04580nam 2200625Ia 450 991078611290332120200520144314.09956-790-48-69956-790-50-8(CKB)2670000000343276(EBL)1164434(OCoLC)836400560(SSID)ssj0000938528(PQKBManifestationID)11583081(PQKBTitleCode)TC0000938528(PQKBWorkID)10921007(PQKB)10096584(MiAaPQ)EBC1164434(OCoLC)844909145(MdBmJHUP)muse27013(Au-PeEL)EBL1164434(CaPaEBR)ebr10677905(CaONFJC)MIL499238(PPN)183254708(EXLCZ)99267000000034327620130413d2013 uy 0engur|n|---|||||txtccrPerspectives on written Cameroon literature in English[electronic resource] /Shadrach A. AmbanasomOxford Langaa RPCIG20131 online resource (362 p.)Description based upon print version of record.9956-728-29-2 Includes bibliographical references.Cover; Title page; Copyright page; Contents; Sources; Acknowledgements; Preface; Introduction; Part One: General Essays; 1. Half a Century of Written Anglophone CameroonLiterature; 2. Critical Approaches in the Criticism of CameroonLiterature of English Expression; 3. Cameroonian Creative Writers and the LanguageProblem; 4. The African Writer and the Preservation ofCultural Values; 5.The Cameroonian Novel of English Expression; Part Two: Specific LiteraryStudies6. Ideology In Three Dramatic Works: Victor Epie Ngome's What God Has Put Asunder, And Bate Besong's Beasts Of No Nation And Requiem For The Last Kaiser7. The Educational Significance of the Cameroon Novel of English Expression: Focus On FourTexts; 8. Deconstructing Gender Hierarchy: A Study ofMargaret Afuh's Born Before Her Time; 9. The Anti-Heroes of L.T. Asong's Fiction: Focus on Five Novels; 10. Two Opposing Trends in Mongo Beti's Fiction:A Study Of Remember Ruben and Perpetua; 11. Pedagogy of the Deprived: A Study of the Plays of Victor Epie Ngome, Bole Butake and BateBesong12. Anatomy of a Short Story: An Analysis of BoleButake's "The Way of the City"13. The Orality of the Works of Four Anglophone Writers: Linus Asong, Bole Butake, BongasuKishani, Fale Wache; 14.The Modernist Character of Bate Besong's Poetry; 15.The Quintessence of Bernard Fonlon; Part Three: Book Reviews; 16. Bole Butake, Lake God and Other PlaysYaoundé: Editions CLE, 1999; 17. L. T. Asong, The Akroma File , Bamenda: PatronPublishing House, 1997; 18. Alobwed'Epie, The Death Certificate , Yaoundé:Editions CLE, 200419. John Nkemngong Nkengasong, Across theMongolo, Ibadan: Spectrum Books Limited, 200420. Alobwed'Epie, The Lady With A Beard,Yaoundé: Editions CLE, 2005.; 21. John Nkemngong Nkengasong, The Widow's Might, Yaoundé: Editions CLE, 2006; 22. John Ngong Kum, Walls of Agony, Yaoundé:Editions CLE 2006; 23. John Ngong Kum, Battle for Survival, Yaoundé:Editions CLE 2006; 24. Introducing L. T. Asong: "The Major Talent OfCameroon Fiction In English"; 25. Francis B. Nyamnjoh, A Nose for Money, East African Educational Publishers Ltd, 2006; Conclusion; Back coverIn 2009, Anglophone Cameroon literature celebrated its fifty years of existence. Now at the mature age of fifty plus this literature has a great deal to write home about even if it still has a lot to do in its pursuit of excellence. Part of its maturity resides in the fact that although the scale of literary creativity and literary criticism is skewed in favour of the former, Anglophone Cameroon literary criticism is gradually waking up from slumber in an attempt to catch up with the rapidly expanding creativity. The essays in this book comment practically on some aspects of all the genres of Cameroonian literature (English)History and criticismAuthors, CameroonianCameroonian literature (English)History and criticism.Authors, Cameroonian.820.996711Ambanasom Shadrach A973575MiAaPQMiAaPQMiAaPQBOOK9910786112903321Perspectives on written Cameroon literature in English3719476UNINA09276nam 22007935 450 991048464530332120251226200418.03-642-39701-810.1007/978-3-642-39701-1(CKB)3710000000002644(DE-He213)978-3-642-39701-1(SSID)ssj0000963240(PQKBManifestationID)11527010(PQKBTitleCode)TC0000963240(PQKBWorkID)10979430(PQKB)11530218(MiAaPQ)EBC3093078(PPN)172428491(EXLCZ)99371000000000264420130704d2013 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierWireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings /edited by Kui Ren, Xue Liu, Weifa Liang, Ming Xu, Xiaohua Jia, KAI XING1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XIV, 536 p. 231 illus.)Theoretical Computer Science and General Issues,2512-2029 ;7992International conference proceedings.3-642-39700-X Includes bibliographical references and author index.Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion Recognition Based on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cyclein Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Improving Particle Filter with Better Proposal Distribution for Nonlinear Filtering Problems -- Performance Evaluation with Control Channel on the Coexistence Scenario of TD-LTE and LTE-FDD -- Buffer Occupation in Wireless Social Networks -- Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices -- A Network Forensics System for Information Leak Events -- Maximum Independent Set of Links with a Monotone and Sublinear Power Assignment -- An Auction Mechanism for Resource Allocation in Mobile Cloud Computing Systems -- A Novel Delay-Resilient Remote Memory Attestation for Smart Grid -- A Source-Relay Selection Scheme with Power Allocation for Asymmetric Two-Way Relaying Networks in Underground Mines -- Performance Analysis of Broadcast in Multi-channel Multi-radio Wireless Mesh Networks -- SAFE: A Strategy-Proof Auction Mechanism for Multi-radio, Multi-channel Spectrum Allocation -- A Context-Aware MAC Protocol for VANETs -- A Balance Storage Nodes Assignment for Wireless Sensor Networks -- A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory -- UCOR: An Unequally Clustering-Based Hierarchical Opportunistic Routing Protocol for WSNs -- A Quadri-Stage Contention MAC Protocol with Opportunistic Network Coding Support for Underwater Acoustic Networks -- Fast Encryption of JPEG 2000 Images in Wireless Multimedia Sensor Networks -- Evaluating Selective ARQ and Slotted Handshake Based Access in Real World Underwater Networks -- ActiviTune: A Multi-stage System for Activity Recognition of Passive Entities from Ambient FM-Radio Signals -- From Decision Fusion to Localization in Radar Sensor Networks: A Game Theoretical View -- Characterizing the Impact of Non-uniform Deployment of APs on Network Performance under Partially Overlapped Channels -- Patient’s Motion RecognitionBased on SOM-Decision Tree -- Range-Free Mobile Node Localization Using Static Anchor -- Neighbor Discovery Algorithm Based on the Regulation of Duty-Cycle in Mobile Sensor Network -- Diversity between Human Behaviors and Metadata Analysis: A Measurement of Mobile App Recommendation -- An Urban Area-Oriented Traffic Information Query Strategy in VANETs -- Navigation for Indoor Mobile Robot Based on Wireless Sensor Network -- iMac: Strategy-Proof Incentive Mechanism for Mobile Crowdsourcing -- Social Welfare Maximization in Participatory Smartphone Sensing -- An Optimal Solution for Round Rotation Time Setting in LEACH -- UPC-MAC: A Power Control MAC Protocol for Underwater Sensor Networks -- FMAC for Coexisting Ad Hoc Cognitive Radio Networks -- Effective RSS Sampling for Forensic Wireless Localization -- An Optimal Leakage Detection Strategy for Underground Pipelines Using Magnetic Induction-Based Sensor Networks -- Compressive Data Retrieval with Tunable Accuracy in Vehicular Sensor Networks -- Enforcing Spectrum Access Rules in Cognitive Radio Networks through Cooperative Jamming -- Photo Forensics on Shanzhai Mobile Phone -- Local Information Storage Protocol for Urban Vehicular Networks -- Maximum Independent Set of Links with Power Control -- Sweep-Coverage with Energy-Restricted Mobile Wireless Sensor Nodes -- The Trading between Virtual Mobile Operator and Wireless Service Provider in the Two-Tier Femtocell Network -- Truthful Online Reverse Auction with Flexible Preemption for Access Permission Transaction in Macro-Femtocell Networks -- Social Communications Assisted Epidemic Disease Influence Minimization.This book constitutes the refereed proceedings of the 7th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013, held in Zhangjiajie, China, in August 2013. The 25 revised full papers presented together with 18 invited papers were carefully reviewed and selected from 80 submissions. The papers cover the following topics: effective and efficient state-of-the-art algorithm design and analysis, reliable and secure system development and implementations, experimental study and testbed validation, and new application exploration in wireless networks.Theoretical Computer Science and General Issues,2512-2029 ;7992AlgorithmsComputer networksApplication softwareElectronic digital computersEvaluationComputer scienceAlgorithmsComputer Communication NetworksComputer and Information Systems ApplicationsSystem Performance and EvaluationComputer ScienceAlgorithms.Computer networks.Application software.Electronic digital computersEvaluation.Computer science.Algorithms.Computer Communication Networks.Computer and Information Systems Applications.System Performance and Evaluation.Computer Science.005.1DAT 256fstubSS 4800rvkRen Kuiedthttp://id.loc.gov/vocabulary/relators/edtLiu Xueedthttp://id.loc.gov/vocabulary/relators/edtLiang Weifaedthttp://id.loc.gov/vocabulary/relators/edtXu Mingedthttp://id.loc.gov/vocabulary/relators/edtJia Xiaohuaedthttp://id.loc.gov/vocabulary/relators/edtXing Kaiedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910484645303321Wireless Algorithms, Systems, and Applications771859UNINA