期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
“共名”时代婚外恋情的范本——《在悬崖上》重读
1
作者 刘绍信 《北方论丛》 2002年第4期90-92,共3页
小说的叙事倾向体现了“共名”时代的文化特征 ,其伦理教化的色彩 ,对集体主义价值观念的单纯肯定 ,体现了作者对婚姻的理性态度。
关键词 叙述者 女性 情感 《在悬崖上》“共名”时代 婚外恋情
下载PDF
从丑小鸭的生存策略到丑小鸭的“共名”情结
2
作者 吕学琴 《六盘水师范高等专科学校学报》 2010年第2期34-37,共4页
安徒生的《丑小鸭》详尽地展示了人性的顽强,赋予了我们克服人性弱点的勇气。在命运的沉浮起落中,它于悲情中升腾崇高,于平庸中发掘奇特,于坎坷中蕴含品性,是人们追求真理、理想"光荣的荆棘路"的人生写照,是世界上奋斗者的&qu... 安徒生的《丑小鸭》详尽地展示了人性的顽强,赋予了我们克服人性弱点的勇气。在命运的沉浮起落中,它于悲情中升腾崇高,于平庸中发掘奇特,于坎坷中蕴含品性,是人们追求真理、理想"光荣的荆棘路"的人生写照,是世界上奋斗者的"共名"词,解读这一形象,从丑小鸭的生存策略到所引发的"共名"现象,给我们提供了一个人生奋斗的现实参照原型。 展开更多
关键词 “共名”情结 崇高 奇特 品性
下载PDF
“缺失美学”:“共名”时代的派生物——大后方纪实性故事片美学观
3
作者 安燕 《当代电影》 CSSCI 北大核心 2011年第8期66-69,共4页
大后方故事片创作在纪实性策略上呈现出两种明显倾向:一是纪实语段以贴附和插入的形式进入故事片,二是纪实化作为美学风格的确立。从叙事传统、战时创作语境、话剧影响、新现实主义的要求等方面对其美学面貌进行归因分析。指明其充满单... 大后方故事片创作在纪实性策略上呈现出两种明显倾向:一是纪实语段以贴附和插入的形式进入故事片,二是纪实化作为美学风格的确立。从叙事传统、战时创作语境、话剧影响、新现实主义的要求等方面对其美学面貌进行归因分析。指明其充满单色的力的美作为一种"缺失美学",体现出鲜明的"共名"特征。大后方电影的"共名"特征在于所有创作都统摄在战争现实这一宏观题材背景和战争文化这一"共名"状态之下,成为对现实政治起作用的有力的东西。 展开更多
关键词 大后方纪实性故事片 美学面貌 “缺失美学” “共名”
原文传递
论《野草》名实空间的文化意义 被引量:2
4
作者 吴翔宇 《河北科技大学学报(社会科学版)》 2011年第1期74-78,共5页
在《野草》中,"名"如"鬼打墙"一般弥散成"无物之阵"。"无主名杀人团"和"有主名假象"导致了"实"的本质被遮蔽和当下行动的缺席。通过"无名"身份与"共名&qu... 在《野草》中,"名"如"鬼打墙"一般弥散成"无物之阵"。"无主名杀人团"和"有主名假象"导致了"实"的本质被遮蔽和当下行动的缺席。通过"无名"身份与"共名"效应的比照、"有名"身份与"正名"困境的反讽等叙事方式的建构,"实"的本质被还原。鲁迅秉持弃"名"崇"实"的现世情怀,以"执着现在"为内核,强调当下之行,其文学史意义是不容忽略的。 展开更多
关键词 《野草》 实观 “无名” “有名” “共名” “正名”
下载PDF
浅析20世纪90年代以来我国国家话语的荧屏表达策略
5
作者 陶冶 《浙江传媒学院学报》 2012年第5期55-61,共7页
20世纪90年代,电视成为最具普及意义的大众媒体,而国家文化借助电视荧屏实现国家话语的表达成为建构国家形象的必然,也诞生了一系列表达国家文化的经典文本。文章通过民族性、家国同构、母体置换以及"共名"关系等四个角度分... 20世纪90年代,电视成为最具普及意义的大众媒体,而国家文化借助电视荧屏实现国家话语的表达成为建构国家形象的必然,也诞生了一系列表达国家文化的经典文本。文章通过民族性、家国同构、母体置换以及"共名"关系等四个角度分析国家文化在与电视这一媒介形式耦合后所进行的种种表达策略,进而梳理了这种表达策略演进的脉络。 展开更多
关键词 国家话语 荧屏表达 民族性 家国同构 母体置换 “共名”
下载PDF
On the Problems and Strategies in Chinese-English Translation of Public Signs in Scenic Resorts
6
作者 相燕 《International English Education Research》 2015年第10期112-113,共2页
More and more foreigners come to China on business or for a tour, which makes the translation of public signs important and necessary. Focused on the public sign in scenic resorts, this article briefly gives a short p... More and more foreigners come to China on business or for a tour, which makes the translation of public signs important and necessary. Focused on the public sign in scenic resorts, this article briefly gives a short presentation for the present study status; and the errors in the translation of signs are set forth from the viewpoint of three rules of Skopostheorie. Some suggestions are proposed to make a further study of public signs with a wide scope of examples. 展开更多
关键词 Scenic Resorts Public Signs Skopostheorie
下载PDF
Identity-Based Proxy Verifiably Encrypted Signature Scheme 被引量:2
7
作者 Liu Jianhua Liu Jianwei Qiu Xiufeng 《China Communications》 SCIE CSCD 2012年第11期137-149,共13页
A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages o... A Verifiably Encrypted Signature (VES) plays an essential role in the construction of a fair data exchange. The paper proposes an Identity-based Proxy Verifiably Encrypted Signature (IPVES) to combine the advantages of a proxy signature and a VES in order to delegate the signing capability of the VES of an entity called the original signer to another entity, called the proxy signer. In this IPVES scheme, the original signer delegates his/her signing capability to the proxy signer. The proxy signer issues a signature by using a proxy signing key, encrypts the signature under a designated public key, and subsequently convinces a verifier that the resulting ciphertext contains such a signature. We prove that the proposed IPVES scheme is secure in a random oracle model under the computational Diffie-Hellman assumption. 展开更多
