Another Look at Heideggerian Cinema: Cinematic Excess, Antonioni's Dead Time and the Film-Photographic Image as Copy

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Another look at retina as an image scalar quantizer

We present a novel quantization algorithm based on a biologically realistic vertebrate retina model. Our aim is to investigate the retina transfer function that maps a continuous input signal into a binary-like neural code. We, furthermore, describe a possible decoding procedure. The coder/decoder, we describe here, focuses on the temporal behavior of the three last retina layers. The neural co...

متن کامل

Another Look at the Hypocrisy of Chaucer’s Pardoner

For us, readers of Chaucer living in an age when appeal to religious passions and sentiments as a means for the realization of worldly objectives by some charlatans has grown significantly, reviewing the theme of religious hypocrisy treated in The Canterbury Tales can be useful in a way that it proves a helpful means for recognizing and dealing with the hypocrites. The Pardoner of the Tales is ...

متن کامل

War, Peace, and Cinema: Excerpts from the Foreign Policy of the USA with a Look at Stanley Kubrick’s Cinema

The notion of peace, regardless of theorizations accepted in th field and since the                  Enlightenment Period, and the era known as Modernism, has, constantly, been one of the challenges of mankind, and also scientists in the field of political sciences and international relations.  Contrary to the presentation of the idea of peace and respect to the human rights in some of the fore...

متن کامل

Another look at HMQV

The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...

متن کامل

Another Look at Tightness

We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Film-Philosophy

سال: 2018

ISSN: 1466-4615

DOI: 10.3366/film.2018.0085