Browse Results

Showing 11,851 through 11,875 of 11,913 results

Government Anti-Corruption Strategies: A Cross-Cultural Perspective

by Yahong Zhang Cecilia Lavena

This book is designed to help students, researchers, and practitioners understand public corruption and anti-corruption practices from an international perspective. It describes the problems governments face in dealing with public corruption, outlines strategies that have and have not been implemented by the government, and explains why some countries have achieved great success with handling corruption and why others still struggle to do so. It contains useful knowledge about public corruption and strategic approaches to preventing, reducing, and combating corruption.

Game Theory for Wireless Communications and Networking (Wireless Networks And Mobile Communications Ser.)

by Yan Zhang Mohsen Guizani

This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications. Describing how to employ game theory in infrastructure-based wireless networks and multihop networks to reduce power consumption, it facilitates quick and easy reference to related optimization and algorithm methodologies. The book explains how to apply the game theoretic model to address resource allocation, congestion control, attacks, routing, energy management, packet forwarding, and MAC.

Application of Big Data, Blockchain, and Internet of Things for Education Informatization: Third EAI International Conference, BigIoT-EDU 2023, August 29-31, 2023, Liuzhou, China, Proceedings, Part II (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #581)

by Yinjun Zhang Nazir Shah

The five-volume set LNICST 580-584 constitutes the proceedings of the Third EAI International Conference on Application of Big Data, Blockchain, and Internet of Things for Education Informatization, BigIoT-EDU 2023, held in Liuzhou, China, during August 29–31, 2023. The 272 full papers presented in these proceedings were carefully reviewed and selected from 718 submissions. With a primary focus on research fields such as Digitization of education, Smart classrooms and Massive Online Open Courses (MOOCs), these papers are organized in the following topical sections across the five volumes: Part I: Application of data mining in smart education; Application of intelligent algorithms in English teaching. Part II: Application of decision tree algorithm in intelligent management system of universities; Research on the application of Big data in smart teaching. Part III: Exploration of the application of computer-aided technology in intelligent translation; Application of neural network algorithms in intelligent teaching; Application of artificial intelligence algorithms in the field of smart education. Part IV: Research on smart teaching in deep learning; Research and application of recommendation algorithms in personalized intelligent education; Application of cloud computing in intelligent teaching resource library; Application research of computer-aided online intelligent teaching. Part V: Application and practice of new media in smart teaching; Application of clustering algorithm in intelligent education resource library; Application of association rule algorithm in intelligent education system.

Differential Antennas: Theory and Practice

by Yueping Zhang

A comprehensive introduction to the theory and practice of differential antennas The first antennas ever created were differential antennas, in the dipole and loop constructions, before the subsequent creation of the single-ended or monopole antenna. Dozens of basic antenna configurations have been invented since then, the majority of them differential. The theory and design of differential antennas therefore has an impact on a huge range of fields which make use of electromagnetic waves. Differential Antennas contains a thorough, comprehensive overview of these antennas, their theory, and their practical applications. It details the relationship between differential and single-ended antennas, which may act as tools for determining the properties of one when the other is known. This book offers an analysis of the role differential antennas play in wireless communication and sensing. Overall, it stands as an essential contribution to a key area of communications technology. Differential Antennas readers will also find: Chapters covering topics including microstrip antennas, shorted patch antennas, grid array antennas, and other designs Tables and figures illustrating key data, antenna structures, and more Instructions for measuring differential antennas for characterization and specification purposes Differential Antennas is ideal for senior and graduate level students, researchers, and radio frequency engineers.

3D Computer Vision: Foundations and Advanced Methodologies

by Yu-Jin Zhang

This book offers a comprehensive and unbiased introduction to 3D Computer Vision, ranging from its foundations and essential principles to advanced methodologies and technologies. Divided into 11 chapters, it covers the main workflow of 3D computer vision as follows: camera imaging and calibration models; various modes and means of 3D image acquisition; binocular, trinocular and multi-ocular stereo vision matching techniques; monocular single-image and multi-image scene restoration methods; point cloud data processing and modeling; simultaneous location and mapping; generalized image and scene matching; and understanding spatial-temporal behavior. Each topic is addressed in a uniform manner: the dedicated chapter first covers the essential concepts and basic principles before presenting a selection of typical, specific methods and practical techniques. In turn, it introduces readers to the most important recent developments, especially in the last three years. This approachallows them to quickly familiarize themselves with the subject, implement the techniques discussed, and design or improve their own methods for specific applications. The book can be used as a textbook for graduate courses in computer science, computer engineering, electrical engineering, data science, and related subjects. It also offers a valuable reference guide for researchers and practitioners alike.