关键词 digital signature proxy signature random oracle model information security
下载PDF
Applying two channels to vector space secret sharing based multi-signature scheme 被引量:1
8
作者 肖清华 平玲娣 +1 位作者 陈小平 潘雪增 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第1期56-62,共7页
Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computat... Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of partici- pants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme. 展开更多
关键词 Vector space secret sharing MULTI-SIGNATURE Discrete logarithm Chinese remainder theorem
下载PDF
Public Deliberation in an Age of Visibility: Political Communication Analysis in Mexico
9
作者 Gabriel A. Corral Velazquez 《Journal of Literature and Art Studies》 2016年第8期937-950,共14页
This paper reviews the importance of visibility in public deliberation in the theoretical construction of political communication. Political communication is the area that study social and political interactions of ac... This paper reviews the importance of visibility in public deliberation in the theoretical construction of political communication. Political communication is the area that study social and political interactions of actors through discourses and practices within the public sphere. The social and political actors manage their public appearances in an exercise of visibility, allowing deliberation of public affairs. In recent years, Mexico has been a relevant case of study for understanding the opening of media into the public discussion of governmental affairs. As an example, this paper presents an analysis of public deliberation in the city of Quer6taro, Mexico. This study analyses political participation and openness of media, based on the concepts visibility, public sphere and citizenship. The analysis was built on the idea that the press concentrates most of the issues of public interest and that it reflects actors and arguments given for deliberation. In a qualitative approximation, we analyzed the discourses published in four journals and developed an analytical framework that illustrates the levels of access and visibility of a variety of political and social actors. This exercise demonstrates the importance of the concept of visibility in public deliberation and the media as managers in the current configuration of political communication. 展开更多
关键词 political communication public sphere DEMOCRATIZATION Quer6taro
下载PDF
Recognition of Chinese Organization Name Using Co-training
10
作者 柯逍 李绍滋 陈锦秀 《Journal of Donghua University(English Edition)》 EI CAS 2010年第2期193-198,共6页
