Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kengo Kuma: Selected Works

Buy
Kengo Kuma: Selected Works, 9781568984681 (1568984685), Princeton Press, 2005

Evanescent. Restrained. Ethereal. These are some of the words used to describe the architecture of Kengo Kuma, one of the most heralded of a new generation of Japanese architects. A recent article in Architecture writes of Kuma that "he strives to give his buildings the qualities of a rainbow, composed of shimmering particles, more illusion than object, that change as you look at them."

Increasingly the focus of international renown, Kuma's work is characterized by a delicate simplicity and minimalism, incorporating a wide range of ephemeral transparencies. Their ineffable vibrancy is achieved largely by the extensive and skillful use of screens: metal, wooden, bamboo, and even stone louvers or slates, as well as paper, plastic, and glass surfaces or membranes. His use of new, sophisticated, and efficient technologies, his sensitivity to site, and his attention to the ecological and prevailing social context of his work are all explored in Kengo Kuma: Selected Works, the first full-length monograph on the work of this enormous talent. Included are all of Kuma's most recent projects, including the Museum of Ando Hiroshige, the Stone Museum, the Horai Onsen Bath House in Atami, Louis Vuitton Tokyo Headquarters, and the Nagasaki Prefectural Museum.

Kengo Kuma: Selected Works is an essential addition to the library of anyone interested in the best contemporary architecture.

(HTML tags aren't allowed.)

Handbook of Matrices
Handbook of Matrices
Nowadays matrices are used in many fields of science, Accordingly they have become standard tools in statistics, econometrics, mathematics, engineering and natural sciences textbooks, In fact, many textbooks from these fields have chapters, appendices or sections on matrices, Often collections of those results used in a book are included, Of...
Complete Book of Remote Access: Connectivity and Security (Best Practices)
Complete Book of Remote Access: Connectivity and Security (Best Practices)

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This text covers both-the enabling technology and how...

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...


The Semantic Web: Crafting Infrastructure for Agency
The Semantic Web: Crafting Infrastructure for Agency
The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a users needs. Although search engines index much of the Web's content, they have little ability to select the pages that a user really wants or needs. Berners-Lee foresees a...
Tree-Structure based Hybrid Computational Intelligence: Theoretical Foundations and Applications
Tree-Structure based Hybrid Computational Intelligence: Theoretical Foundations and Applications

Research in computational intelligence is directed toward building thinking machines and improving our understanding of intelligence. As evident, the ultimate achievement in this field would be to mimic or exceed human cognitive capabilities including reasoning, recognition, creativity, emotions, understanding, learning and so on. In this book,...

Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy