1,047 research outputs found

    Violence and Empathy: Jennifer Walshe’s XXX_LIVE_NUDE_GIRLS!!! as a Simulation of Acquaintance Rape

    Get PDF
    This paper is an analysis of Jennifer Walshe’s 2003 multimedia Barbie opera XXX_LIVE_NUDE_GIRLS!!!, with a particular focus on the opera’s treatment of sexual assault. I argue that in addition to depicting an instance of acquaintance rape directly in the narrative, Walshe’s entire opera can be read as a simulation of an experience of acquaintance rape and its aftermath. Drawing on sexual assault research and case studies, I demonstrate that XXX_LIVE_NUDE_GIRLS!!! creates this simulation in three ways. First, plot points are initially obscured and later clarified. This slow revelation simulates the phenomenon of delayed recognition (in which many acquaintance rape victims do not immediately recognize their experience as rape). Second, the opera’s overwhelming multiplicity of intersecting and diverging sonic, musical, visual, and textual streams simulates the complex web of communications surrounding an instance of acquaintance rape. Third, the drastic reduction of sonic and visual information and the emotionally dissonant music in the rape scene simulate the phenomenon of disassociation. By creating a simulation instead of a mere representation, Walshe engenders enhanced empathy for victims of sexual assault

    The Complete CB Handbook

    Get PDF
    https://digitalcommons.nyls.edu/fac_books/1129/thumbnail.jp

    Quijote hidalgo

    Get PDF

    The Authentic Aboriginal Voice in Rolf de Heer's 'Ten Canoes' (2006)

    Get PDF
    By privileging Aboriginal language, Aboriginal-accented narration and the Aboriginal style of story-telling ("cascading repetition narration") in "Ten Canoes", writer, co-director and co-producer Rolf de Heer has made a film promoting indigenous Australian pride. He portrays the 'magpie goose people' of Arnhem Land as empowered and in control of their language, their culture and their lives, rather than conforming with the frequent media presentation of Aboriginals as passive victims of colonial maltreatment and disrespect. An era of idyllic well-being preceding white settlement of Australia can be imagined, and de Heer convincingly takes the viewer back to that black and white time of a thousand years ago – and suggests an even earlier more rapturous and colourful Dreamtime. In doing so, unlike other 'Aboriginal' films, he tells an authentic Aboriginal story in an authentic Aboriginal manner

    Deep Secrets

    Get PDF
    Research by Jeanette Wyneken \u2778 yields surprising insights about one of Earth\u27s most ancient and mysterious creatures

    Website Fingerprinting: Attacks and Defenses

    Get PDF
    Website fingerprinting attacks allow a local, passive eavesdropper to determine a client's web activity by leveraging features from her packet sequence. These attacks break the privacy expected by users of privacy technologies, including low-latency anonymity networks such as proxies, VPNs, or Tor. As a discipline, website fingerprinting is an application of machine learning techniques to the diverse field of privacy. To perform a website fingerprinting attack, the eavesdropping attacker passively records the time, direction, and size of the client's packets. Then, he uses a machine learning algorithm to classify the packet sequence so as to determine the web page it came from. In this work we construct and evaluate three new website fingerprinting attacks: Wa-OSAD, an attack using a modified edit distance as the kernel of a Support Vector Machine, achieving greater accuracy than attacks before it; Wa-FLev, an attack that quickly approximates an edit distance computation, allowing a low-resource attacker to deanonymize many clients at once; and Wa-kNN, the current state-of-the-art attack, which is effective and fast, with a very low false positive rate in the open-world scenario. While our new attacks perform well in theoretical scenarios, there are significant differences between the situation in the wild and in the laboratory. Specifically, we tackle concerns regarding the freshness of the training set, splitting packet sequences so that each part corresponds to one web page access (for easy classification), and removing misleading noise from the packet sequence. To defend ourselves against such attacks, we need defenses that are both efficient and provable. We rigorously define and motivate the notion of a provable defense in this work, and we present three new provable defenses: Tamaraw, which is a relatively efficient way to flood the channel with fixed-rate packet scheduling; Supersequence, which uses smallest common supersequences to save on bandwidth overhead; and Walkie-Talkie, which uses half-duplex communication to significantly reduce both bandwidth and time overhead, allowing a truly efficient yet provable defense

    Meskwaki Code Talkers

    Full text link

    Meskwaki Code Talkers

    Get PDF
    • …
    corecore