17,458 research outputs found

    OpenPING: A Reflective Middleware for the Construction of Adaptive Networked Game Applications

    Get PDF
    The emergence of distributed Virtual Reality (VR) applications that run over the Internet has presented networked game application designers with new challenges. In an environment where the public internet streams multimedia data and is constantly under pressure to deliver over widely heterogeneous user-platforms, there has been a growing need that distributed VR applications be aware of and adapt to frequent variations in their context of execution. In this paper, we argue that in contrast to research efforts targeted at improvement of scalability, persistence and responsiveness capabilities, much less attempts have been aimed at addressing the flexibility, maintainability and extensibility requirements in contemporary distributed VR platforms. We propose the use of structural reflection as an approach that not only addresses these requirements but also offers added value in the form of providing a framework for scalability, persistence and responsiveness that is itself flexible, maintainable and extensible. We also present an adaptive middleware platform implementation called OpenPING1 that supports our proposal in addressing these requirements

    Performance recordivity : studio music in a live context

    Get PDF
    A broad range of positions is articulated in the academic literature around the relationship between recordings and live performance. Auslander (2008) argues that “live performance ceased long ago to be the primary experience of popular music, with the result that most live performances of popular music now seek to replicate the music on the recording”. Elliott (1995) suggests that “hit songs are often conceived and produced as unambiguous and meticulously recorded performances that their originators often duplicate exactly in live performances”. Wurtzler (1992) argues that “as socially and historically produced, the categories of the live and the recorded are defined in a mutually exclusive relationship, in that the notion of the live is premised on the absence of recording and the defining fact of the recorded is the absence of the live”. Yet many artists perform in ways that fundamentally challenge such positions. Whilst it is common practice for musicians across many musical genres to compose and construct their musical works in the studio such that the recording is, in Auslander’s words, the ‘original performance’, the live version is not simply an attempt to replicate the recorded version. Indeed in some cases, such replication is impossible. There are well known historical examples. Queen, for example, never performed the a cappella sections of Bohemian Rhapsody because it they were too complex to perform live. A 1966 recording of the Beach Boys studio creation Good Vibrations shows them struggling through the song prior to its release. This paper argues that as technology develops, the lines between the recording studio and live performance change and become more blurred. New models for performance emerge. In a 2010 live performance given by Grammy Award winning artist Imogen Heap in New York, the artist undertakes a live, improvised construction of a piece as a performative act. She invites the audience to choose the key for the track and proceeds to layer up the various parts in front of the audience as a live performance act. Her recording process is thus revealed on stage in real time and she performs a process that what would have once been confined to the recording studio. So how do artists bring studio production processes into the live context? What aspects of studio production are now performable and what consistent models can be identified amongst the various approaches now seen? This paper will present an overview of approaches to performative realisations of studio produced tracks and will illuminate some emerging relationships between recorded music and performance across a range of contexts

    Why the NSA Data Seizures Are Unconstitutional

    Get PDF
    Due to the unauthorized leaks of classified information, we have come to learn that the National Security Agency (NSA), an executive branch arm of the U.S. military, has established several data collection programs. In this article, I am not going to get into the details of these programs. Instead, I will limit my focus to what I consider to be the serious constitutional problem with any such program, regardless of the details: the fact that the NSA is demanding that private companies, with which virtually all Americans contract to provide their voice communications, turn over the records of every phone call that is made on their systems. This metadata is then stored on NSA super computers for later analysis. In this article, I am not going to address the legality of this program under existing statutes

    Sequence of thinking and acting in strategy making

    Get PDF
    This paper gives an answer to the continuing emergent-deliberate debate. Thinking and acting are two outstanding features of this controversy. What is needed in the field is a framework that can explain under what circumstances each of these two features takes place along the strategy-making process. The focus of the paper is on the sequence of thinking and acting in the strategy-making process. A framework is developed to show how thinking co-evolves with action in a succession of strategic activities. Within boundaries, strategic activities are carried forward by social automatic behaviour, following a set pattern. Yet, when an action crosses a certain threshold, a different condition of awareness is achieved. Similarly, thought can cross an equivalent threshold, giving rise to consciousness. Either condition enhances the organization's ability to make changes in the direction of its strategic activity.strategy-making process; strategic activities;

    Cognitive modeling of social behaviors

    Get PDF
    To understand both individual cognition and collective activity, perhaps the greatest opportunity today is to integrate the cognitive modeling approach (which stresses how beliefs are formed and drive behavior) with social studies (which stress how relationships and informal practices drive behavior). The crucial insight is that norms are conceptualized in the individual mind as ways of carrying out activities. This requires for the psychologist a shift from only modeling goals and tasks —why people do what they do—to modeling behavioral patterns—what people do—as they are engaged in purposeful activities. Instead of a model that exclusively deduces actions from goals, behaviors are also, if not primarily, driven by broader patterns of chronological and located activities (akin to scripts). To illustrate these ideas, this article presents an extract from a Brahms simulation of the Flashline Mars Arctic Research Station (FMARS), in which a crew of six people are living and working for a week, physically simulating a Mars surface mission. The example focuses on the simulation of a planning meeting, showing how physiological constraints (e.g., hunger, fatigue), facilities (e.g., the habitat’s layout) and group decision making interact. Methods are described for constructing such a model of practice, from video and first-hand observation, and how this modeling approach changes how one relates goals, knowledge, and cognitive architecture. The resulting simulation model is a powerful complement to task analysis and knowledge-based simulations of reasoning, with many practical applications for work system design, operations management, and training

