No Medium


Book Description

Close readings of ostensibly “blank” works—from unprinted pages to silent music—that point to a new understanding of media. In No Medium, Craig Dworkin looks at works that are blank, erased, clear, or silent, writing critically and substantively about works for which there would seem to be not only nothing to see but nothing to say. Examined closely, these ostensibly contentless works of art, literature, and music point to a new understanding of media and the limits of the artistic object. Dworkin considers works predicated on blank sheets of paper, from a fictional collection of poems in Jean Cocteau's Orphée to the actual publication of a ream of typing paper as a book of poetry; he compares Robert Rauschenberg's Erased De Kooning Drawing to the artist Nick Thurston's erased copy of Maurice Blanchot's The Space of Literature (in which only Thurston's marginalia were visible); and he scrutinizes the sexual politics of photographic representation and the implications of obscured or obliterated subjects of photographs. Reexamining the famous case of John Cage's 4'33”, Dworkin links Cage's composition to Rauschenberg's White Paintings, Ken Friedman's Zen for Record (and Nam June Paik's Zen for Film), and other works, offering also a “guide to further listening” that surveys more than 100 scores and recordings of “silent” music. Dworkin argues that we should understand media not as blank, base things but as social events, and that there is no medium, understood in isolation, but only and always a plurality of media: interpretive activities taking place in socially inscribed space.




No Medium


Book Description

Close readings of ostensibly “blank” works—from unprinted pages to silent music—that point to a new understanding of media. In No Medium, Craig Dworkin looks at works that are blank, erased, clear, or silent, writing critically and substantively about works for which there would seem to be not only nothing to see but nothing to say. Examined closely, these ostensibly contentless works of art, literature, and music point to a new understanding of media and the limits of the artistic object. Dworkin considers works predicated on blank sheets of paper, from a fictional collection of poems in Jean Cocteau's Orphée to the actual publication of a ream of typing paper as a book of poetry; he compares Robert Rauschenberg's Erased De Kooning Drawing to the artist Nick Thurston's erased copy of Maurice Blanchot's The Space of Literature (in which only Thurston's marginalia were visible); and he scrutinizes the sexual politics of photographic representation and the implications of obscured or obliterated subjects of photographs. Reexamining the famous case of John Cage's 4'33”, Dworkin links Cage's composition to Rauschenberg's White Paintings, Ken Friedman's Zen for Record (and Nam June Paik's Zen for Film), and other works, offering also a “guide to further listening” that surveys more than 100 scores and recordings of “silent” music. Dworkin argues that we should understand media not as blank, base things but as social events, and that there is no medium, understood in isolation, but only and always a plurality of media: interpretive activities taking place in socially inscribed space.







Advanced Information Networking and Applications


Book Description

Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.




Principles of Data Mining and Knowledge Discovery


Book Description

This book constitutes the refereed proceedings of the 4th European Conference on Principles and Practice of Knowledge Discovery in Databases, PKDD 2000, held in Lyon, France in September 2000. The 86 revised papers included in the book correspond to the 29 oral presentations and 57 posters presented at the conference. They were carefully reviewed and selected from 147 submissions. The book offers topical sections on new directions, rules and trees, databases and reward-based learning, classification, association rules and exceptions, instance-based discovery, clustering, and time series analysis.




System Identification


Book Description

System identification is a general term used to describe mathematical tools and algorithms that build dynamical models from measured data. Used for prediction, control, physical interpretation, and the designing of any electrical systems, they are vital in the fields of electrical, mechanical, civil, and chemical engineering. Focusing mainly on frequency domain techniques, System Identification: A Frequency Domain Approach, Second Edition also studies in detail the similarities and differences with the classical time domain approach. It high??lights many of the important steps in the identification process, points out the possible pitfalls to the reader, and illustrates the powerful tools that are available. Readers of this Second Editon will benefit from: MATLAB software support for identifying multivariable systems that is freely available at the website http://booksupport.wiley.com State-of-the-art system identification methods for both time and frequency domain data New chapters on non-parametric and parametric transfer function modeling using (non-)period excitations Numerous examples and figures that facilitate the learning process A simple writing style that allows the reader to learn more about the theo??retical aspects of the proofs and algorithms Unlike other books in this field, System Identification, Second Edition is ideal for practicing engineers, scientists, researchers, and both master's and PhD students in electrical, mechanical, civil, and chemical engineering.




NBS Technical Note


Book Description










Weapons of Mass Migration


Book Description

At first glance, the U.S. decision to escalate the war in Vietnam in the mid-1960s, China's position on North Korea's nuclear program in the late 1990s and early 2000s, and the EU resolution to lift what remained of the arms embargo against Libya in the mid-2000s would appear to share little in common. Yet each of these seemingly unconnected and far-reaching foreign policy decisions resulted at least in part from the exercise of a unique kind of coercion, one predicated on the intentional creation, manipulation, and exploitation of real or threatened mass population movements. In Weapons of Mass Migration, Kelly M. Greenhill offers the first systematic examination of this widely deployed but largely unrecognized instrument of state influence. She shows both how often this unorthodox brand of coercion has been attempted (more than fifty times in the last half century) and how successful it has been (well over half the time). She also tackles the questions of who employs this policy tool, to what ends, and how and why it ever works. Coercers aim to affect target states' behavior by exploiting the existence of competing political interests and groups, Greenhill argues, and by manipulating the costs or risks imposed on target state populations. This "coercion by punishment" strategy can be effected in two ways: the first relies on straightforward threats to overwhelm a target's capacity to accommodate a refugee or migrant influx; the second, on a kind of norms-enhanced political blackmail that exploits the existence of legal and normative commitments to those fleeing violence, persecution, or privation. The theory is further illustrated and tested in a variety of case studies from Europe, East Asia, and North America. To help potential targets better respond to—and protect themselves against—this kind of unconventional predation, Weapons of Mass Migration also offers practicable policy recommendations for scholars, government officials, and anyone concerned about the true victims of this kind of coercion—the displaced themselves.