Berry Fruit: Value-Added Products for Health Promotion (ISSN)

by Yanyun Zhao

Valued for its unique flavors, textures, and colors, berry fruit is a rapidly-growing crop that provides significant health benefits due to its many bioactive components. Berry Fruit: Value-Added Products for Health Promotion provides an understanding of the functional chemicals, shelf-life and microbial safety concerns, and applications in the food industry. Written by international experts, each chapter presents scientific background, research results, critical reviews of relevant issues, and case studies. Chapters include worldwide production information, bioactive food constituents and their potential health benefits, methods of enhancing food quality, and potential uses of berry processing by-products.

The Ageless Generation: How Advances in Biomedicine Will Transform the Global Economy

by Alex Zhavoronkov

Over the past 20 years, the biomedical research community has been delivering hundreds of breakthroughs expected to extend human lifespan beyond thresholds imaginable today. However, much of this research has not yet been adopted into clinical practice, nor has it been widely publicized. Biomedicine will transform our society forever by allowing people to live longer and to continue working and contributing financially to the economy longer, rather than entering into retirement and draining the economy through pensions and senior healthcare. Old age will become a concept of the past, breakthroughs in regenerative medicine will continue, and an unprecedented boom to the global economy, with an influx of older able-bodied workers and consumers, will be a reality. A leading expert in aging research, author Alex Zhavoronkov provides a helicopter view on the progress science has already made, from repairing tissue damage to growing functional organs from a single cell, and illuminates the possibilities that the scientific and medical community will soon make into realities. The Ageless Generation is an engaging work that causes us to rethink our ideas of age and ability in the modern world.

High-Dimensional Optimization: Set Exploration in the Non-Asymptotic Regime (SpringerBriefs in Optimization)

by Anatoly Zhigljavsky Jack Noonan

This book is interdisciplinary and unites several areas of applied probability, statistics, and computational mathematics including computer experiments, optimal experimental design, and global optimization. The bulk of the book is based on several recent papers by the authors but also contains new results. Considering applications, this brief highlights multistart and other methods of global optimizations requiring efficient exploration of the domain of optimization. This book is accessible to a wide range of readers; the prerequisites for reading the book are rather low, and many numerical examples are provided that pictorially illustrate the main ideas, methods, and conclusions. The main purpose of this book is the construction of efficient exploration strategies of high-dimensional sets. In high dimensions, the asymptotic arguments could be practically misleading and hence the emphasis on the non-asymptotic regime. An important link with global optimization stems from the observation that approximate covering is one of the key concepts associated with multistart and other key random search algorithms. In addition to global optimization, important applications of the results are computer experiments and machine learning. It is demonstrated that the asymptotically optimal space-filling designs, such as pure random sampling or low-discrepancy point nets, could be rather inefficient in the non-asymptotic regime and the authors suggest ways of increasing the efficiency of such designs. The range of techniques ranges from experimental design, Monte Carlo, and asymptotic expansions in the central limit theorem to multivariate geometry, theory of lattices, and numerical integration. This book could be useful to a wide circle of readers, especially those specializing in global optimization, numerical analysis, computer experiments, and computational mathematics. As specific recipes for improving set exploration schemes are formulated, the book can also be used by the practitioners interested in applications only.

Human Aspects of IT for the Aged Population: 10th International Conference, ITAP 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14725)

by Jia Zhou Qin Gao

This two-volume set LNCS 14725-14726 constitutes the thoroughly refereed proceedings of the 10th International Conference on Human Aspects of IT for the Aged Population (ITAP 2024), held as part of the 26th International Conference on Human-Computer Interaction, HCI International 2024 (HCII 2024), was held as a hybrid event in Washington DC, USA, during June/July 2024. The total of 1271 papers and 309 posters included in the HCII 2023 proceedings was carefully reviewed and selected from 5108 submissions. The ITAP 2024 conference offers a broad range of relevant disciplines and domains to exchange 1) research contributions on older people's abilities and competencies, needs and requirements, and attitudes and behavioral patterns in relation to IT use; 2) innovative ideas, practices, and experiences related to the design, operation, and evaluation of IT applications, systems, and services for older people.