Chinese organization name recognition is hard and important in natural language processing. To reduce tagged corpus and use untagged corpus,we presented combing Co-training with support vector machines (SVM) and condi... Chinese organization name recognition is hard and important in natural language processing. To reduce tagged corpus and use untagged corpus,we presented combing Co-training with support vector machines (SVM) and conditional random fields (CRF) to improve recognition results. Based on principles of uncorrelated and compatible,we constructed different classifiers from different views within SVM or CRF alone and combination of these two models. And we modified a heuristic untagged samples selection algorithm to reduce time complexity. Experimental results show that under the same tagged data,Co-training has 10% F-measure higher than using SVM or CRF alone; under the same F-measure,Co-training saves at most 70% of tagged data to achieve the same performance. 展开更多
关键词 CO-TRAINING named entity recognition conditional random fields CRF) support vector machines (SVM)
下载PDF
An Efficient Proactive RSA Scheme for Ad Hoc Networks
11
作者 张瑞山 陈克非 《Journal of Donghua University(English Edition)》 EI CAS 2007年第1期46-51,共6页
A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The sc... A proactive threshold signature scheme is very important to tolerate mobile attack in mobile ad hoc networks. In this paper, we propose an efficient proactive threshold RSA signature scheme for ad hoc networks. The scheme consists of three protocols: the initial secret share distribution protocol, the signature generation protocol and the secret share refreshing protocol. Our scheme has three advantages. First, the signature generation protocol is efficient. Second, the signature generation protocol is resilient. Third, the share refreshing protocol is efficient. 展开更多
关键词 CRYPTOGRAPHY Threshold signature Proactivesecret sharing RSA Provable security.
下载PDF
On Measuring the Privacy of Anonymized Data in Multiparty Network Data Sharing 被引量:1
12
作者 陈晓云 苏玉洁 +2 位作者 唐晓晟 黄小红 马严 《China Communications》 SCIE CSCD 2013年第5期120-127,共8页
This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the sce... This paper aims to find a practical way of quantitatively representing the privacy of network data. A method of quantifying the privacy of network data anonymization based on similarity distance and entropy in the scenario involving multiparty network data sharing with Trusted Third Party (TTP) is proposed. Simulations are then conducted using network data from different sources, and show that the measurement indicators defined in this paper can adequately quantify the privacy of the network. In particular, it can indicate the effect of the auxiliary information of the adversary on privacy. 展开更多
关键词 privacy network data anonymization multiparty network data sharing
下载PDF
"I Want to Be a Captain of My Own Heart"——English Names and Identity Construction by English Majors in a Comprehensive University 被引量:4
13
作者 高一虹 修立梅 匡伟 《Chinese Journal of Applied Linguistics》 2010年第2期3-17,125,共16页
本文从社会建构主义的角度,探索中国英语学习者的英语名字与认同建构。研究对象是一所综合大学的16名英语专业学生。对学习日记和访谈材料的分析显示,英语名字起着延展直接经验、凝化理想自我或"想像认同"的作用。在使用英语... 本文从社会建构主义的角度,探索中国英语学习者的英语名字与认同建构。研究对象是一所综合大学的16名英语专业学生。对学习日记和访谈材料的分析显示,英语名字起着延展直接经验、凝化理想自我或"想像认同"的作用。在使用英语名字参与活动的过程中,相应的认同也被具体化,成为现实的一部分;英语名字将"想像"与"现实"连结起来。新的名字拥有者不再仅仅是语言的学习者,而且也是多元话语和多元文化认同的创造者。 展开更多
关键词 English learning English names identity imagined community REIFICATION learning journal
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部