154 resultados para Thoynard, Nicolas, 1629-1706.
em Queensland University of Technology - ePrints Archive
Resumo:
This paper explores an early modern application of the Stoic principle of similitudo temporum to the study of history. In so doing, it highlights the tension between historiography and antiquarianism, suggesting that the collection of remains – whether material or immaterial – was understood in at least some early modern circles as an integral part of the historiographic process. It also emphasises the evolving meaning of “history” during this time, drawing attention to the perceived novelty of such antiquarian approaches to the study of the past, and briefly exploring subtle differences between the example at hand and the work and activities of better-known figures such as Nicolas-Claude Fabri de Peiresc and Justus Lipsius. As such, this paper makes a contribution to our evolving understanding of early modern scholarship, and draws attention to the variegated approaches of its practitioners to contemporary issues.
Resumo:
This work aims to take advantage of recent developments in joint factor analysis (JFA) in the context of a phonetically conditioned GMM speaker verification system. Previous work has shown performance advantages through phonetic conditioning, but this has not been shown to date with the JFA framework. Our focus is particularly on strategies for combining the phone-conditioned systems. We show that the classic fusion of the scores is suboptimal when using multiple GMM systems. We investigate several combination strategies in the model space, and demonstrate improvement over score-level combination as well as over a non-phonetic baseline system. This work was conducted during the 2008 CLSP Workshop at Johns Hopkins University.
Resumo:
This work presents an extended Joint Factor Analysis model including explicit modelling of unwanted within-session variability. The goals of the proposed extended JFA model are to improve verification performance with short utterances by compensating for the effects of limited or imbalanced phonetic coverage, and to produce a flexible JFA model that is effective over a wide range of utterance lengths without adjusting model parameters such as retraining session subspaces. Experimental results on the 2006 NIST SRE corpus demonstrate the flexibility of the proposed model by providing competitive results over a wide range of utterance lengths without retraining and also yielding modest improvements in a number of conditions over current state-of-the-art.
Resumo:
As virtual communities become more central to the everyday activities of connected individuals, we face increasingly pressing questions about the proper allocation of power, rights and responsibilities. This paper argues that our current legal discourse is ill-equipped to provide answers that will safeguard the legitimate interests of participants and simultaneously refrain from limiting the future innovative development of these spaces. From social networking sites like Facebook to virtual worlds like World of Warcraft and Second Life, participants who are banned from these communities stand to lose their virtual property, their connections to their friends and family, and their personal expression. Because our legal system views the proprietor’s interests as absolute private property rights, however, participants who are arbitrarily, capriciously or maliciously ejected have little recourse under law. This paper argues that, rather than assuming that a private property and freedom of contract model will provide the most desirable outcomes, a more critical approach is warranted. By rejecting the false dichotomy between ‘public’ and ‘private’ spaces, and recognising some of the absolutist and necessitarian trends in the current property debate, we may be able to craft legal rules that respect the social bonds between participants while simultaneously protecting the interests of developers.
Resumo:
This article examines the role of the recently introduced fair dealing exception for the purposes of parody and satire in Australian copyright law. Parody and satire, while central to Australian expression, pose a substantial challenge for copyright policy. The law is asked to strike a delicate balance between an author’s right to exploit their work, the interests of the public in stimulating free speech and critical discussion, the rights of artists who rely on existing material in creating their own expression, and the rights of all artists in their reputation and the integrity of their works. This article highlights the difficulty parodists and satirists have historically faced in Australia and examines the potential of the new fair dealing exceptions to relieve this difficulty. This article concludes that the new exceptions have the potential, if read broadly, not only to bridge the gap between humorous and non-humorous criticism, but also to allow for the use of copyright material to critique figures other than the copyright owner or author, extending to society generally. This article will argue that the new exceptions should be read broadly to further this important policy goal while also being limited in their application so as to prevent mere substitutable uses of copyright material. To achieve these twin goals, I suggest that the primary indication of fairness of an unlicensed parody should be whether or not it adds significant new expression so as not to be substitutable for the original work.
Resumo:
This Report, prepared for Smart Service Queensland (“SSQ”), addresses legal issues, areas of risk and other factors associated with activities conducted on three popular online platforms—YouTube, MySpace and Second Life (which are referred to throughout this Report as the “Platforms”). The Platforms exemplify online participatory spaces and behaviours, including blogging and networking, multimedia sharing, and immersive virtual environments.
Resumo:
This project proposes a new conceptual framework for the regulation of social networks and virtual communities. By applying a model based upon the rule of law, this thesis addresses the growing tensions that revolve around the public use of private networks. This research examines the shortcomings of traditional contractual governance models and cyberlaw theory and provides a reconstituted approach that will allow public constitutional-type interests to be recognised in the interpretation and enforcement of contractual doctrine.