Human Aspects of IT for the Aged Population: 10th International Conference, ITAP 2024, Held as Part of the 26th HCI International Conference, HCII 2024, Washington, DC, USA, June 29–July 4, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14726)

by Jia Zhou Qin Gao

This two-volume set LNCS 14725-14726 constitutes the thoroughly refereed proceedings of the 10th International Conference on Human Aspects of IT for the Aged Population (ITAP 2024), held as part of the 26th International Conference on Human-Computer Interaction, HCI International 2024 (HCII 2024), was held as a hybrid event in Washington DC, USA, during June/July 2024. The total of 1271 papers and 309 posters included in the HCII 2023 proceedings was carefully reviewed and selected from 5108 submissions. The ITAP 2024 conference offers a broad range of relevant disciplines and domains to exchange 1) research contributions on older people's abilities and competencies, needs and requirements, and attitudes and behavioral patterns in relation to IT use; 2) innovative ideas, practices, and experiences related to the design, operation, and evaluation of IT applications, systems, and services for older people.

Digital Multimedia Communications: 20th International Forum on Digital TV and Wireless Multimedia Communications, IFTC 2023, Beijing, China, December 21–22, 2023, Revised Selected Papers, Part II (Communications in Computer and Information Science #2067)

by Jun Zhou Xiaokang Yang Guangtao Zhai Ping An Hua Yang Long Ye

This book constitutes the refereed proceedings of the 20th International Forum on Digital Multimedia Communication, IFTC 2023, held in Beijing, China, December 21–22, 2023. The 57 full papers included in this book were carefully reviewed and selected from 150 submissions. They were organized in topical sections as follows: CCIS 2066: Image Processing, Media Computing, Metaverse and Virtual Reality, and Multimedia Communication. CCIS 2067: Quality Assessment, Source Coding, and Application of AI.

Digital Multimedia Communications: 20th International Forum on Digital TV and Wireless Multimedia Communications, IFTC 2023, Beijing, China, December 21–22, 2023, Revised Selected Papers, Part I (Communications in Computer and Information Science #2066)

by Jun Zhou Xiaokang Yang Guangtao Zhai Ping An Hua Yang Long Ye

This book constitutes the refereed proceedings of the 20th International Forum on Digital Multimedia Communication, IFTC 2023, held in Beijing, China, December 21–22, 2023. The 57 full papers included in this book were carefully reviewed and selected from 150 submissions. They were organized in topical sections as follows: CCIS 2066: Image Processing, Media Computing, Metaverse and Virtual Reality, and Multimedia Communication. CCIS 2067: Quality Assessment, Source Coding, and Application of AI.

Monitoring and Early Warning Technologies on Karst Lands: Surface Collapse and Groundwater Contamination (Advances in Karst Science)

by Wanfang Zhou Mingtang Lei Xiaozhen Jiang Jianling Dai Xiao Ma Fubiao Zhou Zongyuan Pan

This book compiles a broad range of monitoring and early warning technologies focused on high-resolution in-situ water quality parameters at springs and monitoring wells. The surface collapses often cause severe damage to infrastructures, properties, and loss of lives, whereas contaminated groundwater poses risks to human health and the environment. Collapses are critical in karst systems, sparsing a seventh of Earth’s land surface. Karsts are also very relevant for drinking water, yet karst represents a fourth of global drinking water. Mitigating collapses and contaminated groundwater in karst aquifers can be complicated and costly. These parameters detect hydrodynamics, internal soil erosion, and ground deformation changes as karst collapse and pollution proxies. This book represents the most comprehensive overview of decades of research on karst collapse and groundwater contamination. This book is of interest to researchers and policymakers.

Geotechnical Aspects of Underground Construction in Soft Ground

by Wan-Huan Zhou

GEOTECHNICAL ASPECTS OF UNDERGROUND CONSTRUCTION IN SOFT GROUND comprises a collection of 68 contributions, including 55 technical papers, 6 General Reports, 5 Keynotes, 1 Fujita Lecture, and 1 Bright Spark Lecture presented at the 11th International Symposium on Geotechnical Aspects of Underground Construction in Soft Ground (IS-Macau 2024), held in Macao SAR, China, on June 14-17, 2024.The symposium is the latest in a series that began in New Delhi in 1994 and was followed by symposia in London (1996), Tokyo (1999), Toulouse (2002), Amsterdam (2005), Shanghai (2008), Rome (2011), Seoul (2014), Sao Paulo (2017), and Cambridge (2022). This symposium was organized by the University of Macau, Civil Engineering Laboratory of Macau, and the Macau Association for Geotechnical Engineering under the auspices of TC204 of ISSMGE. The book includes contributions from more than 15 countries on the research, design, and construction of underground works in soft ground. The theme of IS-Macau 2024 is “Tunnelling and Underground Construction for Smart Cities”. The contributions cover the following topics: Basic properties and soil improvement in soft ground Constitutive and Numerical Modelling Innovative analysis and design in tunneling and underground construction Smart monitoring and visualization technologies for tunneling and underground construction Sustainability and resilience of underground infrastructure Field case studies Similar to previous editions, GEOTECHNICAL ASPECTS OF UNDERGROUND CONSTRUCTION IN SOFT GROUND serves as an invaluable resource offering insights into the contemporary methods of analyzing, designing, and executing tunnels and deep excavations within soft ground environments, crucial for the advancement of smart cities. The book is particularly aimed at academics and professionals interested in geotechnical and underground engineering.

