6,555 research outputs found

    Grasping nothing: a study of minimal ontologies and the sense of music

    Get PDF
    If music were to have a proper sense – one in which it is truly given – one might reasonably place this in sound and aurality. I contend, however, that no such sense exists; rather, the sense of music takes place, and it does so with the impossible. To this end, this thesis – which is a work of philosophy and music – advances an ontology of the impossible (i.e., it thinks the being of what, properly speaking, can have no being) and considers its implications for music, articulating how ontological aporias – of the event, of thinking the absolute, and of sovereignty’s dismemberment – imply senses of music that are anterior to sound. John Cage’s Silent Prayer, a nonwork he never composed, compels a rerethinking of silence on the basis of its contradictory status of existence; Florian Hecker et al.’s Speculative Solution offers a basis for thinking absolute music anew to the precise extent that it is a discourse of meaninglessness; and Manfred Werder’s [yearn] pieces exhibit exemplarily that music’s sense depends on the possibility of its counterfeiting. Inso-much as these accounts produce musical senses that take the place of sound, they are also understood to be performances of these pieces. Here, then, thought is music’s organon and its instrument

    Supernatural crossing in Republican Chinese fiction, 1920s–1940s

    Get PDF
    This dissertation studies supernatural narratives in Chinese fiction from the mid-1920s to the 1940s. The literary works present phenomena or elements that are or appear to be supernatural, many of which remain marginal or overlooked in Sinophone and Anglophone academia. These sources are situated in the May Fourth/New Culture ideological context, where supernatural narratives had to make way for the progressive intellectuals’ literary realism and their allegorical application of supernatural motifs. In the face of realism, supernatural narratives paled, dismissed as impractical fantasies that distract one from facing and tackling real life. Nevertheless, I argue that the supernatural narratives do not probe into another mystical dimension that might co-exist alongside the empirical world. Rather, they imagine various cases of the characters’ crossing to voice their discontent with contemporary society or to reflect on the notion of reality. “Crossing” relates to characters’ acts or processes of trespassing the boundary that separates the supernatural from the conventional natural world, thus entailing encounters and interaction between the natural and the supernatural. The dissertation examines how crossing, as a narrative device, disturbs accustomed and mundane situations, releases hidden tensions, and discloses repressed truths in Republican fiction. There are five types of crossing in the supernatural narratives. Type 1 is the crossing into “haunted” houses. This includes (intangible) human agency crossing into domestic spaces and revealing secrets and truths concealed by the scary, feigned ‘haunting’, thus exposing the hidden evil and the other house occupiers’ silenced, suffocated state. Type 2 is men crossing into female ghosts’ apparitional residences. The female ghosts allude to heart-breaking, traumatic experiences in socio-historical reality, evoking sympathetic concern for suffering individuals who are caught in social upheavals. Type 3 is the crossing from reality into the characters’ delusional/hallucinatory realities. While they physically remain in the empirical world, the characters’ abnormal perceptions lead them to exclusive, delirious, and quasi-supernatural experiences of reality. Their crossings blur the concrete boundaries between the real and the unreal on the mental level: their abnormal perceptions construct a significant, meaningful reality for them, which may be as real as the commonly regarded objective reality. Type 4 is the crossing into the netherworld modelled on the real world in the authors’ observation and bears a spectrum of satirised objects of the Republican society. The last type is immortal visitors crossing into the human world. This type satirises humanity’s vices and destructive potential. The primary sources demonstrate their writers’ witty passion to play with super--natural notions and imagery (such as ghosts, demons, and immortals) and stitch them into vivid, engaging scenes using techniques such as the gothic, the grotesque, and the satirical, in order to evoke sentiments such as terror, horror, disgust, dis--orientation, or awe, all in service of their insights into realist issues. The works also creatively tailor traditional Chinese modes and motifs, which exemplifies the revival of Republican interest in traditional cultural heritage. The supernatural narratives may amaze or disturb the reader at first, but what is more shocking, unpleasantly nudging, or thought-provoking is the problematic society and people’s lives that the supernatural (misunderstandings) eventually reveals. They present a more compre--hensive treatment of reality than Republican literature with its revolutionary consciousness surrounding class struggle. The critical perspectives of the supernatural narratives include domestic space, unacknowledged history and marginal individuals, abnormal mentality, and pervasive weaknesses in humanity. The crossing and supernatural narratives function as a means of better understanding the lived reality. This study gathers diverse primary sources written by Republican writers from various educational and political backgrounds and interprets them from a rare perspective, thus filling a research gap. It promotes a fuller view of supernatural narratives in twentieth-century Chinese literature. In terms of reflecting the social and personal reality of the Republican era, the supernatural narratives supplement the realist fiction of the time

