منابع مشابه
Virtual Acoustic Reconstruction of the Church at the Lost Monastery of Santa Maria de la Murta
Archeological acoustics is a part of acoustics that studies ancient environments which were dedicated (completely or partly) to sound performing. The combination of this acoustic area in conjunction with room acoustics enables the study of the acoustic evolution of existing buildings (in terms of the historical documentation) or even, make the acoustic reconstruction of rooms which were destroy...
متن کاملAcoustical reconstruction of a church in ruins: the monastery of Santa
Acoustical archeology aims to study previous acoustical stages in buildings or rooms or to recover old rooms, environments or buildings that has been lost. This part of the acoustic science also tries to analyze the historic acoustic evolution of emblematic buildings of our Cultural Heritage. The main aim of this paper is to make a virtual acoustic rehabilitation of a ruined church, according t...
متن کاملMealtime at a Tibetan monastery.
With assistance from lay volunteers and using a giant stove, Tibetan monks at Longen monastery in rural Qinghai province China prepare and serve meals for several hundred of their peers during the summer retreat. In the past, rugged geography and the isolation of this monastery above 13,000 feet gave reasons for the monks to eat local meat since other foodstuffs were unavailable in an area unab...
متن کاملHow the ELF Ruined Christmas
Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...
متن کاملHow the ELF Ruined Christmas
Throughout the last few decades, computer software has experienced an arms race between exploitation techniques leveraging memory corruption and detection/protection mechanisms. Effective mitigation techniques, such as Address Space Layout Randomization, have significantly increased the difficulty of successfully exploiting a vulnerability. A modern exploit is often two-stage: a first informati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Annual of the British School at Athens
سال: 1903
ISSN: 0068-2454,2045-2403
DOI: 10.1017/s0068245400007838