Resumo:
There is a severe tendency in cyberlaw theory to delegitimize state intervention in the governance of virtual communities. Much of the existing theory makes one of two fundamental flawed assumptions: that communities will always be best governed without the intervention of the state; or that the territorial state can best encourage the development of communities by creating enforceable property rights and allowing the market to resolve any disputes. These assumptions do not ascribe sufficient weight to the value-laden support that the territorial state always provides to private governance regimes, the inefficiencies that will tend to limit the development utopian communities, and the continued role of the territorial state in limiting autonomy in accordance with communal values. In order to overcome these deterministic assumptions, this article provides a framework based upon the values of the rule of law through which to conceptualise the legitimacy of the private exercise of power in virtual communities. The rule of law provides a constitutional discourse that assists in considering appropriate limits on the exercise of private power. I argue that the private contractual framework that is used to govern relations in virtual communities ought to be informed by the values of the rule of law in order to more appropriately address the governance tensions that permeate these spaces. These values suggest three main limits to the exercise of private power: that governance is limited by community rules and that the scope of autonomy is limited by the substantive values of the territorial state; that private contractual rules should be general, equal, and certain; and that, most importantly, internal norms be predicated upon the consent of participants.
Resumo:
The structure and thermal stability between typical China kaolinite and halloysite were analysed by X-ray diffraction (XRD), infrared spectroscopy, infrared emission spectroscopy (IES) and Raman spectroscopy. Infrared emission spectroscopy over the temperature range of 300 to 700 °C has been used to characterise the thermal decomposition of both kaolinite and halloysite. Halloysite is characterised by two bands in the water bending region at 1629 and 1648 cm-1, attributed to structure water and coordinated water in the interlayer. Well defined hydroxyl stretching bands at around 3695, 3679, 3652 and 3625 cm-1 are observed for both kaolinite and halloysite. In the 550 °C infrared emission spectrum of halloysite is similar to that of kaolinite in 650-1350 cm-1 region. The infrared emission spectra of halloysite were found to be considerably different to that of kaolinite at lower temperatures. This difference is attributed to the fundamental difference in the structure of the two minerals.
Resumo:
This article examines the problem of patent ambush in standard setting, where patent owners are sometimes able to capture industry standards in order to secure monopoly power and windfall profits. Because standardisation generally introduces high switching costs, patent ambush can impose significant costs on downstream manufacturers and consumers and drastically reduce the efficiency gains of standardisation.This article considers how Australian competition law is likely to apply to patent ambush both in the development of a standard (through misrepresenting the existence of an essential patent) and after a standard is implemented (through refusing to license an essential patented technology either at all or on reasonable and non-discriminatory (RAND) terms). This article suggests that non-disclosure of patent interests is unlikely to restrained by Part IV of the Trade Practices Act (TPA), and refusals to license are only likely to be restrained if the refusal involves leveraging or exclusive dealing. By contrast, Standard Setting Organisations (SSOs) which seek to limit this behaviour through private ordering may face considerable scrutiny under the new cartel provisions of the TPA. This article concludes that SSOs may be best advised to implement administrative measures to prevent patent hold-up, such as reviewing which patents are essential for the implementation of a standard, asking patent holders to make their licence conditions public to promote transparency, and establishing forums where patent licensees can complain about licence terms that they consider to be unreasonable or discriminatory. Additionally, the ACCC may play a role in authorising SSO policies that could otherwise breach the new cartel provisions, but which have the practical effect of promoting competition in the standards setting environment.
Resumo:
The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.
Resumo:
As online social spaces continue to grow in importance, the complex relationship between users and the private providers of the platforms continues to raise increasingly difficult questions about legitimacy in online governance. This article examines two issues that go to the core of egitimate governance in online communities: how are rules enforced and punishments imposed, and how should the law support legitimate governance and protect participants from the illegitimate exercise of power? Because the rules of online communities are generally ultimately backed by contractual terms of service, the imposition of punishment for the breach of internal rules exists in a difficult conceptual gap between criminal law and the predominantly compensatory remedies of contractual doctrine. When theorists have addressed the need for the rules of virtual communities to be enforced, a dichotomy has generally emerged between the appropriate role of criminal law for 'real' crimes, and the private, internal resolution of 'virtual' or 'fantasy' crimes. In this structure, the punitive effect of internal measures is downplayed and the harm that can be caused to participants by internal sanctions is systemically undervalued.
Resumo:
In an attempt to curb online copyright infringement, copyright owners are increasingly seeking to enlist the assistance of Internet Service Providers (‘ISPs’) to enforce copyright and impose sanctions on their users.1 Commonly termed ‘graduated response’ schemes, these measures generally require that the ISP take some action against users suspected of infringing copyright, ranging from issuing warnings, to collating allegations made against subscribers and reporting to copyright owners, to suspension and eventual termination of service.