default search action
The Computer Journal, Volume 63
Volume 63, Number 1, January 2020
- Shiying Wang, Nan Zhao:
The Two-Good-Neighbor Connectivity and Diagnosability of the Augmented Three-Ary n-Cubes. 1-15 - Xueli Sun, Shuming Zhou, Mengjie Lv, Jiafei Liu, Guanqin Lian:
Intermittent Fault Diagnosability of Some General Regular Networks. 16-24 - Yuan Lin, Zhongzhi Zhang:
Effects of Edge Centrality on Random Walks on Graphs. 25-40 - Lixiao Zheng, Shuai Ma, Yuanyang Wang, Gang Lin:
String Generation for Testing Regular Expressions. 41-65 - Juan Li, Yanmin Zhu, Jiadi Yu:
Redundancy-Aware and Budget-Feasible Incentive Mechanism in Crowd Sensing. 66-79 - Huiqing Liu, Xiaolan Hu, Shan Gao:
The g-Good-Neighbor Conditional Diagnosability of Locally Exchanged Twisted Cubes. 80-90 - Lydia Wahid Rizkallah, Mona F. Ahmed, Nevin M. Darwish:
SMT-LH: A New Satisfiability Modulo Theory-Based Technique for Solving Vehicle Routing Problem with Time Window Constraints. 91-104 - MohammadSadegh Mohagheghi, Jaber Karimpour, Ayaz Isazadeh:
Prioritizing Methods to Accelerate Probabilistic Model Checking of Discrete-Time Markov Models. 105-122 - Xian-Shu Li, Su-Kyung Yoon, Jeong-Geun Kim, Bernd Burgstaller, Shin-Dug Kim:
Algorithm-Switching-Based Last-Level Cache Structure with Hybrid Main Memory Architecture. 123-136 - Xiao-Yu Wang, Yu-Feng Liu, Kang Zhang:
A Graph Grammar Approach to the Design and Validation of Floor Plans. 137-150 - Vasamsetti Srinivas, Ch Santhirani:
Optimization-Based Support Vector Neural network for Speaker Recognition. 151-167
Volume 63, Number 2, February 2020
- Ajay Amrit Raj, Dejey:
Adaptive Neuro-Fuzzy Inference System-based Nonlinear Equalizer for CO-OFDM Systems. 169-178 - Karl J. O'Dwyer, Eoin Creedon, Mark Purcell, David Malone:
Power Saving Proxies for Web Servers. 179-192 - Narayanan Ganesh:
Performance Evaluation of Depth Adjustment and Void Aware Pressure Routing (DA-VAPR) Protocol for Underwater Wireless Sensor Networks. 193-202 - Mani Zarei:
Traffic-Centric Mesoscopic Analysis of Connectivity in VANETs. 203-219 - Mehmet Hakan Karaata, Anwar Nais AlMutairi:
A Snap-Stabilizing m-wave Algorithm for Tree Networks. 220-238 - S. Thanga Revathi, N. Ramaraj, Chithra Selvaraj:
Tracy-Singh Product and Genetic Whale Optimization Algorithm for Retrievable Data Perturbation for Privacy Preserved Data Publishing in Cloud Computing. 239-253 - Mohammed Haddad, Colette Johnen, Sven Köhler:
Polynomial Silent Self-Stabilizing p-Star Decomposition†. 253-266
- Avinash Ratre:
Stochastic Gradient Descent-Whale Optimization Algorithm-Based Deep Convolutional Neural Network To Crowd Emotion Understanding. 267-282 - Hong-Yi Chang, Zih-Huan Hang, Yih-Jou Tzang:
MNVPCS: Multinode Virtual-Point-Based Charging Scheme to Prolong the Lifetime of Wireless Rechargeable Sensor Networks. 283-294 - Arslan Qadeer, Asad Waqar Malik, Anis Ur Rahman, Mian Muhammad Hamayun, Arsalan Ahmad:
Virtual Infrastructure Orchestration For Cloud Service Deployment. 295-307 - J. Thrisul Kumar, Y. Mallikarjuna Reddy, B. Prabhakara Rao:
WHDA-FCM: Wolf Hunting-Based Dragonfly With Fuzzy C-Mean Clustering For Change Detection In SAR Images. 308-321 - P. G. Om Prakash, A. Jaya:
WS-BD-Based Two-Level Match: Interesting Sequential Patterns and Bayesian Fuzzy Clustering for Predicting the Web Pages from Weblogs. 322-336
Volume 63, Number 3, March 2020
- Pavithra Latha Kumaresan, T. Sree Sharmila:
An Improved Seed Point Selection-Based Unsupervised Color Clustering for Content-Based Image Retrieval Application. 337-350 - Rim Afdhal, Ridha Ejbali, Mourad Zaied:
Emotion Recognition by a Hybrid System Based on the Features of Distances and the Shapes of the Wrinkles. 351-363 - Bikash Kanti Sarkar:
A Two-Step Knowledge Extraction Framework for Improving Disease Diagnosis. 364-382 - Syrine Neffati, Khaoula Ben Abdellafou, Okba Taouali, Kais Bouzrara:
Enhanced SVM-KPCA Method for Brain MR Image Classification. 383-394 - L. B. Shyamasundar, Prathuri Jhansi Rani:
A Multiple-Layer Machine Learning Architecture for Improved Accuracy in Sentiment Analysis. 395-409 - Guangfeng Liu, Xianying Huang, Xiaoyang Liu, Anzhi Yang:
A Novel Aspect-based Sentiment Analysis Network Model Based on Multilingual Hierarchy in Online Social Network. 410-424 - Negin Manshouri, Temel Kayikçioglu:
A Comprehensive Analysis of 2D&3D Video Watching of EEG Signals by Increasing PLSR and SVM Classification Results. 425-434 - Mohsen Salehi, Jafar Razmara, Shahriar Lotfi:
A Novel Data Mining on Breast Cancer Survivability Using MLP Ensemble Learners. 435-447 - Amin Mahmoudi, Mohd Ridzwan Yaakub, Azuraliza Abu Bakar:
A New Real-Time Link Prediction Method Based on User Community Changes in Online Social Networks. 448-459 - Faming Gong, Hanbing Yue, Xiangbing Yuan, Wenjuan Gong, Tao Song:
Discriminative Correlation Filter for Long-Time Tracking. 460-468 - Na Su, Shujuan Ji, Jimin Liu:
Real-Time Topic Detection with Dynamic Windows. 469-478 - Wadood Abdul, Ohoud Nafea, Sanaa Ghouzali:
Combining Watermarking and Hyper-Chaotic Map to Enhance the Security of Stored Biometric Templates. 479-493
Volume 63, Number 4, April 2020
- Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang:
On the Security of LWE Cryptosystem against Subversion Attacks. 495-507 - Yanwei Zhou, Bo Yang, Tao Wang, Zhe Xia, Hong-xia Hou:
Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings. 508-524 - Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. 525-535 - Yangguang Tian, Yingjiu Li, Robert H. Deng, Nan Li, Guomin Yang, Zheng Yang:
A New Construction for Linkable Secret Handshake. 536-548 - Hao Wang, Kaiju Li:
Resistance of IID Noise in Differentially Private Schemes for Trajectory Publishing. 549-566 - Jiafu Jiang, Linyu Tang, Ke Gu, Weijia Jia:
Secure Computing Resource Allocation Framework For Open Fog Computing. 567-592 - Latifa Er-Rajy, My Ahmed El Kiram, Mohamed El Ghazouani:
New Security Risk Value Estimate Method for Android Applications. 593-603 - Leyli Javid Khayati, Erkay Savas, Halit Alptekin:
Intrusion Detection Over Encrypted Network Data. 604-619 - Xuecheng Ma, Dongdai Lin:
Server-aided Revocable IBE with Identity Reuse. 620-632 - Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications. 633-647 - Meijuan Huang, Bo Yang, Mingwu Zhang, Lina Zhang, Hong-xia Hou:
Updatable Lossy Trapdoor Functions Under Consecutive Leakage. 648-656
Volume 63, Number 5, May 2020
- Eleonora D'Andrea, Beatrice Lazzerini, Francesco Marcelloni:
A System for Multi-Passenger Urban Ridesharing Recommendations with Ordered Multiple Stops. 657-687 - Wenjun Shi, Jigang Wu, Guiyuan Jiang, Siew-Kei Lam:
Multiple-Choice Hardware/Software Partitioning for Tree Task-Graph on MPSoC. 688-700 - Sérgio L. S. Mergen:
UnfairDuelMerge: Merging with Even Fewer Moves. 701-708 - Wallace Manzano, Valdemar Vicente Graciano Neto, Elisa Yumi Nakagawa:
Dynamic-SoS: An Approach for the Simulation of Systems-of-Systems Dynamic Architectures. 709-731 - Viviana Yarel Rosales-Morales, Laura Nely Sánchez-Morales, Giner Alor-Hernández, Jorge Luis García-Alcaraz, José Luis Sánchez-Cervantes, Lisbeth Rodríguez-Mazahua:
ImagIngDev: A New Approach for Developing Automatic Cross-Platform Mobile Applications Using Image Processing Techniques. 732-757 - Matthew Leeke:
Simultaneous Fault Models for the Generation and Location of Efficient Error Detection Mechanisms. 758-773 - Alan Burns, Ian J. Hayes, Cliff B. Jones:
Deriving Specifications of Control Programs for Cyber Physical Systems. 774-790 - Muhammed Jassem Al-Muhammed:
Lookback-Guess-Next Optimizer: Feedback-Guided Random Search Technique with Biased Mapping for Solving Unconstrained Optimization Problems. 791-816
Volume 63, Number 6, June 2020
- Shounak Rushikesh Sugave, Balaso Jagdale, Domenico Rosaci:
Monarch-EWA: Monarch-Earthworm-Based Secure Routing Protocol in IoT. 817-831 - Muthumanikandan Vanamoorthy, Valliyammai Chinnaiah:
Congestion-Free Transient Plane (CFTP) Using Bandwidth Sharing During Link Failures in SDN. 832-843 - Jumin Zhao, Liang Zhang, Deng-ao Li:
Multiantenna Receiver Signal Detection in AmBC Based on Cluster Analysis. 844-856 - B. Mathan Kumar, Pushpalakshmi Raman:
An Approach for Image Search and Retrieval by Cluster-Based Indexing of Binary MKSIFT Codes. 857-879 - Lixia Chen, Jian Li, Ruhui Ma, Haibing Guan, Hans-Arno Jacobsen:
Balancing Power And Performance In HPC Clouds. 880-899 - Oswalt Manoj Stanislaus, John Patrick Ananth:
MapReduce and Optimized Deep Network for Rainfall Prediction in Agriculture. 900-912 - T. Mahalakshmi, Alluri Sreenivas, Dimitrios Tzovaras:
Adaptive Filter with Type-2 Fuzzy System and Optimization-Based Kernel Interpolation for Satellite Image Denoising. 913-926 - A. A. Periola, Akintunde A. Alonge, Kingsley A. Ogudo:
Architecture and System Design for Marine Cloud Computing Assets. 927-941 - Jemish V. Maisuria, Saurabh N. Mehta, Ing-Ray Chen:
Bayesian-Based Spectrum Sensing and Optimal Channel Estimation for MAC Layer Protocol in Cognitive Radio Sensor Networks. 942-957 - Muhammad Omer Farooq:
RIoT: A Routing Protocol for the Internet of Things†. 958-973 - Jianqiu Sun, Xingguang Li, Kang Chen, Wei Cui, Ming Chu:
A Novel CMA+DD_LMS Blind Equalization Algorithm for Underwater Acoustic Communication. 974-981
Volume 63, Number 7, July 2020
- Muhammad Asad, Muhammad Asim, Talha Javed, Mirza Omer Beg, Hasan Mujtaba, Sohail Abbas:
DeepDetect: Detection of Distributed Denial of Service Attacks Using Deep Learning. 983-994 - Z. Xu, Lei Cao, Xiliang Chen, Jin-Hee Cho:
Deep Reinforcement Learning with Adaptive Update Target Combination. 995-1003 - Kalthoum Rezgui, Hédia Mhiri:
Towards a Semantic Framework for Lifelong Integrated Competency Management and Development. 1004-1016 - Zhenjun Tang, Lv Chen, Heng Yao, Xianquan Zhang, Chunqiang Yu, Fionn Murtagh:
Video Hashing with DCT and NMF. 1017-1030 - Zongjie Ma, Abdul Sattar, Jun Zhou, Qingliang Chen, Kaile Su:
Dropout with Tabu Strategy for Regularizing Deep Neural Networks. 1031-1038 - Navid Yazdanjue, Mohammad Fathian, Babak Amiri:
Evolutionary Algorithms For k-Anonymity In Social Networks Based On Clustering Approach. 1039-1062 - Muralidhar Pantula, K. S. Kuppusamy:
A Metric to Assess the Readability of Video Closed Captions for the Persons With Low Literacy Skills. 1063-1075 - Tianwen Huang, Fei Jiao:
Study on Data Transfer in Meteorological Forecast of Small and Medium-Sized Cities and Its Application in Zhaoqing City. 1076-1083 - Haijiang Wang, Jingpu Wang, Fuqi Yao, Yongqiang Ma, Lihong Li, Qinke Yang:
Multi-Band Contourlet Transform For Adaptive Remote Sensing Image Denoising. 1084-1098 - Salem Ameen, Sunil Vadera:
Pruning Neural Networks Using Multi-Armed Bandits. 1099-1108 - Iqbal H. Sarker, Alan Colman, Jun Han, A. S. M. Kayes, Paul A. Watters:
CalBehav: A Machine Learning-Based Personalized Calendar Behavioral Model Using Time-Series Smartphone Data. 1109-1123
Volume 63, Number 8, August 2020
- Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen:
Byte2vec: Malware Representation and Feature Selection for Android. 1125-1138 - Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. 1139-1147 - Robab Alyari, Jaber Karimpour, Habib Izadkhah:
Specifying a New Requirement Model for Secure Adaptive Systems. 1148-1167 - María Magdalena Payeras Capellà, Macià Mut Puigserver, Pau Conejero-Alberola, Jordi Castellà-Roca, Llorenç Huguet i Rotger:
Implementation And Evaluation Of The mCityPASS Protocol For Secure And Private Access To Associated Touristic Services. 1168-1193 - Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran:
A Multivariate Blind Ring Signature Scheme. 1194-1202 - Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. 1203-1215 - Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra:
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage. 1216-1230 - Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia, Willi Meier:
Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak. 1231-1246 - Muhua Liu, Ping Zhang:
An Adaptively Secure Functional Encryption for Randomized Functions. 1247-1258 - Xi Jun Lin, Lin Sun, Zhen Yan, Xiaoshuai Zhang, Haipeng Qu, Liqun Chen:
On the Security Of A Certificateless Signcryption With Known Session-Specific Temporary Information Security In The Standard Model. 1259-1262 - Xi Jun Lin, Lin Sun, Haipeng Qu, Kaitai Liang:
Leakage-free ID-Based Signature, Revisited. 1263-1270 - Qianqian Su, Rui Zhang, Rui Xue:
Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud. 1271
Volume 63, Number 9, August 2020
- Sasha Mahdavi Hezavehi, Y. Alimardani, Rouhollah Rahmani:
An Efficient Framework for a Third Party Auditor in Cloud Computing Environments. 1285-1297 - Michal Soucha, Kirill Bogdanov:
Observation Tree Approach: Active Learning Relying on Testing. 1298-1310 - Mei-Mei Gu, Jou-Ming Chang, Rong-Xia Hao:
On Computing Component (Edge) Connectivities of Balanced Hypercubes. 1311-1320 - Zhendong Lei, Shaowei Cai:
NuDist: An Efficient Local Search Algorithm for (Weighted) Partial MaxSAT. 1321-1337 - Chunlin Li, YiHan Zhang, Youlong Luo:
Adaptive Replica Creation and Selection Strategies for Latency-Aware Application in Collaborative Edge-Cloud System. 1338-1354 - Hui Yu, Jiejie Yang, Limei Lin, Yanze Huang, Jin'e Li, Riqing Chen:
{1, 2, 3}-Restricted Connectivity of $(n, k)$-Enhanced Hypercubes. 1355-1371 - Zuwen Luo, Liqiong Xu:
A Kind Of Conditional Vertex Connectivity Of Cayley Graphs Generated By Wheel Graphs. 1372-1384 - Yi Qi, Yuze Dong, Zhongzhi Zhang, Zhang Zhang:
Hitting Times for Random Walks on Sierpiński Graphs and Hierarchical Graphs. 1385-1396 - Guanqin Lian, Shuming Zhou, Sun-Yuan Hsieh, Gaolin Chen, Jiafei Liu, Zhendong Gu:
Characterization of Diagnosabilities on the Bounded PMC Model. 1397-1405 - Mei-Mei Gu, Rong-Xia Hao, Eddie Cheng:
Note on Applications of Linearly Many Faults. 1406-1416 - Natarajan Meghanathan:
Relative Assortativity Index: A Quantitative Metric to Assess the Impact of Link Prediction Techniques on Assortativity of Complex Networks. 1417-1437 - Yunxia Ren, Shiying Wang:
Diagnosability of the Cayley Graph Generated by Complete Graph with Missing Edges under the MM$^{\ast }$ Model. 1438-1447
Volume 63, Number 10, October 2020
- Binjie He, Dong Zhang, Chang Zhao:
Hidden Markov Model-based Load Balancing in Data Center Networks. 1449-1462 - Jianhui Zhang, Tianhao Zhang, Feilong Jiang, Bei Zhao:
Who Face Me? Neighbor Identification With LED Camera Communication. 1463-1478 - Lata Jaywant Sankpal, Suhas Haribhau Patil:
Rider-Rank Algorithm-Based Feature Extraction for Re-ranking the Webpages in the Search Engine. 1479-1489 - Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. 1490-1499 - Parampreet Kaur, Ashima Singh, Sukhpal Singh Gill:
RGIM: An Integrated Approach to Improve QoS in AODV, DSR and DSDV Routing Protocols for FANETS Using the Chain Mobility Model. 1500-1512 - Balaji Coimbatore GaneshSankar, Anu Monisha A, Krishnan Murugan:
A Novel Hybrid UE Selection Scheme for Efficient Data Offloading Using D2D Communication. 1513-1523 - Bin Yu, Xiaofeng Li, He Zhao:
Virtual Block Group: A Scalable Blockchain Model with Partial Node Storage and Distributed Hash Table. 1524-1536 - Rola El Osta, Maryline Chetto, Hussein El Ghor:
Optimal Slack Stealing Servicing for Real-Time Energy Harvesting Systems. 1537-1546 - Bechir Alaya, Rehanullah Khan:
QoS Enhancement In VoD Systems: Load Management And Replication Policy Optimization Perspectives. 1547-1563 - Lili Jiang, Xiaolin Chang, Runkai Yang, Jelena V. Misic, Vojislav B. Misic:
Model-Based Comparison of Cloud-Edge Computing Resource Allocation Policies. 1564-1583 - Haishan Chen, Junying Yuan, Wien Hong, Jiangqun Ni, Tung-Shou Chen:
On Performance Improvement Of Reversible Data Hiding With Contrast Enhancement. 1584-1596 - Chao-Chao Wang, Wan-Liang Wang, Xin-Wei Yao:
Interference and Coverage Modeling for Indoor Terahertz Communications with Beamforming Antennas. 1597-1606
Volume 63, Number 11, November 2020
- Longji Huang, Jianbin Huang, Yueshen Xu, Zhiqiang Zhao, Zhenghao Zhang:
Driving Route Recommendation With Profit Maximization in Ride Sharing. 1607-1623 - Bam Bahadur Sinha, R. Dhanalakshmi:
Building a Fuzzy Logic-Based Artificial Neural Network to Uplift Recommendation Accuracy. 1624-1632 - Yan Wang, Jiantao Zhou, Xinyuan Li, Xiaoyu Song:
Effective User Preference Clustering in Web Service Applications. 1633-1643 - Harkiran Kaur, Sandeep K. Sood:
A Smart Disaster Management Framework For Wildfire Detection and Prediction. 1644-1657 - María José Castro Bleda, Salvador España Boquera, Joan Pastor-Pellicer, Francisco Zamora-Martínez:
The NoisyOffice Database: A Corpus To Train Supervised Machine Learning Filters For Image Processing. 1658-1667 - Bojie Shen, Md. Saiful Islam, David Taniar:
Direction-based Spatial Skyline for Retrieving Arbitrary-Shaped Surrounding Objects. 1668-1688 - Xiaoyang Liu, Daobing He:
Information Propagation and Public Opinion Evolution Model Based on Artificial Neural Network in Online Social Network. 1689-1703 - Amandeep Kaur, Sandeep K. Sood:
Artificial Intelligence-Based Model For Drought Prediction and Forecasting. 1704-1712 - Ian Kenny:
Hydrographical Flow Modelling of the River Severn Using Particle Swarm Optimization. 1713-1726 - Abhishek Kashyap, B. Suresh, Hariom Gupta:
Detection of splicing forgery using differential evolution and wavelet decomposition. 1727-1737 - C. A. Ghuge, V. Chandra Prakash, Sachin Ruikar:
Weighed query-specific distance and hybrid NARX neural network for video object retrieval. 1738-1755 - Fatih Aydin, Zafer Aslan:
The Construction of a Majority-Voting Ensemble Based on the Interrelation and Amount of Information of Features. 1756-1774 - Yong Fang, Yue Yang, Cheng Huang:
EmailDetective: An Email Authorship Identification And Verification Model. 1775-1787
Volume 63, Number 12, December 2020
- Lin Jiao, Yongqiang Li, Yonglin Hao:
A Guess-And-Determine Attack On SNOW-V Stream Cipher. 1789-1812 - Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian:
New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT. 1813-1825 - Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. 1826-1834 - Ge Wu, Zhen Zhao, Fuchun Guo, Willy Susilo, Futai Zhang:
On the General Construction of Tightly Secure Identity-Based Signature Schemes. 1835-1848 - Sha Ma, Qiong Huang:
A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search. 1849-1858 - Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. 1859-1870 - Cheng-Jun Lin, Rui Xue, Shao-Jun Yang, Xinyi Huang, Shimin Li:
Linearly Homomorphic Signatures from Lattices. 1871-1885 - Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. 1886-1903 - Janaka Alawatugoda:
Public-Key Encryption In The Standard Model Against Strong Leakage Adversary. 1904-1914 - Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin:
The Notion of Transparency Order, Revisited. 1915-1938
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.