229 resultados para minimalist hardware architecture


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited Lecture for Interdisciplinary seminar, Yale School of Architecture. Seminar investigates architectural techniques of affect; topics included Adrian Stokes, Freud on aggression, Spinoza, German aesthetics, viscerality, Guattari and “concrete machines”; Other Invited guests: Peggy Deamer, Brian Massumi, Gary Genosko, Ernst Prelinger, Elizabeth Grosz, Ed Mitchell.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In October 2012, Simone presented her book Architecture for a Free Subjectivity to the University of Michigan, Taubman College of Architecture and Urban Planning. This book explores the architectural significance of Deleuze’s philosophy of subjectivization, and Guattari’s overlooked dialogue on architecture and subjectivity. In doing so, it proposes that subjectivity is no longer the exclusive provenance of human beings, but extends to the architectural, the cinematic, the erotic, and the political. It defines a new position within the literature on Deleuze and architecture, while highlighting the neglected issue of subjectivity in contemporary discussion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis was the first to define individual lava flow chemical variation and a detailed definition of the Kalkarindji Continental Flood Basalt Province, a lesser known province of the Phanerozoic eon. This thesis conducted an intensive field study that yielded numerous samples for petrography and chemical analyses as well as the generation of a detailed map of a portion of the Kalkarindji province.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited Presentation on my book Architecture for a Free Subjectivity. In March of 1982, Skyline, the Institute for Architecture and Urban Studies serial, published the landmark interview between Paul Rabinow, an American anthropologist, and Michel Foucault, which would only appear two years later under the title “Space, Knowledge, and Power,” in Rabinow’s edited book The Foucault Reader. Foucault said that in the spatialization of knowledge and power beginning in the 18th century, architecture is not a signifier or metaphor for power, it is rather the “technique for practising social organization.” The role of the IAUS in the architectural dissemination of Foucault’s ideas on the subject and space in the North American academy – such as the concept “heterotopia,” and Foucault’s writing on surveillance and Jeremy Bentham’s Panopticon, subsequently analysed by Georges Teyssot, who was teaching at the Venice School – is well known. Teyssot’s work is part of the historical canalization of Foucauldianism, and French subjectivity more broadly, along its dizzying path, via Italy, to American architecture schools, where it solidified in the 1980s paradigm that would come to be known as American architecture theory. Foucault was already writing on incarceration and prisons, from the 1970s. (In the 1975 lectures he said “architecture was responsible for the invention of madness.”) But this work was not properly incorporated into architectural discussion until the early ’80s. What is not immediately apparent, what this history suggests to me is that subjectivity was not a marginal topic within “theory”, but was perhaps a platform and entry point for architecture theory. One of the ideas that I’m working on is that “theory” can be viewed, historically, as the making of architectural subjectivity, something that can be traced back to the Frankfurt School critique which begins with the modern subject...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reconfigurable computing devices can increase the performance of compute intensive algorithms by implementing application specific co-processor architectures. The power cost for this performance gain is often an order of magnitude less than that of modern CPUs and GPUs. Exploiting the potential of reconfigurable devices such as Field-Programmable Gate Arrays (FPGAs) is typically a complex and tedious hardware engineering task. Re- cently the major FPGA vendors (Altera, and Xilinx) have released their own high-level design tools, which have great potential for rapid development of FPGA based custom accelerators. In this paper, we will evaluate Altera’s OpenCL Software Development Kit, and Xilinx’s Vivado High Level Sythesis tool. These tools will be compared for their per- formance, logic utilisation, and ease of development for the test case of a Tri-diagonal linear system solver.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An Interview with John Rajchman, Department of Art History, Columbia University, on Architecture, Deleuze and Foucault at his apartment, Riverside Drive, New York City, February 10, 2003.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

My thesis is an exploration of the architectural production surrounding the French philosopher Gilles Deleuze, specifically, through the overarching theme of Deleuze’s theory of subjectivity, which I will call subjectivization. I interpret this to mean the strange coalescence of matter, architectural subject, and event, in architectural experience and culture. I speculate that subjectivization presents a yet under-explored dimension of deleuzianism in architecture. In order to develop this I pursue two independent trajectories: firstly the narrative of architectural production surrounding Deleuze, from the 1970s until today, as it is an emergence of changing groupings, alliances, formations and disbandment in the pursuit of creative-intellectual tasks—what might be called the subjectivization of architecture—and, secondly, through a speculation about the architecture of subjectivization—that is, an attempt to explore, concretely, what might be the space and time of subjectivization. Chapter One traces an oral history of deleuzianism in architecture, through conversations with Sanford Kwinter and John Rajchman, describing how the Deleuze milieu makes its way into architectural practice and discussion—subjectivization as a social and cultural emergence—whereas Chapter Two theorizes the emergence of an architectural subjectivity where architecture constitutes its own affective event—what I call subjectivization or material becoming-subject.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For a decade, embedded driving assistance systems were mainly dedicated to the management of short time events (lane departure, collision avoidance, collision mitigation). Recently a great number of projects have been focused on cooperative embedded devices in order to extend environment perception. Handling an extended perception range is important in order to provide enough information for both path planning and co-pilot algorithms which need to anticipate events. To carry out such applications, simulation has been widely used. Simulation is efficient to estimate the benefits of Cooperative Systems (CS) based on Inter-Vehicular Communications (IVC). This paper presents a new and modular architecture built with the SiVIC simulator and the RTMaps™ multi-sensors prototyping platform. A set of improvements, implemented in SiVIC, are introduced in order to take into account IVC modelling and vehicles’ control. These 2 aspects have been tuned with on-road measurements to improve the realism of the scenarios. The results obtained from a freeway emergency braking scenario are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprise architectures are exposed to fast emerging business and information technology capabilities. A prominent example is the paradigm of service-orientation, which leads to its own architectural requirements and impacts the design and ongoing evolution of Enterprise Architectures. This thesis develops the first theoretical model describing enterprise architecture evolution and outcomes in light of a changing IT landscape such as service-oriented architectures. The developed theoretical model explains enterprise architecture evolution, its main stages and related capabilities. This model can be used to derive theoretical, sound guidelines to manage enterprise architectures in a changing environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-touch interfaces across a wide range of hardware platforms are becoming pervasive. This is due to the adoption of smart phones and tablets in both the consumer and corporate market place. This paper proposes a human-machine interface to interact with unmanned aerial systems based on the philosophy of multi-touch hardware-independent high-level interaction with multiple systems simultaneously. Our approach incorporates emerging development methods for multi-touch interfaces on mobile platforms. A framework is defined for supporting multiple protocols. An open source solution is presented that demonstrates: architecture supporting different communications hardware; an extensible approach for supporting multiple protocols; and the ability to monitor and interact with multiple UAVs from multiple clients simultaneously. Validation tests were conducted to assess the performance, scalability and impact on packet latency under different client configurations.