Results 31 to 40 of about 39,492 (277)

Code and Substrate: Reconceiving the Actual in Digital Art and Poetry

open access: yesHumanities, 2017
The quality of digital poetry or art—not merely as contained within our aesthetic reaction to digitally expressive works but as well our intellectual grounding in them—suggests that the digital’s seemingly ephemeral character is an indication of its lack
Burt Kimmelman
doaj   +1 more source

The Postmodernism of Postmodernism: It’s a “Funny” Story [PDF]

open access: yesFilolog, 2016
My primary thesis is that postmodernism always invokes a metafunction of self-reflexivity to some notion of “beginning.” First, I reference Heidegger, who views being as the beginning.
Michael T. Smith
doaj   +1 more source

Quantum Fluctuations Hinder Finite-Time Information Erasure near the Landauer Limit. [PDF]

open access: yesPhysical Review Letters, 2020
Information is physical but information is also processed in finite time. Where computing protocols are concerned, finite-time processing in the quantum regime can dynamically generate coherence.
H. Miller   +3 more
semanticscholar   +1 more source

Erasure

open access: yes
Part II opens with a vignette about Reza Shah and a horrifying story that circulates in a small port city in southern Iran, about the limits of racism and dehumanization of Black people.
Jelka Zorn, Uršula Lipovec Čebron
  +7 more sources

Optimal finite-time bit erasure under full control. [PDF]

open access: yesPhysical Review E, 2020
We study the finite-time erasure of a one-bit memory consisting of a one-dimensional double-well potential, with each well encoding a memory macrostate.
Karel Proesmans   +2 more
semanticscholar   +1 more source

À contre-courant ?

open access: yesFocales, 2017
Photographing photographs : does it mean resisting to the everyday overwhelming production of images, the desire of newness, or is it an attempt to go ahead, to cut through the production ? Between retrograde vision and melancholy contemplation, two ways
Ariane Carmignac
doaj   +1 more source

Secure Information Flow for IoT Applications

open access: yesJOIV: International Journal on Informatics Visualization, 2019
This paper discusses how to ensure security, i.e., confidentiality and integrity properties, for data in IoT applications. While confidentiality could be assessed via information flow analysis, integrity is ensured by error-correcting codes.
Tri Minh Ngo, Nhat Vien Duy Nguyen
doaj   +1 more source

Experimental study of a matrix method of equal-weight columns correcting ability to protect data from erasure

open access: yesКомпьютерная оптика, 2022
The paper investigates the ability of the equal-weight columns method to resist grouping erasures. The Gilbert model for error generation flow is adapted for the case of erasures.
Е.E. Aydarkin, N.S. Mogilevskaya
doaj   +1 more source

Erasures

open access: yesti<, 2019
Whether in visual expressions or in texts, erasures are invitations to scrutinize, read, and interpret. Marking a mutation in style, content or form, they are about presence and absence, mutations and updates, old and new versions, a “before” and an “after.” An erasure may be an action (that of deleting), a state (the blankness resulting from this ...
openaire   +3 more sources

Irreversibility beyond Landauer’s principle: is it possible to perform erasure using the quantum homogenizer?

open access: yesNew Journal of Physics, 2022
Erasure is fundamental for information processing. It is also key in connecting information theory and thermodynamics, as it is a logically irreversible task.
Maria Violaris, Chiara Marletto
doaj   +1 more source

Home - About - Disclaimer - Privacy