195 research outputs found

    Art and celebrity : a study of the celebritisation of artists in Taiwan 1987-2010

    Get PDF
    This thesis examines the emergence of celebrity art in Taiwan in the postmartial law period since 1987. It analyses the different forces that have contributed to the construction of celebrity art as a prevalent phenomenon and explores its changing significance in Taiwan’s contemporary art scene and society. Based on extensive primary evidence from different kinds of materials, including journals and newspaper articles, magazine reports, exhibition catalogues and reviews, television programmes and Internet resources, gallery and museum visits, and interviews with celebrity artists and curators, this thesis argues that the construction of celebrity art in Taiwan demonstrates a constant negotiation between artists’ aspirations for celebrity recognition, media, corporate business and political interests. I argue that in the celebritisation process, businesses and corporations utilise art to cultivate a positive brand image, generate commercial activities, accumulate cultural capital and consolidate their power and influence. In this sense, celebrity art becomes an aspect of business operations, in ways that are similar to those criticised by scholar Julian Stallabrass’s in the Western context. However, the development of corporate art intervention in Taiwan has distinctive features which are associated with the process of democratisation and its strong impact on the emergence of celebrity art. Furthermore, the government’s promotion of celebrity artists has enabled it to promote its national political identity in the global arena. This relates especially to the changing political scene in Taiwan since 1987 in which that celebrity art has become a means for different political parties to express their political concerns. At the same time, these processes have empowered artists to engage with larger social, cultural and political forces, demonstrating the capacity of celebrity art to serve as a vehicle of new social and aesthetic values about issues such as gender and womanhood. Certain aspects of Taiwan’s celebrity art also contribute to a new ‘cool’, largely young, and socially distinctive urban taste culture in Taiwan, by bringing innovative characteristics to Taiwan’s art scene that bridge high and popular culture. The celebritisation of art in Taiwan thus has many similarities with those discussed by Walker, Stallabrass and other Western scholars with reference to Western tendencies, but is distinctive in its political and social-economic causes. The first chapter introduces my aims and arguments, and gives an overview of the historical and political, media, institutional and global changes that facilitated the emergence of celebrity art in Taiwan. This chapter also describes my research methodology. Chapter two provides an analysis of relevant historical and theoretical perspectives on the construction of the celebrity and celebrity art, and examines their social, cultural and economic importance in both Western and East Asian societies. Chapter three to seven respectively examine different cases of celebrity artists, namely Lee Ming-sheng, Chu Cha-ray, Cai Guoqiang, Tang Huang-chen and the VT Artsalon group. Each of the cases exemplifies particular features—overlapping with and distinct from each other—of the concept of celebrity art in Taiwan. Through close examination of these cases, the thesis investigates an important aspect of Taiwan’s changing art scene that has not to date featured in scholarly work on contemporary culture in Taiwan.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    Adjacency Matrices of Configuration Graphs

    Get PDF
    In 1960, Hoffman and Singleton \cite{HS60} solved a celebrated equation for square matrices of order nn, which can be written as (Îș−1)In+Jn−AAT=A (\kappa - 1) I_n + J_n - A A^{\rm T} = A where InI_n, JnJ_n, and AA are the identity matrix, the all one matrix, and a (0,1)(0,1)--matrix with all row and column sums equal to Îș\kappa, respectively. If AA is an incidence matrix of some configuration C\cal C of type nÎșn_\kappa, then the left-hand side Θ(A):=(Îș−1)In+Jn−AAT\Theta(A):= (\kappa - 1)I_n + J_n - A A^{\rm T} is an adjacency matrix of the non--collinearity graph Γ\Gamma of C\cal C. In certain situations, Θ(A)\Theta(A) is also an incidence matrix of some nÎșn_\kappa configuration, namely the neighbourhood geometry of Γ\Gamma introduced by Lef\`evre-Percsy, Percsy, and Leemans \cite{LPPL}. The matrix operator Θ\Theta can be reiterated and we pose the problem of solving the generalised Hoffman--Singleton equation Θm(A)=A\Theta^m(A)=A. In particular, we classify all (0,1)(0,1)--matrices MM with all row and column sums equal to Îș\kappa, for Îș=3,4\kappa = 3,4, which are solutions of this equation. As a by--product, we obtain characterisations for incidence matrices of the configuration 103F10_3F in Kantor's list \cite{Kantor} and the 17417_4 configuration #1971 in Betten and Betten's list \cite{BB99}