Backdoor Attacks against Learning-Based Algorithms (Wireless Networks)

by Haojin Zhu Shaofeng Li Xuemin (Sherman) Shen Wen Wu

This book introduces a new type of data poisoning attack, dubbed, backdoor attack. In backdoor attacks, an attacker can train the model with poisoned data to obtain a model that performs well on a normal input but behaves wrongly with crafted triggers. Backdoor attacks can occur in many scenarios where the training process is not entirely controlled, such as using third-party datasets, third-party platforms for training, or directly calling models provided by third parties. Due to the enormous threat that backdoor attacks pose to model supply chain security, they have received widespread attention from academia and industry. This book focuses on exploiting backdoor attacks in the three types of DNN applications, which are image classification, natural language processing, and federated learning.Based on the observation that DNN models are vulnerable to small perturbations, this book demonstrates that steganography and regularization can be adopted to enhance the invisibility of backdoor triggers. Based on image similarity measurement, this book presents two metrics to quantitatively measure the invisibility of backdoor triggers. The invisible trigger design scheme introduced in this book achieves a balance between the invisibility and the effectiveness of backdoor attacks. In the natural language processing domain, it is difficult to design and insert a general backdoor in a manner imperceptible to humans. Any corruption to the textual data (e.g., misspelled words or randomly inserted trigger words/sentences) must retain context-awareness and readability to human inspectors. This book introduces two novel hidden backdoor attacks, targeting three major natural language processing tasks, including toxic comment detection, neural machine translation, and question answering, depending on whether the targeted NLP platform accepts raw Unicode characters.The emerged distributed training framework, i.e., federated learning, has advantages in preserving users' privacy. It has been widely used in electronic medical applications, however, it also faced threats derived from backdoor attacks. This book presents a novel backdoor detection framework in FL-based e-Health systems. We hope this book can provide insightful lights on understanding the backdoor attacks in different types of learning-based algorithms, including computer vision, natural language processing, and federated learning. The systematic principle in this book also offers valuable guidance on the defense of backdoor attacks against future learning-based algorithms.

Blockchain Technology and Application: 6th CCF China Blockchain Summit, CBCS 2023, Haikou, China, December 15–18, 2023, Revised Selected Papers (Communications in Computer and Information Science #2098)

by Jianming Zhu Xianhua Song Zeguang Lu Yong Ding Qianhong Wu

This book constitutes the refereed proceedings of the 6th CCF China Blockchain Summit, CBCS 2023, held in Haikou, China, in December 2023. The 13 revised full papers presented were carefully reviewed and selected from 72 submissions. The papers deal with research results and development activities in all aspects of blockchain science and technology.

Two Billion Eyes: The Story of China Central Television

by Ying Zhu

&“The definitive work on Chinese television . . . A pioneering picture of CCTV and its crucial role in the contemporary Chinese political economy&” (Robert W. McChesney, author of Corporate Media and the Threat to Democracy). As China navigates the murky waters of a &“third way&” with liberal economic policies under a strict political regime, the surprising battleground for China&’s future emerges in the country&’s highest rated television network—China Central Television, or CCTV. With 16 internationally broadcast channels and over 1.2 billion viewers, CCTV is a powerhouse in conveying Chinese news and entertainment. The hybrid nature of the network has also transformed it into an unexpected site of discourse in a country that has little official space for negotiation. While CCTV programming is state sponsored—and censored—the popularity and profit of the station are determined by the people. And as the Chinese Communist Party seeks to exert its own voice on domestic and international affairs, the prospect of finding an amenable audience becomes increasingly paramount. Through a series of interviews with a fascinating cast of power players including a director of a special topic program that incited the 1989 student movement, current and past presidents of CCTV, and producers at the frontline of the network&’s rapidly evolving role in Chinese culture, celebrated media analyst Ying Zhu unlocks a doorway to political power that has long been shrouded in mystery. &“An indispensable guide to the Chinese media landscape.&” —The New Inquiry &“Up until Two Billion Eyes, the view of Chinese media has often been limited . . . Ying Zhu expands the periphery of our vision.&” —Los Angeles Review of Books