    Transcutaneous vagus nerve stimulation does not affect verbal memory performance in healthy volunteers

    Get PDF
    Introduction: Invasive vagus nerve stimulation (VNS) improves word recognition memory in patients with epilepsy. Recent studies with transcutaneous VNS (tVNS) have also shown positive effects on various subdomains of cognitive functioning in healthy volunteers. In this randomized, controlled, crossover study, we investigated the effect of tVNS on a word recognition memory paradigm in healthy volunteers to further investigate the potential of tVNS in the treatment of cognitive disorders. Methods: We included 41 healthy participants aged between 18 and 30 years (young age group) and 24 healthy participants aged between 45 and 80 years (older age group). Each participant completed a word recognition memory paradigm during three different conditions: true tVNS, sham, and control. During true tVNS, stimulation was delivered at the cymba conchae. Sham stimulation was delivered by stimulating the earlobe. In the control condition, no stimulation was given. In each condition, participants were asked to remember highlighted words from three test paragraphs. Accuracy scores were calculated for immediate recall after each test paragraph and for delayed recognition at the end of the paradigm. We hypothesized that highlighted words from paragraphs in the true tVNS condition would be more accurately recalled and/or recognized compared to highlighted words from paragraphs in the sham or control condition. Results: In this randomized study, tVNS did not affect the accuracy scores for immediate recall or delayed recognition in both age groups. The younger group showed significantly higher accuracy scores than the older group. The accuracy scores improved over time, and the most recently learned words were better recognized. Participants rated true tVNS as significantly more painful; however, pain was not found to affect accuracy scores. Conclusion: In this study, tVNS did not affect verbal memory performance in healthy volunteers. Our results could not replicate the positive effects of invasive VNS on word recognition memory in epilepsy patients. Future research with the aim of improving cognitive function should focus on the rational identification of optimized and individualized stimulation settings primarily in patients with cognitive deficits

    Making the Distribution Subsystem Secure

    Get PDF
    This report presents how the Distribution Subsystem is made secure. A set of different security threats to a shared data programming system are identifed. The report presents the extensions nessesary to the DSS in order to cope with the identified security threats by maintaining reference security. A reference to a shared data structure cannot be forged or guessed; only by proper delegation can a thread acquire access to data originating at remote processes. Referential security is a requirement for secure distributed applications. By programmatically restricting access to distributed data to trusted nodes, a distributed application can be made secure. However, for this to be true, referential security must be supported on the level of the implementation

    Reconsidering Regulatory Uncertainty: Making a Case for Energy Storage

    Get PDF
    This Article begins the complex dialogue that must take place to address the emerging technologies providing energy storage for our electricity grid. Energy storage has the capacity to be a game-changer for many facets of our grid, providing better integration of renewable energy, enhanced reliability, and reduced use of carbon-intensive fuels. Energy storage faces a number of obstacles, however, including technological, financial, and regulatory uncertainty. This Article focuses on the regulatory uncertainty, and defends the proposition that not all regulatory uncertainty is created equal. It argues for differential treatment of this uncertainty, depending on its context, scope, and source, and applies this framework to the uncertainty surrounding the classification of energy storage. It finds that this uncertainty operates against high baseline levels of uncertainty in the energy industry, is limited in its scope, and is intentionally embraced by the federal regulators in an effort to realize the benefits of regulatory uncertainty. This Article asserts that this form of uncertainty is one that can be managed in a way to avoid stifling the development of this important technology. This Article sets forth strategies for regulators and regulated entities to continue to function, even within this zone of regulatory uncertainty

    Reconsidering Regulatory Uncertainty: Making a Case for Energy Storage

    Get PDF
    This Article begins the complex dialogue that must take place to address the emerging technologies providing energy storage for our electricity grid. Energy storage has the capacity to be a game-changer for many facets of our grid, providing better integration of renewable energy, enhanced reliability, and reduced use of carbon-intensive fuels. Energy storage faces a number of obstacles, however, including technological, financial, and regulatory uncertainty. This Article focuses on the regulatory uncertainty, and defends the proposition that not all regulatory uncertainty is created equal. It argues for differential treatment of this uncertainty, depending on its context, scope, and source, and applies this framework to the uncertainty surrounding the classification of energy storage. It finds that this uncertainty operates against high baseline levels of uncertainty in the energy industry, is limited in its scope, and is intentionally embraced by the federal regulators in an effort to realize the benefits of regulatory uncertainty. This Article asserts that this form of uncertainty is one that can be managed in a way to avoid stifling the development of this important technology. This Article sets forth strategies for regulators and regulated entities to continue to function, even within this zone of regulatory uncertainty
    • 

    corecore