The authors gratefully acknowledge the research support of National Social Science Fund Youth Project(CN)(No.19CTQ021).
In order to explore the evolution law of coopetition relationship among Mcommerce information service(MIS)subjects and further reveal the allocation mechanism of information resources,the research extends Lotka-Volter...
Ownership/private property and property inheritance are concepts well-established and constitutionally protected in our modern societies.Nevertheless,numerous provisions in the national legal framework enable the stat...
This paper lays out the morphosyntactic structures of existential,locative and possessive constructions in Amharic.Amharic belongs to South Ethio-Semitic language subfamily.It is natively spoken in the Amhara region a...
This article determined the cause of social suffering by using set theory and also demonstrated that the cause of any suffering is the emptiness quality of Yang and Ying of the phenomena or“ownership”view and have b...
The three layers of narration is one of the most outstanding writing techniques Byatt has applied in her masterpiece Possession.According to the theories about female lineage and also mother-daughter relationships put...
the National Natural Science Foundation of China under projects 61772150 and 61862012;the Guangxi Key R&D Program under project AB17195025;the Guangxi Natural Science Foundation under grants 2018GXNSFDA281054 and 2018GXNSFAA281232;the National Cryptography Development Fund of China under project MMJJ20170217;the Guangxi Young Teachers’ Basic Ability Improvement Program under Grant 2018KY0194;and the open program of Guangxi Key Laboratory of Cryptography and Information Security under projects GCIS201621 and GCIS201702.
The remote data integrity auditing technology can guarantee the integrity of outsourced data in clouds. Users can periodically run an integrity auditing protocol by interacting with cloud server, to verify the latest ...
supported by the National Key Research and Development Program of China(No.2016YFB0800402);the National Natural Science Foundation of China(No.U1405254,No.U1536207)
Existing dynamic data possession verification schemes not only suffer from low efficiency of rebalancing its Merkle Hash tree(MHT) when executing data updating, but also lack effective mechanism to verify multi-versio...
In section 1, I will describe how moral responsibility requires normative competence. In section 2, I will introduce an influential social psychology experiment and consider one of its philosophical interpretations, s...
From the perspective of feminism, by analyzing single intellectual women's living states in enclosed personal spaces, andcomparing their different spatial changes triggered by external intrusions, this essay intends t...