910 resultados para indivisible objects
Resumo:
This essay argues that the deployment of spatial metaphor in the writing of Michel Foucault is indivisible from his spatial politics. Beginning with his 1967 essay "Of Other Spaces," the development of Foucault's spatial politics and his growing awareness of the importance to his work of spatial (particularly geographic) metaphors can be charted. The focus here is not the concretisation of Foucault's early spatial obsessions—particularly with regard to the concept of "heterotopia"—into a theory or model. Rather, I am concerned with the way in which those obsessions inform Foucault's major works, in particular The Archaeology of Knowledge and Discipline and Punish. These works, I argue, do not develop a theory of space, but instead perform, through their rhetoric, a kind of spatial praxis. In this sense, Foucault's metaphors become "spatial techniques" for the practice and production of power–knowledge.
Resumo:
This time last year we proposed the theme of the 'loop' issue to the M/C collective because it sounded deeply cool, satisfying our poststructuralist posturings about reflexivity and representation, while also tapping into everyday cultural objects and practices. We expected that the 'loop' issue would generate some interesting and varied responses, and it did. We received submissions about music, visual art, language, child development, pop-cultural artefacts, mathematics and culture in general. These explorations of disparate fields seemed, however, to be tied together by a common thread: the concept of "generation" itself. Each article in the 'loop' issue describes a loop that does not simply repeat an original operation, but that through iteration creates new possibilities and new meanings...
Resumo:
Quantum-inspired models have recently attracted increasing attention in Information Retrieval. An intriguing characteristic of the mathematical framework of quantum theory is the presence of complex numbers. However, it is unclear what such numbers could or would actually represent or mean in Information Retrieval. The goal of this paper is to discuss the role of complex numbers within the context of Information Retrieval. First, we introduce how complex numbers are used in quantum probability theory. Then, we examine van Rijsbergen’s proposal of evoking complex valued representations of informations objects. We empirically show that such a representation is unlikely to be effective in practice (confuting its usefulness in Information Retrieval). We then explore alternative proposals which may be more successful at realising the power of complex numbers.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
Sustainability has become one of the important research topics in the field of Human Computer Interaction (HCI). However, the majority of work has focused on the Western culture. In this paper, we explore sustainable household practices in the developing world. Our research draws on the results from an ethnographic field study of household women belonging to the so-called middle class in India. We analyze our results in the context of Blevis' [4] principles of sustainable interaction design (established within the Western culture), to extract the intercultural aspects that need to be considered for designing technologies. We present examples from the field that we term "domestic artefacts". Domestic artefacts represent creative and sustainable ways household women appropriate and adapt used objects to create more useful and enriching objects that support household members' everyday activities. Our results show that the rationale behind creating domestic artefacts is not limited to the practicality and usefulness, but it shows how religious beliefs, traditions, family intimacy, personal interests and health issues are incorporated into them.
Resumo:
Physical design objects such as sketches, drawings, collages, storyboards and models play an important role in supporting communication and coordination in design studios. CAM (Cooperative Artefact Memory) is a mobile-tagging based messaging system that allows designers to collaboratively store relevant information onto their design objects in the form of messages, annotations and external web links. We studied the use of CAM in a Product Design studio over three weeks, involving three different design teams. In this paper, we briefly describe CAM and show how it serves as 'object memory'.
Resumo:
Body and Forgetting is a powerful dance performance that brings together the work of choreographer Liz Roche and film maker Alan Gilsenan, with a live score by Denis Roche. Inspired by the writings of Milan Kundera, Liz Roche Company's remarkable dancers find their way through delicately woven circumstances of disappearance, loss, relationship and hope. Their attempts to hold fast to memories and objects of meaning is at the heart of this work. The live performers move in dialogue with filmed versions of their dancing selves. They re-write their histories, make better endings to their stories, say what they regret not having said. These filmed reflections or versions of themselves, by offering a mirror, ultimately bring the performers back to themselves, richer from the experience.
Resumo:
We present a novel approach for multi-object detection in aerial videos based on tracking. The proposed method mainly involves three steps. Firstly, the spatial-temporal saliency is employed to detect moving objects. Secondly, the detected objects are tracked by mean shift in the subsequent frames. Finally, the saliency results are fused with the weight map generated by tracking to get refined detection results, and in turn the modified detection results are used to update the tracking models. The proposed algorithm is evaluated on VIVID aerial videos, and the results show that our approach can reliably detect moving objects even in challenging situations. Meanwhile, the proposed method can process videos in real time, without the effect of time delay.
