LEADER 04561nam 2200973Ia 450 001 9910970118703321 005 20200520144314.0 010 $a9786613889942 010 $a9781283577496 010 $a1283577496 010 $a9780823242160 010 $a0823242161 010 $a9780823242177 010 $a082324217X 010 $a9780823246618 010 $a0823246612 024 7 $a10.1515/9780823242177 035 $a(CKB)3240000000065560 035 $a(EBL)3239601 035 $a(OCoLC)808366482 035 $a(SSID)ssj0000600635 035 $a(PQKBManifestationID)11367648 035 $a(PQKBTitleCode)TC0000600635 035 $a(PQKBWorkID)10617369 035 $a(PQKB)10087762 035 $a(MiAaPQ)EBC3239601 035 $a(OCoLC)830023233 035 $a(MdBmJHUP)muse14124 035 $a(DE-B1597)555229 035 $a(DE-B1597)9780823242177 035 $a(MiAaPQ)EBC976991 035 $a(Au-PeEL)EBL3239601 035 $a(CaPaEBR)ebr10539017 035 $a(CaONFJC)MIL388994 035 $a(Au-PeEL)EBL976991 035 $a(OCoLC)801363547 035 $a(Perlego)535895 035 $a(EXLCZ)993240000000065560 100 $a20111011d2012 uy 0 101 0 $aeng 135 $aur|nu---|u||u 181 $ctxt 182 $cc 183 $acr 200 10$aGhost-watching American modernity $ehaunting, landscape, and the hemispheric imagination /$fMaria del Pilar Blanco 205 $a1st ed. 210 $aNew York $cFordham University Press$dc2012 215 $a1 online resource (237 p.) 300 $aDescription based upon print version of record. 311 08$a9780823242146 311 08$a0823242145 320 $aIncludes bibliographical references and index. 327 $tFront matter --$tContents --$tAcknowledgments --$tIntroduction --$t1. Unsolving Hemispheric Mystery --$t2. Desert Mournings --$t3. Urban Indiscretions --$t4. Transnational Shadows --$tEpilogue --$tNotes --$tBibliography --$tIndex 330 $aIn Ghost-Watching American Modernity, María del Pilar Blanco revisits nineteenth- and twentieth-century texts from Spanish America and the United States to ask how different landscapes are represented as haunted sites. Moving from foundational fictions to Westerns, Blanco explores the diverse ways in which ghosts and haunting emerge across the American hemisphere for authors who are preoccupied with evoking the experience of geographical transformations during a period of unprecedented development. The book offers an innovative approach that seeks to understand ghosts in their local specificity, rather than as products of generic conventions or as allegories of hidden desires. Its chapters pursue formally attentive readings of texts by Domingo Sarmiento, Henry James, José Martí, W. E. B. Du Bois, Juan Rulfo, Felisberto Hernández, and Clint Eastwood. In an intervention that will reconfigure the critical uses of spectrality for scholars in U.S./Latin American Studies, narrative theory, and comparative literature, Blanco advances ghost-watching as a method for rediscovering haunting on its own terms. 606 $aAmerican literature$y19th century$xHistory and criticism 606 $aAmerican literature$y20th century$xHistory and criticism 606 $aComparative literature$xAmerican and Latin American 606 $aComparative literature$xLatin American and American 606 $aGhosts in literature 606 $aHaunted places 606 $aLandscapes in literature 606 $aNationalism in literature 606 $aSpanish American literature$y19th century$xHistory and criticism 606 $aSpanish American literature$y20th century$xHistory and criticism 615 0$aAmerican literature$xHistory and criticism. 615 0$aAmerican literature$xHistory and criticism. 615 0$aComparative literature$xAmerican and Latin American. 615 0$aComparative literature$xLatin American and American. 615 0$aGhosts in literature. 615 0$aHaunted places. 615 0$aLandscapes in literature. 615 0$aNationalism in literature. 615 0$aSpanish American literature$xHistory and criticism. 615 0$aSpanish American literature$xHistory and criticism. 676 $a809/.897 676 $a809.897 700 $aBlanco$b Maria del Pilar$01685877 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910970118703321 996 $aGhost-watching American modernity$94390521 997 $aUNINA LEADER 05937nam 22005295 450 001 996630871903316 005 20250626164143.0 010 $a9789819605767 010 $a9819605768 024 7 $a10.1007/978-981-96-0576-7 035 $a(CKB)36679486400041 035 $a(MiAaPQ)EBC31806093 035 $a(Au-PeEL)EBL31806093 035 $a(DE-He213)978-981-96-0576-7 035 $a(OCoLC)1474240374 035 $a(EXLCZ)9936679486400041 100 $a20241126d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aWeb Information Systems Engineering ? WISE 2024 $e25th International Conference, Doha, Qatar, December 2?5, 2024, Proceedings, Part V /$fedited by Mahmoud Barhamgi, Hua Wang, Xin Wang 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (531 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15440 311 08$a9789819605750 311 08$a981960575X 327 $a -- Security, Privacy