Billionaire's Mistress


Book Description

She betrayed herself and gave herself over to the strange man who was both wealthy and unbeatable so that her sister may be cured. After one night of intense sexual activity, she grabbed the money and ran off. She believed that from this point on, she would have no further interactions with him.




Networked Group Communication


Book Description

This book constitutes the refereed proceedings of the Third International COST264 Workshop on Networked Group Communication, NGC 2001, held in London, UK, in November 2001.The 14 revised full papers presented were carefully reviewed and selected from 40 submissions. All current issues in the area are addressed. The papers are organized in topical sections on application-level aspects, group management, performance topics, security, and topology.







Rumor Mills


Book Description

The goal of this volume is to explore the social and political dynamics of rumor and the related concept of urban or contemporary legend. These forms of communication often appear in tandem with social problems, including riots, racial or political violence, and social and economic upheavals. The volume emphasizes the connection of rumor to a set of social concerns from government corruption and corporate scandal, to racial, religious, and other prejudices. Central to the dialogue are issues of truth, belief, history, public policy, and evidence.Rumor has been recognized as one of the most important contributing factors to violence and discrimination. Yet, despite its significance in exacerbating social discord and mistrust, little systematic scholarly attention has been paid to the political origins and consequences of rumor. Rumor is defined as a proposition for belief that is not backed by secure standards of evidence. Rumor can be traditional or not, and can be expressed as a simple claim of fact. In both instances groups of claim-makers, operating out of their own interests and with a set of resources, attempt to depict reality, and if possible, impact the future.The need for this book is underscored by changing patterns of technology. What in the past was grounded in face- to-face interaction is now often found on the Internet, which is a major source of rumor. An appreciation of how new electronic forms of communication affect communal belief is essential for explicating rumor dynamics. The volume is comprehensive. Essays cover race and ethnicity, migration and globalization, corporate malfeasance, and state and government corruption. While editors and contributors well appreciate the dynamic nature of rumors and legends, the high quality of the effort make it evident that the issues that are raised and reoccur will serve to channel and inspire research in this major field of communications research for years to come.




Ex-husband, Let Me Go (book #3)


Book Description

This is the book 3 of the series of Ex-husband, Let Me Go. On the seventh day of marriage, Ji Yan was still locked up in the basement. She was forcibly sent to Shang family by her parents to replace her sister and marry the monster man, Shang Jinshen, who is rumored to be unable to walk. During these seven days, only one hot man comes to the basement every day to see her and provoke her. That time, she decides to fight back and bites the man, but she pays the price by having her first time taken away by the hot man. Finally, after ten days of captivity, she was released. When the Madam of the Shang family humiliates her for her poverty, her so-called husband shows up to defend her. She saw Shang Jinshen sitting in a wheelchair with many scars on his face. But what she doesn't know is that this image of weakness is a pretence by Shang Jinshen. The man who took away her virginity is the real Shang Jinshen.




Mockery and Secretism in the Social World of Mark's Gospel


Book Description

Having established the context of mockery and shame in Ancient Mediterranean cultures, Dietmar Neufeld shows how Mark presented Jesus as a person with a sense of honour and with a sense of shame, willing to accept the danger of being visible and the mockery it attracted. Neufeld also considers the social functions of ridicule/mockery more broadly as strategies of social sanction, leading to a better understanding of how social, religious, and political practices and discourse variously succeeded or failed in Mark. Finally, Neufeld investigates the author of Mark's preoccupation with 'secrecy', showing that his disposition to secrecy in his narrative heightened when the dangers of scorn and ridicule from crowds or persons became pressing concerns. In a fiercely competitive literary environment where mocking and being mocked were ever present dangers, Mark, in his pursuit of authority gains it by establishing a reputation of possessing authentic, secret knowledge. In short, the so-called secrecy motif is shown to be deployed for specific, strategic reasons that differ from those that have been traditionally advanced.










Distributed Applications and Interoperable Systems


Book Description

This book constitutes the refereed proceedings of the 9th IFIP WG 6.1 International Conference on Distributed Applications and Interoperable Systems, DAIS 2009, held in Lisbon, Portugal, in June 2009. The DAIS conference was held as part of the federated event on Distributed Computing Techniques (DisCoTec), together with the 11th International Conference on Coordination Models and Languages (Coordination 2009) and the IFIP WG 6.1 International Conference on Formal Techniques for Distributed Systems (FMOODS/FORTE 2009). The 12 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers address service orientation, quality of service and service contract, business processes, Web services, service components, algorithms and protocols supporting dependability, fault tolerance, data replication, group communication, adaptive and collaborative systems, context awareness, model-driven development, middleware for ubiquitous computing and sensor networks, ad hoc network protocols, peer-to-peer systems, and overlays. They are organized in topical sections peer-to-peer networks, adhoc networks, dependability, and infrastructure and services.




Miss Su, I Write Poems For You


Book Description

Su Jingen had three good points. Her delicate body was easy to push down. In front of humans, she was a harmless little lamb, yet after humans, she transformed into a big grey wolf.The schemes and tricks were all accepted, and the grudge would be repaid in double.But who would have thought that the big bad wolf would run into Wang Zhong Wang.The thing she regretted the most was climbing into Wei Jinghan's car and biting the person who kissed him on the neck.He watched on helplessly as Wei Jinghan dug a hole for him to jump into step by step. He had no place to escape.