Internet -- A novel keypoints-based image registration method with fully convolutional neural network -- Image super-resolution reconstruction with dense residual attention module -- GF-2 image blue roof building extraction method based on object-oriented classification technology -- Optimization and Parallelization of the cosmological N-body Simulation on Many-core Processor -- Parallel optimization of stencil computation base on Sunway TaihuLight -- Chinese News Data Extraction System Based On Readability Algorithm -- Parallel Acceleration Improvement of Physical Quantity Gradient Algorithm Based on CFD -- Using Process Visualization and Early Warning Based on Learning Analytics to Enhance Teaching and Learning -- Research Progress of Knowledge Graph Embedding -- A Robust Framework for High-quality Voice Conversion with Conditional Generative Adversarial Network -- Effective Android Malware Detection based on Deep Learning -- Research on Tampering Detection of Material Gene Data Based on Fragile Watermarking -- Quantitative Evaluation Of Promotion Of Traditional National Sports Events Based On Probity Multiple Regression Analysis -- Research on Leisure Sports Activities Based on Decision Tree Algorithm -- Semantic Integrity Analysis Based on Transformer -- An improvementof Coherent Semantic Attention for Image Inpainting -- Formal Verification of the Correctness of Operating System on Assembly Layer in Isabelle/HoL -- Nonlinear Correction Based on Depth Neural Network -- Spatial-temporal co-attention network for action recognition -- Improved SSD for object detection -- Sentiment Analysis on Weibo Platform for Stock Prediction -- Refinement Measurement and Evaluation of Streets in Shanghai Old City -- A Traceability Architecture for the Fresh Food Supply Chain based on Blockchain Technology in China -- Research Progress in Blind Forensics of Digital Image Smooth Filtering -- Research on video violence detection technology of UAV on cloud platform -- A Generative Steganography Method Based on WGAN-GP -- A deep learning network for coarse-to-fine deformable medical image registration -- Research on Cross-lingual Machine Reading Comprehension Technology Based on Non-parallel Corpus -- Research on the data reference model of NMIS -- A Real-time Recommender System Design Based on Spark Streaming -- A Novel Clone Detection Scheme Based on Generative Adversarial Networks -- Design of Vehicle Remote Monitoring System Based on LoRa Technology and QT Platform -- Unifying Domain Adaptation into Simultaneous Discriminant Analysis: a Method for Low-resolution Face Recognition with Single Sample per Person -- An exploratory study of blending Smart classroom in database course -- Optimization and simulation of pre-warehouse multi-objective stock levels based on the Weibull distribution function -- Research and Analysis of Fine Management of Engineering Cost Based on BIM -- Survey of Software-Defined Network Security Issues -- A Fall Detection Algorithm Based on a Support Vector Machine -- A Multi-AGV Optimal Scheduling Algorithm Based on Particle Swarm Optimization -- An efficient quantum private comparison protocol based on conjugate coding -- Deliberated Vulnerable Environment Generating based on Container and Structured Vulnerability Intelligence -- Deep neural network watermarking based on texture analysis -- A Robust Reversible Image Watermarking Scheme based on Singular Value Decomposition and Quantization Technique -- Boolean Function Decomposition Based on Grover Algorithm and Its Simulation Using Quantum Language Quipper -- Research on Emotional Recognition of EEG Signals in Experimental Paradigm -- Research on Rasterized Population Evaluation Method Based on Multi-class Machine Learning Method -- Salary Satisfaction of University Teachers with Different Professional Positions -- Defining Cost Function for Robust Embedding -- Efficient Identity-Based Signature authentication scheme for smart home system -- A Resource Allocation Mechanism for Edge-blockchain -- Remote sensing image zero-watermarking algorithm based on accurate polar harmonic Fourier moment -- Multi-layer quantum secret sharing based on GHZ states -- Robot scheduling system based on semantic recognition -- Pedestrian Counting without Tracking for the Security Application of IoT Framework.The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial Intelligence and Security, ICAIS 2020, which was held in Hohhot, China, in July 2020. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 178 full papers and 8 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1064 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; Internet of things; information security; Part III: information security; big data and cloud computing; information processing.Communications in Computer and Information Science,1865-0937 ;1252Data protectionComputer engineeringComputer networksArtificial intelligenceData and Information SecurityComputer Engineering and NetworksArtificial IntelligenceComputer Communication NetworksData protection.Computer engineering.Computer networks.Artificial intelligence.Data and Information Security.Computer Engineering and Networks.Artificial Intelligence.Computer Communication Networks.016.403Wang JinweiBertino ElisaSun XingmingMiAaPQMiAaPQMiAaPQBOOK9910427718603321Artificial intelligence and security1999223UNINA