MAC Protocol Design in Full-Duplex Enabled Wireless Networks (Wireless Networks)

by Weihua Zhuang Ning Zhang Wen Wu Liqun Fu Shengbo Liu

This book thoroughly examines the design of full-duplex medium access control (MAC) protocols in wireless networks. It is organized into three main sections: (a) Fundamentals and preliminaries of full-duplex communications, (b) A comprehensive review of the existing full-duplex MAC protocols, and (c) Designs of full-duplex MAC protocols in three typical wireless networks, i.e., wireless local access networks (WLANs), multi-hop networks and millimeter-wave networks. Also, the authors extensively address key challenges in these three wireless full-duplex networks, such as the hidden-node problem, accumulative interference, and deafness and blockage problems. Solutions to these challenges are meticulously devised to enhance the overall network performance. The wireless full-duplex communication technique, facilitating simultaneous transmission and reception within the same frequency band, holds immense potential for enhancing spectrum efficiency and network capacity. It emerges as a pivotal technology in the sixth-generation (6G) networks. This book provides a comprehensive review and in-depth exploration of full-duplex MAC design across various networks, encompassing WLANs, multi-hop networks, and millimeter-wave networks. Acknowledging the challenges faced by full-duplex WLANs, particularly the hidden-node problem, it also introduces a pioneering hidden-node-free design and a MAC protocol design, which features a full-duplex enhanced carrier-sensing mechanism. Addressing the need to augment end-to-end throughput in multi-hop networks employing full-duplex relaying, the authors present an analytical model for end-to-end throughput and propose a multi-hop full-duplex MAC protocol designed to optimize network performance. Furthermore, the exploration extends to full-duplex millimeter-wave networks, delving into issues of deafness and blockage. A directional full-duplex MAC protocol is introduced to enhance network capacity and mitigate blockage problems. This book concludes by outlining prospective research directions within the related fields of study and offers valuable insights for future exploration. This book targets researchers and advanced level students in computer science and electrical engineering. It also caters to professionals engaged in the fields of wireless networks, full-duplex system, protocol design, and network optimization will also buy this book.

Jordan: Climate Policy Diagnostic

by Zhunussova

A report from the International Monetary Fund.

Language after Heidegger (Studies in Continental Thought)

by Krzysztof Ziarek

Working from newly available texts in Heidegger's Complete Works, Krzysztof Ziarek presents Heidegger at his most radical and demonstrates how the thinker's daring use of language is an integral part of his philosophical expression. Ziarek emphasizes the liberating potential of language as an event that discloses being and amplifies Heidegger's call for a transformative approach to poetry, power, and ultimately, philosophy.

Sports and Human Rights (Interdisciplinary Studies in Human Rights #10)

by Andreas R. Ziegler Sophie Weerts Véronique Boillet

Based on a series of themes and case studies, this book aims to illustrate the impact of sports policies and practices on individuals and their identities, and to analyze the potential solutions offered by International human rights law (IHRL) for these infringements. It bridges the gap between IHRL and sports studies, and will be useful to scholars in both fields, especially those unfamiliar with each other’s work. Furthermore, by investigating the context of sport and its governance, this collection offers a series of valuable insights, enabling the development of an interpretation of ‘law in context’ for legal scholars in the field of human rights. As the governance and regulation of sport are seen as illustrations of other forms of normativity, this book also contributes to the conversation about the transnational dimension of law and legal orders. In this respect, it illustrates that normative autonomy in the field of sport, associated with the idea of lex sportiva, tends to be relative regarding IHRL. The sporting environment is not disconnected from major contemporary social issues: it constitutes a public space in which injustices can be denounced, but also the theater in which prejudices are perpetuated against various parties, such as athletes or workers. IHRL commonly addresses attacks on individual dignity and social justice issues by guaranteeing rights to individuals and offering them protection mechanisms. In this context, can IHRL solve the problems encountered in the sporting environment? This is the question that animates this volume. This is an open access book.

Information Technology for Management: ITBS 2023 Main Track and ISM 2023 Thematic Track, Held as Part of FedCSIS 2023, Warsaw, Poland, September 17–20, 2023, Extended and Revised Selected Papers (Lecture Notes in Business Information Processing #504)

by Ewa Ziemba Witold Chmielarz Jarosław Wątróbski

The present book includes extended and revised versions of a set of selected papers submitted to the Topical Area of Information Technology for Business and Society, ITBS 2023, and two Thematic Tracks: Information System Management, ISM 2023, and Knowledge Acquisition and Management, KAM 2023, held in Poland, Warsaw, during September 17- 20, 2023. ITBS 2023 received 26 submissions, from which 6 full papers and 2 short papers have been accepted; for ISM 2023 3 full papers and 1 short paper have been accepted from 21 submissions; and for KAM 2023 1 full paper has been accepted from 7 submissions. From the 6 submissions to DSH 2023, no paper passed the extended reviews. The accepted papers are grouped in sections on IT in Improving of Management Systems, Approaches to Improving of Social Problems, and Methods of Solving Business.

The Yeshiva and the Rise of Modern Hebrew Literature (Jews in Eastern Europe)

by Marina Zilbergerts

The Yeshiva and the Rise of Modern Hebrew Literature argues that the institution of the yeshiva and its ideals of Jewish textual study played a seminal role in the resurgence of Hebrew literature in modern times. Departing from the conventional interpretation of the origins of Hebrew literature in secular culture, Marina Zilbergerts points to the practices and metaphysics of Talmud study as its essential animating forces. Focusing on the early works and personal histories of founding figures of Hebrew literature, from Moshe Leib Lilienblum to Chaim Nachman Bialik, The Yeshiva and the Rise of Modern Hebrew Literature reveals the lasting engagement of modern Jewish letters with the hallowed tradition of rabbinic learning.

Journey: A Novel

by Andrew Zimmerman

For fans of Mitch Albom, Paulo Coelho, and Elizabeth Gilbert, Journey is a novel of magical realism that takes the reader from the NYC high-tech corporate world to the mystical city of Glastonbury, England. Amazon’s #1 New Release for metaphysical fiction in 2020, Journey is a tale of both spiritual and emotional awakening. In his effort to be the next CEO of Ascendant, a New York-based tech giant, Paul Moore neglects everything―his family and himself―in his race to the top. But a trip to Glastonbury, England changes everything. A complete counterpoint to Paul’s corporate day job, Glastonbury is a spiritual Disneyworld, catering to would-be witches, goddesses, druids, fairies, neopagans, and burned-out hippies. Exploring the city, Paul is drawn to the energy of a nearby hill―Tor―said to be the mythical Isle of Avalon of Arthurian lore. At Tor, Paul meets a beautiful soul reader, Christine, who plants the seeds that turn his life upside down. Returning home, Mary, Paul’s wife, sees the changes in him and is both scared and intrigued as she watches him struggle to navigate between the business and spiritual worlds. When a series of synchronistic events pull Paul to return to Glastonbury and Christine, Mary reluctantly agrees to share his journey back. They depart, both unaware that their lives will never be the same. Journey is a story inspired by real events. Part of a planned trilogy.

Us, After: A Memoir of Love and Suicide

by Rachel Zimmerman

"This poignant, soul-baring memoir is truly one of the most moving accounts of grief, loss and resilience that I've read." — Tara Parker-Pope, The Washington Post "Masterfully written and compelling... Zimmerman's book is a marvelous feat; I stayed up all night reading it." — Deesha Philyaw, author, The Secret Lives of Church Ladies "Us, After is one of the best memoirs I have read in a very long time. It is poetic and lyrical, unflinching, and a testament to the strength of the human soul...We bleed for Zimmerman and her two daughters. We laugh and cry with them. And ultimately we marvel at their strength and resilience." — Buzz Bissinger, author, Friday Night Lights When a state trooper appeared at Rachel Zimmerman's door to report that her husband had jumped to his death off a nearby bridge, she fell to her knees, unable to fully absorb the news. How could the man she married, a devoted father and robotics professor at MIT, have committed such a violent act? How would she explain this to her young daughters? And could she have stopped him? A longtime journalist, she probed obsessively, believing answers would help her survive. She interviewed doctors, suicide researchers and a man who jumped off the same bridge and lived. Us, After examines domestic devastation and resurgence, digging into the struggle between public and private selves, life's shifting perspectives, the work of motherhood, and the secrets we keep. In this memoir, Zimmerman confronts the unimaginable and discovers the good in what remains.

Refine Search

Showing 11,851 through 11,875 of 11,913 results