and Trust. -- Privacy-Preserving k-core Decomposition For Graphs. -- Anomaly Detection in Log Streams based on Time-Contextual Models. -- Enhancing Open-Set Recognition with Global Feature Representation. -- Dynamic-Parameter Genetic Algorithm for Multi-objective Privacy-Preserving Trajectory Data Publishing. -- A Graph-Based Approach for Software Functionality Classification on the Web. -- FUD-LDP: Fully User Driven Local Differential Privacy. -- A Privacy-Preserving Encryption framework for Big data analysis. -- Location nearest neighbor query scheme in edge computing based on differential privacy. -- Open Research Challenges for Private Advertising Systems under Local Differential Privacy. -- Industry-Specific Vulnerability Assessment. -- Blockchain-Driven Medical Data Shamir Threshold Encryption with Attribute-Based Access Control Scheme. -- Smart Contracts Vulnerability Detection Using Transformers. -- Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform. -- More Than Just a Random Number Generator! Unveiling the Security and Privacy Risks of Mobile OTP Authenticator Apps. -- Synthetic Data Generation: Limits and Improvement of Avatar Data. -- A Lightweight Detection of Sequential Patterns in File System Events During Ransomware Attacks. -- Detection and Mitigation of Backdoor Attacks on x-Apps. -- Cohesive database neighborhoods for differential privacy: mapping relational databases to RDF. -- i-Right: Identifying and classifying GDPR user rights in fitness tracker and smart home privacy policie. -- AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset. -- R-CONV: An Analytical Approach for Efficient Data Reconstruction via Convolutional Gradients. -- Privacy Preserving Behavioral Anomaly Detection in Dynamic Graphs for Card Transactions. -- Online Safety and Wellbeing through AI. -- DisCo-FEND: Social Context Veracity Dissemination Consistency-Guided Case Reasoning for Few-Shot Fake News Detection. -- NLWM: a Robust, Efficient and High-quality Watermark for Large Language Models. -- Improving the Robustness of Rumor Detection Models with Metadata-Augmented Evasive Rumor Datasets. -- Rumor Alteration for Improving Rumor Generation. -- Generating Effective Answers to People?s Everyday Cybersecurity Questions: An Initial Study. -- Propaganda to Hate: A Multimodal Analysis of Arabic Memes with Multi-Agent LLMs. -- Did You Tell a Deadly Lie? Evaluating Large Language Models for Health Misinformation Identification. -- Native vs Non-Native Language Prompting: A Comparative Analysis. -- DisFact: Fact-Checking Disaster Claims. -- Web Technologies. -- Multi-Perspective Conformance Checking For Email-driven Processes. -- Progressive Server-Side Rendering with Suspendable Web Templates. -- HMSC-LLMs: A Hierarchical Multi-Agent Service Composition Method Based on Large Language Models. -- Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism. -- WNSWE: Web-based Network Simulator for Web Engineering Education. 330 $aThis five-volume set LNCS 15436 -15440 constitutes the proceedings of the 25th International Conference on Web Information Systems Engineering, WISE 2024, held in Doha, Qatar, in December 2024. The 110 full papers and 55 short papers were presented in these proceedings were carefully reviewed and selected from 368 submissions. The papers have been organized in the following topical sections as follows: Part I : Information Retrieval and Text Processing; Text and Sentiment Analysis; Data Analysis and Optimisation; Query Processing and Information Extraction; Knowledge and Data Management. Part II: Social Media and News Analysis; Graph Machine Learning on Web and Social; Trustworthy Machine Learning; and Graph Data Management. Part III: Recommendation Systems; Web Systems and Architectures; and Humans and Web Security. Part IV: Learning and Optimization; Large Language Models and their Applications; and AI Applications. Part V: Security, Privacy and Trust; Online Safety and Wellbeing through AI; and Web Technologies. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15440 606 $aInformation technology$xManagement 606 $aComputer Application in Administrative Data Processing 615 0$aInformation technology$xManagement. 615 14$aComputer Application in Administrative Data Processing. 676 $a005.3 700 $aBarhamgi$b Mahmoud$01782618 701 $aWang$b Hua$0851626 701 $aWang$b Xin$0847441 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996630871903316 996 $aWeb Information Systems Engineering ? WISE 2024$94309023 997 $aUNISA