Resumo:
In this paper, the problem of moving object detection in aerial video is addressed. While motion cues have been extensively exploited in the literature, how to use spatial information is still an open problem. To deal with this issue, we propose a novel hierarchical moving target detection method based on spatiotemporal saliency. Temporal saliency is used to get a coarse segmentation, and spatial saliency is extracted to obtain the object’s appearance details in candidate motion regions. Finally, by combining temporal and spatial saliency information, we can get refined detection results. Additionally, in order to give a full description of the object distribution, spatial saliency is detected in both pixel and region levels based on local contrast. Experiments conducted on the VIVID dataset show that the proposed method is efficient and accurate.
Resumo:
At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
This paper presents a robust place recognition algorithm for mobile robots that can be used for planning and navigation tasks. The proposed framework combines nonlinear dimensionality reduction, nonlinear regression under noise, and Bayesian learning to create consistent probabilistic representations of places from images. These generative models are incrementally learnt from very small training sets and used for multi-class place recognition. Recognition can be performed in near real-time and accounts for complexity such as changes in illumination, occlusions, blurring and moving objects. The algorithm was tested with a mobile robot in indoor and outdoor environments with sequences of 1579 and 3820 images, respectively. This framework has several potential applications such as map building, autonomous navigation, search-rescue tasks and context recognition.
Resumo:
Designing systems for multiple stakeholders requires frequent collaboration with multiple stakeholders from the start. In many cases at least some stakeholders lack a professional habit of formal modeling. We report observations from student design teams as well as two case studies, respectively of a prototype for supporting creative communication to design objects, and of stakeholder-involvement in early design. In all observations and case studies we found that non-formal techniques supported strong collaboration resulting in deep understanding of early design ideas, of their value and of the feasibility of solutions.
Resumo:
What if you could check out of your world, and enter a place where the social environment was different, where real world laws didn't apply, and where the political system could be anything you wanted it to be? What if you could socialize there with family and friends, build your own palace, go skiing, and even hold down a job there? And what if there wasn't one alternate world, there were hundreds, and what if millions of people checked out of Earth and went there every day? Virtual worlds - online worlds where millions of people come to interact, play, and socialize - are a new type of social order. In this Article, we examine the implications of virtual worlds for our understanding of law, and demonstrate how law affects the interests of those within the world. After providing an extensive primer on virtual worlds, including their history and function, we examine two fundamental issues in detail. First, we focus on property, and ask whether it is possible to say that virtual world users have real world property interests in virtual objects. Adopting economic accounts that demonstrate the real world value of these objects and the exchange mechanisms for trading these objects, we show that, descriptively, these types of objects are indistinguishable from real world property interests. Further, the normative justifications for property interests in the real world apply - sometimes more strongly - in the virtual worlds. Second, we discuss whether avatars have enforceable legal and moral rights. Avatars, the user-controlled entities that interact with virtual worlds, are a persistent extension of their human users, and users identify with them so closely that the human-avatar being can be thought of as a cyborg. We examine the issue of cyborg rights within virtual worlds and whether they may have real world significance. The issues of virtual property and avatar rights constitute legal challenges for our online future. Though virtual worlds may be games now, they are rapidly becoming as significant as real-world places where people interact, shop, sell, and work. As society and law begin to develop within virtual worlds, we need to have a better understanding of the interaction of the laws of the virtual worlds with the law of this world.
Resumo:
A new form of media installation combining image, multi-channel sound and internally lit objects into a mysterious, deep image plane. Staged on the very edge of spectrum blackout, and moving into the deep of night, Version 1 (Night Rage) for ISEA 2013 examined the many shades of 'nocturnal', threats to night biodiversity and the myriad myths and stories that have shaped our cultural understandings of life after light. Barely recognisable images float within landscapes of media, noise and sound as the work asserts a profound resistance to today's all consuming media mesh. Version 2 (Night Fall) for the Queensland State Museum examined contemporary ideas around the ‘night’ and the 'nocturnal'. Beginning with the dark myths and stories that have long shaped our cultural understandings of life after light, NIGHT FALL considers how fearful ideas have often underpinned actions that continue to reduce Australia’s extraordinary night biodiversity. Today’s growing hostility towards Australia’s ancient, iconic flying foxes - who have been quietly pollinating our forests for millennia - hints at just how far we have yet to travel in our thinking. Enter the darkened tunnel to experience mysterious, edge-of-perception 3D forms, enhanced by a range of cinematic, illusionary and animatronic techniques, and become immersed in a strangely familiar sound track based upon seasonal field recordings made after dark, sourced from across the eastern coast of Queensland.