    Aspects of the topological dynamics of sparse graph automorphism groups

    Get PDF
    We examine sparse graph automorphism groups from the perspective of the Kechris-Pestov-Todorčević (KPT) correspondence. The sparse graphs that we discuss are Hrushovski constructions: we consider the 'ab initio’ Hrushovski construction M_0, the FraĂŻssĂ© limit of the class of 2-sparse graphs with self-sufficient closure; M_1, a simplified version of M_0; and the ω-categorical Hrushovski construction M_F. We prove a series of results that show that the automorphism groups of these Hrushovski constructions demonstrate very different behaviour to previous classes studied in the KPT context. Extending results of Evans, Hubička and NeĆĄetƙil, we show that Aut(M_0) has no coprecompact amenable subgroup. We investigate the fixed points on type spaces property, a weakening of extreme amenability, and show that for a particular choice of control function F, Aut(M_F) does not have any closed oligomorphic subgroup with this property. Next we consider the Aut(M_1)-flow of linear orders on M_1, and show that minimal subflows of this have all Aut(M_1)-orbits meagre. We give partial analogous results for the Aut(M_0)-flow of linear orders on M_0, and find the universal minimal flow of the automorphism group of the “dimension 0” part of M_0.Open Acces

    BECOMEBECOME - A TRANSDISCIPLINARY METHODOLOGY BASED ON INFORMATION ABOUT THE OBSERVER

    Get PDF
    ABSTRACT Andrea T. R. Traldi BECOMEBECOME A Transdisciplinary Methodology Based on Information about the Observer The present research dissertation has been developed with the intention to provide practical strategies and discover new intellectual operations which can be used to generate Transdisciplinary insight. For this reason, this thesis creates access to new knowledge at different scales. Firstly, as it pertains to the scale of new knowledge generated by those who attend Becomebecome events. The open-source nature of the Becomebecome methodology makes it possible for participants in Becomebecome workshops, training programmes and residencies to generate new insight about the specific project they are working on, which then reinforce and expand the foundational principles of the theoretical background. Secondly, as it pertains to the scale of the Becomebecome framework, which remains independent of location and moment in time. The method proposed to access Transdisciplinary knowledge constitutes new knowledge in itself because the sequence of activities, described as physical and mental procedures and listed as essential criteria, have never been found organised 6 in such a specific order before. It is indeed the order in time, i.e. the sequence of the ideas and activities proposed, which allows one to transform Disciplinary knowledge via a new Transdisciplinary frame of reference. Lastly, new knowledge about Transdisciplinarity as a field of study is created as a consequence of the heretofore listed two processes. The first part of the thesis is designated ‘Becomebecome Theory’ and focuses on the theoretical background and the intellectual operations necessary to support the creation of new Transdisciplinary knowledge. The second part of the thesis is designated ‘Becomebecome Practice’ and provides practical examples of the application of such operations. Crucially, the theoretical model described as the foundation for the Becomebecome methodology (Becomebecome Theory) is process-based and constantly checked against the insight generated through Becomebecome Practice. To this effect, ‘information about the observer’ is proposed as a key notion which binds together Transdisciplinary resources from several studies in the hard sciences and humanities. It is a concept that enables understanding about why and how information that is generated through Becomebecome Practice is considered of paramount importance for establishing the reference parameters necessary to access Transdisciplinary insight which is meaningful to a specific project, a specific person, or a specific moment in time

    Theorising Christian Anarchism A Political Commentary on the Gospel

    Get PDF
    This thesis argues that there is a tradition in political theology and in political theory that deserves to be called "Christian anarchism." The various thinkers that contribute to this tradition have never before been considered to be part of a theoretical movement or tradition, and the originality of this thesis is to weave these thinkers together and present a generic theory of Christian anarchism. . Taken together, thinkers like Tolstoy, Ellul, Elliott and Andrews put forward a comprehensive exegesis of Jesus' teaching and example as implying a critique of the state and a vision of a stateless society. Based on this understanding of the Gospel, they accuse both the state and the church of contradicting, betraying and corrupting the essence of Christianity. Some Christian anarchists - Eller in particular - even see Romans 13 and the "render unto Caesar" passage as not discrediting but indeed confirming their interpretation, and although more activist Christian anarchists sometimes disagree on the potential role of civil disobedience, they do all stress that what matters above all is obedience to God Moreover, they all call for the "true" church to lead the Christian anarchist revolution by example, despite the very demanding sacrifices which this involves. They point to numerous examples of similar witness ever since the early church, and themselves strive to emulate such examples in their own lives - the Catholic Worker movement being perhaps the most notable example in this regard Thus, Christian anarchist thinkers' critique of the current order and appeal to follow God's radical commandments echoes the voices of the prophets of old, calling society to return to God's covenant. By weaving their scattered voices together - by theorising Christian anarchism - this thesis provides a political commentary on the Gospel which contributes as much to political theory as it does to political theology

