5,794 research outputs found

    Australian cinema's dark sun: the boom in Australian horror film production

    Get PDF
    There has been a boom in Australian horror movie production in recent years. Daybreakers (2010), Wolf Creek (2005), Rogue (2007), Undead (2003), Black Water (2008), and Storm Warning (2006) among others, have all experienced varying degrees of popularity, mainstream visibility, and cult success in worldwide horror markets. While Aussie horror’s renaissance is widely acknowledged in industry literature, there is limited research into the extent of the boom and the dynamics of production. Consequently, there are few explanations for why and how this surge has occurred. This paper argues that the recent growth in Australian horror films has been driven by intersecting international market forces, domestic financing factors, and technological change. In so doing, it identifies two distinct tiers of Australian horror film production: ‘mainstream’ and ‘underground’ production; though overlap between these two tiers results in ‘high-end indie’ films capable of cinema release. Each tier represents the high and low-ends of Australian horror film production, each with different financing, production, and distribution models

    CAOS:Concurrent-Access Obfuscated Store

    Get PDF
    This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. Compared to the state of the art, the main advantage of CAOS is that it supports concurrent access without a proxy, for multiple read-only clients and a single read-write client. Concurrent access is achieved by letting clients maintain independent maps that describe how the data is stored. These maps might diverge from client to client, but it is guaranteed that no client will ever lose track of current data. We achieve efficiency and concurrency at the expense of perfect obfuscation: in CAOS the extent to which access patterns are hidden is determined by the resources allocated to its built-in obfuscation mechanism. To assess this trade-off we provide both a security and a performance analysis of our protocol instance. We additionally provide a proof-of-concept implementation

    Hard x-ray polarimetry with the Ramaty High Energy Solar Spectroscopic Imager (RHESSI)

    Get PDF
    Although designed primarily as a hard X-ray imager and spectrometer, the Ramaty High Energy Solar Spectroscopic Imager (RHESSI) is also capable of measuring the polarization of hard X-rays (20-100 keV) from solar flares. This capability arises from the inclusion of a small unobstructed Be scattering element that is strategically located within the cryostat that houses the array of nine germanium detectors. The Ge detectors are segmented, with both a front and rear active volume. Low energy photons (below about 100 keV) can reach a rear segment of a Ge detector only indirectly, by scattering. Low energy photons from the Sun have a direct path to the Be and have a high probability of Compton scattering into a rear segment of a Ge detector. The azimuthal distribution of these scattered photons carries with it a signature of the linear polarization of the incident flux. Sensitivity estimates, based on simulations and in-flight background measurements, indicate that a 20-100 keV polarization sensitivity of less than a few percent can be achieved for X-class flares

    Pitch Perfect: Selling to Libraries and Selling Libraries to Nonusers

    Get PDF
    Sales is the art of persuasion. It is intentional activity to move another individual (or group of individuals) to a desired outcome—for example, “no” to “yes”; “maybe” to “yes; ”yes, someday”; to “yes, now.” And, not surprisingly, there are numerous strategies for selling—challenger, consultative, high-touch, solution selling, etc. Regardless of the particular sales method in use, it is important to recognize that sales activity is purposeful, goal driven, and remarkably effective. Paradoxically, the most effective sales interactions are those where the customer does not even recognize that they have been “sold.” The mark of a great sales person is the ability to leave customers thinking that it is they—the customers—who have realized their will. This program looks at three questions related to library sales: 1) What are the characteristics that library suppliers look for in their sales personnel? 2) How do library vendors train, manage and incentivize their sales teams? 3) Should librarians—especially subject liaisons in academic libraries—be recruited, trained and managed as if they were sales workers, charged with influencing faculty and student uptake of library materials and services? While libraries generally characterize themselves as “learning organizations” as opposed to “sales organizations,” the fact remains that when libraries talk about liaisons assigned to provide “outreach” or “engagement,” they might just as well be talking about sales. And, if they were to think about library work in the context of sales, administrators would undoubtedly hire differently, manage differently, and use different criteria to evaluate and incentivize library staff. They would also recognize the need for different strategies for management, including the recruitment of experienced sales managers to direct the goals and activity of their library sales force. This program, led by librarians and professional sales managers, is intended to address the need of libraries, as customers and service providers, to understand more about the theory, practice and management of sales, including the potential use of tools like Salesforce.com to monitor and evaluate librarian performance

    Flight-Tested Prototype of BEAM Software

    Get PDF
    Researchers at JPL have completed a software prototype of BEAM (Beacon-based Exception Analysis for Multi-missions) and successfully tested its operation in flight onboard a NASA research aircraft. BEAM (see NASA Tech Briefs, Vol. 26, No. 9; and Vol. 27, No. 3) is an ISHM (Integrated Systems Health Management) technology that automatically analyzes sensor data and classifies system behavior as either nominal or anomalous, and further characterizes anomalies according to strength, duration, and affected signals. BEAM (see figure) can be used to monitor a wide variety of physical systems and sensor types in real time. In this series of tests, BEAM monitored the engines of a Dryden Flight Research Center F-18 aircraft, and performed onboard, unattended analysis of 26 engine sensors from engine startup to shutdown. The BEAM algorithm can detect anomalies based solely on the sensor data, which includes but is not limited to sensor failure, performance degradation, incorrect operation such as unplanned engine shutdown or flameout in this example, and major system faults. BEAM was tested on an F-18 simulator, static engine tests, and 25 individual flights totaling approximately 60 hours of flight time. During these tests, BEAM successfully identified planned anomalies (in-flight shutdowns of one engine) as well as minor unplanned anomalies (e.g., transient oil- and fuel-pressure drops), with no false alarms or suspected false-negative results for the period tested. BEAM also detected previously unknown behavior in the F- 18 compressor section during several flights. This result, confirmed by direct analysis of the raw data, serves as a significant test of BEAM's capability

    Calibration and Cross-Validation of Accelerometery for Estimating Movement Skills in Children Aged 8-12 Years

    Get PDF
    This study sought to calibrate triaxial accelerometery, worn on both wrists, waist and both ankles, during children’s physical activity (PA), with particular attention to object control motor skills performed at a fast and slow cadence, and to cross-validate the accelerometer cut-points derived from the calibration using an independent dataset. Twenty boys (10.1 ±1.5 years) undertook seven, five-minute bouts of activity lying supine, standing, running (4.5kmph−1) instep passing a football (fast and slow cadence), dribbling a football (fast and slow cadence), whilst wearing five GENEActiv accelerometers on their non-dominant and dominant wrists and ankles and waist. VO2 was assessed concurrently using indirect calorimetry. ROC curve analysis was used to generate cut-points representing sedentary, light and moderate PA. The cut-points were then cross-validated using independent data from 30 children (9.4 ± 1.4 years), who had undertaken similar activities whilst wearing accelerometers and being assessed for VO2. GENEActiv monitors were able to discriminate sedentary activity to an excellent level irrespective of wear location. For moderate PA, discrimination of activity was considered good for monitors placed on the dominant wrist, waist, non-dominant and dominant ankles but fair for the non-dominant wrist. Applying the cut-points to the cross-validation sample indicated that cut-points validated in the calibration were able to successfully discriminate sedentary behaviour and moderate PA to an excellent standard and light PA to a fair standard. Cut-points derived from this calibration demonstrate an excellent ability to discriminate children’s sedentary behaviour and moderate intensity PA comprising motor skill activity.N/
    • 

    corecore