    Perfect Secrecy Systems Immune to Spoofing Attacks

    Full text link
    We present novel perfect secrecy systems that provide immunity to spoofing attacks under equiprobable source probability distributions. On the theoretical side, relying on an existence result for tt-designs by Teirlinck, our construction method constructively generates systems that can reach an arbitrary high level of security. On the practical side, we obtain, via cyclic difference families, very efficient constructions of new optimal systems that are onefold secure against spoofing. Moreover, we construct, by means of tt-designs for large values of tt, the first near-optimal systems that are 5- and 6-fold secure as well as further systems with a feasible number of keys that are 7-fold secure against spoofing. We apply our results furthermore to a recently extended authentication model, where the opponent has access to a verification oracle. We obtain this way novel perfect secrecy systems with immunity to spoofing in the verification oracle model.Comment: 10 pages (double-column); to appear in "International Journal of Information Security

    Steiner t-designs for large t

    Full text link
    One of the most central and long-standing open questions in combinatorial design theory concerns the existence of Steiner t-designs for large values of t. Although in his classical 1987 paper, L. Teirlinck has shown that non-trivial t-designs exist for all values of t, no non-trivial Steiner t-design with t > 5 has been constructed until now. Understandingly, the case t = 6 has received considerable attention. There has been recent progress concerning the existence of highly symmetric Steiner 6-designs: It is shown in [M. Huber, J. Algebr. Comb. 26 (2007), pp. 453-476] that no non-trivial flag-transitive Steiner 6-design can exist. In this paper, we announce that essentially also no block-transitive Steiner 6-design can exist.Comment: 9 pages; to appear in: Mathematical Methods in Computer Science 2008, ed. by J.Calmet, W.Geiselmann, J.Mueller-Quade, Springer Lecture Notes in Computer Scienc

    The closest elastic tensor of arbitrary symmetry to an elasticity tensor of lower symmetry

    Get PDF
    The closest tensors of higher symmetry classes are derived in explicit form for a given elasticity tensor of arbitrary symmetry. The mathematical problem is to minimize the elastic length or distance between the given tensor and the closest elasticity tensor of the specified symmetry. Solutions are presented for three distance functions, with particular attention to the Riemannian and log-Euclidean distances. These yield solutions that are invariant under inversion, i.e., the same whether elastic stiffness or compliance are considered. The Frobenius distance function, which corresponds to common notions of Euclidean length, is not invariant although it is simple to apply using projection operators. A complete description of the Euclidean projection method is presented. The three metrics are considered at a level of detail far greater than heretofore, as we develop the general framework to best fit a given set of moduli onto higher elastic symmetries. The procedures for finding the closest elasticity tensor are illustrated by application to a set of 21 moduli with no underlying symmetry.Comment: 48 pages, 1 figur

    Families of twisted tensor product codes

    Get PDF
    Using geometric properties of the variety \cV_{r,t}, the image under the Grassmannian map of a Desarguesian (t−1)(t-1)-spread of \PG(rt-1,q), we introduce error correcting codes related to the twisted tensor product construction, producing several families of constacyclic codes. We exactly determine the parameters of these codes and characterise the words of minimum weight.Comment: Keywords: Segre Product, Veronesean, Grassmannian, Desarguesian spread, Subgeometry, Twisted Product, Constacyclic error correcting code, Minimum weigh
    • 

    corecore