    Automating C++ Execution Exploration to Solve the Out-of-thin-air Problem

    Get PDF
    Modern computers are marvels of engineering. Customisable reasoning engines which can be programmed to complete complex mathematical tasks at incredible speed. Decades of engineering has taken computers from room sized machines to near invisible devices in all aspects of life. With this engineering has come more complex and ornate design, a substantial leap forward being multiprocessing. Modern processors can execute threads of program logic in parallel, coordinating shared resources like memory and device access. Parallel computation leads to significant scaling of compute power, but yields a substantial complexity cost for both processors designers and programmers. Parallel access to shared memory requires coordination on which thread can use a particular fragment of memory at a given time. Simple mechanisms like locks and mutexes ensure only one process at a time can access memory gives an easy to use programming model, but they eschew the benefits of parallel computation. Instead, processors today have complex mechanisms to permit concurrent shared memory access. These mechanisms prevent simple programmer reasoning and require complex formal descriptions to define: memory models. Early memory model research focused on weak memory behaviours which are observable because of hardware design; over time it has become obvious that not only hardware but compilers are capable of making new weak behaviours observable. Substantial and rapid success has been achieved formalising the behaviour of these machines: researchers refined new specifications for shared-memory concurrency and used mechanisation to automate validation of their models. As the models were refined and new behaviours of the hardware were discovered, researchers also began working with processor vendors – helping to inform design choices in new processor designs to keep the weak behaviours within some sensible bounds. Unfortunately when reasoning about shared memory accesses of highly optimised programming languages like C and C++, deep questions are still left open about how best to describe the behaviour of shared memory accesses in the presence of dependency removing compiler optimisations. Until very recently it has not been possible to properly specify the behaviours of these programs without forbidding ii optimisations which are used and observable, or allowing program behaviours which are nonsense and never observable. In this thesis I explore the development of memory models through the lens of tooling: taking at first an industrial approach, and then exploring memory models for highly optimised programming languages. I show that taming the complexity of these models with automated tools aids bug finding even where formal evaluation has not. Further, building tools creates a focus on the computational complexity of the memory model which in turn can steer development of the model towards simpler designs. We will look at 3 case studies: the first is an industrial hardware model of NVIDIA GPUs which we extend to encompass more hardware features than before. This extension was validated using an automated testing process generating tests of finite size, and then verified against the original memory model in Coq. The second case study is an exploration of the first memory model for an optimised programming language which takes proper account of dependencies. We build a tool to automate execution of this model over a series of tests, and in the process discovered subtleties in the definitions which were unexpected – leading to refinement of the model. In the final case study, we develop a memory model that gives a direct definition for compiler preserved dependencies. This model is the first model that can be integrated with relative ease into the C/C++ programming language standard. We built this model alongside its own tooling, yielding a fast tool for giving determinations on a large number of litmus tests – a novelty for this sort of memory model. This model fits well with the existing C/C++ specifications, and we are working with the International Standards Organisation to understand how best to fit this model in the standard

    The role of time in video understanding

    Get PDF

    International Conference on Mathematical Analysis and Applications in Science and Engineering – Book of Extended Abstracts

    Get PDF
    The present volume on Mathematical Analysis and Applications in Science and Engineering - Book of Extended Abstracts of the ICMASC’2022 collects the extended abstracts of the talks presented at the International Conference on Mathematical Analysis and Applications in Science and Engineering – ICMA2SC'22 that took place at the beautiful city of Porto, Portugal, in June 27th-June 29th 2022 (3 days). Its aim was to bring together researchers in every discipline of applied mathematics, science, engineering, industry, and technology, to discuss the development of new mathematical models, theories, and applications that contribute to the advancement of scientific knowledge and practice. Authors proposed research in topics including partial and ordinary differential equations, integer and fractional order equations, linear algebra, numerical analysis, operations research, discrete mathematics, optimization, control, probability, computational mathematics, amongst others. The conference was designed to maximize the involvement of all participants and will present the state-of- the-art research and the latest achievements.info:eu-repo/semantics/publishedVersio

    Trust and transparency in an age of surveillance

    Get PDF
    Investigating the theoretical and empirical relationships between transparency and trust in the context of surveillance, this volume argues that neither transparency nor trust provides a simple and self-evident path for mitigating the negative political and social consequences of state surveillance practices. Dominant in both the scholarly literature and public debate is the conviction that transparency can promote better-informed decisions, provide greater oversight, and restore trust damaged by the secrecy of surveillance. The contributions to this volume challenge this conventional wisdom by considering how relations of trust and policies of transparency are modulated by underlying power asymmetries, sociohistorical legacies, economic structures, and institutional constraints. They study trust and transparency as embedded in specific sociopolitical contexts to show how, under certain conditions, transparency can become a tool of social control that erodes trust, while mistrust - rather than trust - can sometimes offer the most promising approach to safeguarding rights and freedom in an age of surveillance. The first book addressing the interrelationship of trust, transparency, and surveillance practices, this volume will be of interest to scholars and students of surveillance studies as well as appeal to an interdisciplinary audience given the contributions from political science, sociology, philosophy, law, and civil society
    • 

    corecore