236 resultados para Dramatic Literature, Criticism and Theory
Resumo:
This essay is a critique of the discourse concerned with a so coiled Crisis of Representation. It examines the role of representational media (text and drawing) in the formation of the notion of an architectural ‘work’ and argues that there is no necessary privilege to any ordering of modes of representation rather particular orderings uncover specific agendas.
Resumo:
This paper will examine the idea of the fold arid its assimilation into architecture through philosophy and mathematics. In all its iterations, the fold appears as two constitutive items: the fold as self-similarity, which implies recursion; the fold within the fold, and in turn, the fold as continuous discontinuity. The persistence of this conception of die fold will be demonstrated through a discussion of Leibniz's Monadology, Deleuze's Le Pli, and some mathematical ideas from catastrophe and chaos theory. This raises the issue of continuity between disciplines and thus the philosophical status this confers on the fold.
Resumo:
Invited Lecture for Interdisciplinary seminar, Yale School of Architecture. Seminar investigates architectural techniques of affect; topics included Adrian Stokes, Freud on aggression, Spinoza, German aesthetics, viscerality, Guattari and “concrete machines”; Other Invited guests: Peggy Deamer, Brian Massumi, Gary Genosko, Ernst Prelinger, Elizabeth Grosz, Ed Mitchell.
Resumo:
Drawing on the fields of philosophy, phenomenology, art history and theory as well as the candidate's own painting practice, this PhD explores the nature of ambiguity and semiosis in contemporary abstract painting. The thesis demonstrates how the aesthetic qualities of pause and rupture, transition and slippage work emergently to break established clichés, habits and intentions in the experiencing of abstract painting and artistic practice.
Resumo:
In this paper I describe an innovative technique for helping design students to approach and understand reading tasks. There is ample literature on design students’ use of visual thinking for design tasks, but less on how they can use their visual skills to apply to their learning in other areas, particularly those that challenge them such as academic reading and writing. I set a cartooning task as a way to get students motivated and involved in doing set readings for a design history course. This has been successful in enhancing students’ involvement and understanding, and they have been able to apply their improved understanding to writing tasks based on the cartoons.
Resumo:
Invited Presentation on my book Architecture for a Free Subjectivity. In March of 1982, Skyline, the Institute for Architecture and Urban Studies serial, published the landmark interview between Paul Rabinow, an American anthropologist, and Michel Foucault, which would only appear two years later under the title “Space, Knowledge, and Power,” in Rabinow’s edited book The Foucault Reader. Foucault said that in the spatialization of knowledge and power beginning in the 18th century, architecture is not a signifier or metaphor for power, it is rather the “technique for practising social organization.” The role of the IAUS in the architectural dissemination of Foucault’s ideas on the subject and space in the North American academy – such as the concept “heterotopia,” and Foucault’s writing on surveillance and Jeremy Bentham’s Panopticon, subsequently analysed by Georges Teyssot, who was teaching at the Venice School – is well known. Teyssot’s work is part of the historical canalization of Foucauldianism, and French subjectivity more broadly, along its dizzying path, via Italy, to American architecture schools, where it solidified in the 1980s paradigm that would come to be known as American architecture theory. Foucault was already writing on incarceration and prisons, from the 1970s. (In the 1975 lectures he said “architecture was responsible for the invention of madness.”) But this work was not properly incorporated into architectural discussion until the early ’80s. What is not immediately apparent, what this history suggests to me is that subjectivity was not a marginal topic within “theory”, but was perhaps a platform and entry point for architecture theory. One of the ideas that I’m working on is that “theory” can be viewed, historically, as the making of architectural subjectivity, something that can be traced back to the Frankfurt School critique which begins with the modern subject...
Resumo:
An Interview with John Rajchman, Department of Art History, Columbia University, on Architecture, Deleuze and Foucault at his apartment, Riverside Drive, New York City, February 10, 2003.
Resumo:
My thesis is an exploration of the architectural production surrounding the French philosopher Gilles Deleuze, specifically, through the overarching theme of Deleuze’s theory of subjectivity, which I will call subjectivization. I interpret this to mean the strange coalescence of matter, architectural subject, and event, in architectural experience and culture. I speculate that subjectivization presents a yet under-explored dimension of deleuzianism in architecture. In order to develop this I pursue two independent trajectories: firstly the narrative of architectural production surrounding Deleuze, from the 1970s until today, as it is an emergence of changing groupings, alliances, formations and disbandment in the pursuit of creative-intellectual tasks—what might be called the subjectivization of architecture—and, secondly, through a speculation about the architecture of subjectivization—that is, an attempt to explore, concretely, what might be the space and time of subjectivization. Chapter One traces an oral history of deleuzianism in architecture, through conversations with Sanford Kwinter and John Rajchman, describing how the Deleuze milieu makes its way into architectural practice and discussion—subjectivization as a social and cultural emergence—whereas Chapter Two theorizes the emergence of an architectural subjectivity where architecture constitutes its own affective event—what I call subjectivization or material becoming-subject.
Resumo:
Proton-bound dimers consisting of two glycerophospholipids with different headgroups were prepared using negative ion electrospray ionization and dissociated in a triple quadrupole mass spectrometer. Analysis of the tandem mass spectra of the dimers using the kinetic method provides, for the first time, an order of acidity for the phospholipid classes in the gas phase of PE < PA << PG < PS < PI. Hybrid density functional calculations on model phospholipids were used to predict the absolute deprotonation enthalpies of the phospholipid classes from isodesmic proton transfer reactions with phosphoric acid. The computational data largely support the experimental acidity trend, with the exception of the relative acidity ranking of the two most acidic phospholipid species. Possible causes of the discrepancy between experiment and theory are discussed and the experimental trend is recommended. The sequence of gas phase acidities for the phospholipid headgroups is found to (1) have little correlation with the relative ionization efficiencies of the phospholipid classes observed in the negative ion electrospray process, and (2) correlate well with fragmentation trends observed upon collisional activation of phospholipid \[M - H](-) anions. (c) 2005 American Society for Mass Spectrometry.
Resumo:
Mitchell critiques Georges Perec's Life a User's Manual, which articulates compellingly the confluence of literature and architecture studies that emerged in the late twentieth century. He argues the Perec's novel diverges from this tradition, for, rather than being a search for origins and true expression, Life a User's Manual denies the very possibility of originality. He adds that Perec's architext is de-constructive and ironic.
Resumo:
In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.