Results 1 to 10 of about 118,823 (161)
Capitalist discourse, subjectivity and Lacanian psychoanalysis [PDF]
This paper studies how subjectivity in capitalist culture can be characterized. Building on Lacan’s later seminars XVI, XVII, XVIII, and XIX, the author first outlines Lacan’s general discourse theory, which includes four characteristic discourses: the ...
Bianchi +48 more
core +6 more sources
Every crime becomes a collectivecrime when indifference is added tohorror. When no help from others ispossible, the question becomes oneof survival, which, in turn, gives riseto the different ways of thinking thesurvivor.
Jacques Marblé
doaj +3 more sources
Vom Gebrauch der Sprache in der Psychoanalyse
Die psychoanalytische talking cure interessiert über den Sprechakt oder Sprachakt hinaus die Sprache als „Struktur” im mehrfachen Sinn: als Trägerin eines Genuss-Wissens in Gestalt von Kulturimperativen (Idealforderungen, Ver- und Geboten) in Mythen ...
Claus-Dieter Rath
doaj +1 more source
Next Generation High Throughput Satellite System [PDF]
This paper aims at presenting an overview of the state-of-the-art in High Throughput Satellite (HTS) systems for Fixed Satellite Services (FSS) and High Density-FSS.
Alberty, Eric +5 more
core +1 more source
Jacques-Marie Émile Lacan, filho mais velho do casal Alfred Lacan e Émilie Baudry, nasceu em Paris no dia 13 de abril de 1901. Formou-se em medicina e concluiu sua especialização em psiquiatria no ano de 1931, atuando posteriormente como psiquiatra e psicanalista na capital francesa.
Souza, Alessandra Costa de +5 more
openaire +2 more sources
Lacan's construction and deconstruction of the double mirror device [PDF]
In the 1950s Jacques Lacan developed a set-up with a concave mirror and a plane mirror, based on which he described the nature of human identification. He also formulated ideas on how psychoanalysis, qua clinical practice, responds to identification.
Vanheule, Stijn
core +2 more sources
Dependency-aware unequal erasure protection codes [PDF]
Classical unequal erasure protection schemes split data to be protected into classes which are encoded independently. The unequal protection scheme presented in this paper is based on an erasure code which encodes all the data together according to the ...
A. Albanese +4 more
core +1 more source
Analysis of a circular code model [PDF]
A circular code has been identified in the protein (coding) genes of both eukaryotes and prokaryotes by using a statistical method called Trinucleotide Frequency method (TF method) [Arquès & Michel, (1996) J.Theor. Biol. 182, 45-58].
Lacan, Jérôme, Michel, Christian
core +1 more source
Rethinking reliability for long-delay networks [PDF]
Delay Tolerant Networking (DTN) is currently an open research area following the interest of space companies in the deployment of Internet protocols for the space Internet.
Lacan, Jérôme, Lochin, Emmanuel
core +2 more sources
The q-ary image of some qm-ary cyclic codes: permutation group and soft-decision decoding [PDF]
Using a particular construction of generator matrices of the q-ary image of qm-ary cyclic codes, it is proved that some of these codes are invariant under the action of particular permutation groups.
Delpeyroux, Emmanuelle, Lacan, Jérôme
core +1 more source

