2 resultados para Prepackaged commodities, Checking of.
em Digital Commons - Michigan Tech
Resumo:
How do prevailing narratives about Native Americans, particularly in the medium of film, conspire to promote the perspective of the dominant culture? What makes the appropriation of Indigenous images so metaphorically popular? In the past hundred years, little has changed in the forms of representation favored by Hollywood. The introductory chapter elucidates the problem and outlines the scope of this study. As each subsequent chapter makes clear, the problem is as relevant today as it has been throughout the entire course of filmic history. Chapter Two analyzes representational trends and defines each decade according to its favorite stereotype. The binary of the bloodthirsty savage is just as prevalent as it was during the 1920s and 30s. The same holds true for the drunken scapegoat and the exotic maiden, which made their cinematic debuts in the 1940s and 50s. But Hollywood has added new types as well. The visionary peacemaker and environmental activist have also made an appearance within the last forty years. What matters most is not the realism of these images, but rather the purposes to which they can be put toward validating whatever concerns the majority filmmakers wish to promote. Whether naïvely or not, such representations continue to evacuate Indigenous agency to the advantage of the majority. A brief historical overview confirms this legacy. Various disciplines have sought to interrogate this problem. Chapter three investigates the field of postcolonial studies, which makes inquiry into the various ways these narratives are produced, marketed, and consumed. It also raises the key questions of for whom, and by whom, these narratives are constructed. Additional consideration is given to their value as commodities in the mass marketplace. Typically the products of a boutique-multiculturalism, their storylines are apt to promote the prevailing point of view. Critical theory provides a foundational framework for chapter four. What is the blockbuster formula and how do the instruments of capital promote it? Concepts such as culture industry and repressive tolerance examine both the function and form of the master narrative, as well as its use to control the avenues of dissent. Moreover, the public sphere and its diminishment highlight the challenges inherent in the widespread promotion of an alternative set of narratives. Nonetheless, challenges to prevailing narratives do exist, particularly in the form of Trickster narratives. Often subject to persistent misrecognition, the Trickster demonstrates a potent form of agency that undeniably dismantles the hegemony of Western cinema. The final chapter examines some of the Trickster's more subtle and obscure productions. Usually subjugated to the realm of the mystical, rather than the mythical, these misinterpreted forms have the power to speak in circles around a majority audience. Intended for an Other audience, they are coded in a language that delivers a type of direction through indirection, promoting a poignant agency all their own.
MINING AND VERIFICATION OF TEMPORAL EVENTS WITH APPLICATIONS IN COMPUTER MICRO-ARCHITECTURE RESEARCH
Resumo:
Computer simulation programs are essential tools for scientists and engineers to understand a particular system of interest. As expected, the complexity of the software increases with the depth of the model used. In addition to the exigent demands of software engineering, verification of simulation programs is especially challenging because the models represented are complex and ridden with unknowns that will be discovered by developers in an iterative process. To manage such complexity, advanced verification techniques for continually matching the intended model to the implemented model are necessary. Therefore, the main goal of this research work is to design a useful verification and validation framework that is able to identify model representation errors and is applicable to generic simulators. The framework that was developed and implemented consists of two parts. The first part is First-Order Logic Constraint Specification Language (FOLCSL) that enables users to specify the invariants of a model under consideration. From the first-order logic specification, the FOLCSL translator automatically synthesizes a verification program that reads the event trace generated by a simulator and signals whether all invariants are respected. The second part consists of mining the temporal flow of events using a newly developed representation called State Flow Temporal Analysis Graph (SFTAG). While the first part seeks an assurance of implementation correctness by checking that the model invariants hold, the second part derives an extended model of the implementation and hence enables a deeper understanding of what was implemented. The main application studied in this work is the validation of the timing behavior of micro-architecture simulators. The study includes SFTAGs generated for a wide set of benchmark programs and their analysis using several artificial intelligence algorithms. This work improves the computer architecture research and verification processes as shown by the case studies and experiments that have been conducted.