Fictions of Time and Space

نویسندگان

چکیده

This essay argues for a fuller recognition of the key transitional status The Four-Gated City (1969) in Doris Lessing’s career. As an attempt to recalibrate basic coordinates realist inheritance, novel develops strongly spatial narrative mode that coincides with desire write utopian collective. is confirmed both by previously unstudied draft material Briefing Descent into Hell (1971) and published texts followed. However, this break from destructive globalization postwar era becomes deeply problematic through its handling history time. Examining struggle writing can shed light on how interplay space time informs intertwined histories realism modernism twentieth-century fiction, work contributes current debates about possible futures novel.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the effects of time planning and task complexity on accuracy of narrative task performance

هدف اصلی این تحقیق بررسی تاثیر برنامه ریزی زمانی، هم چنین افزایش میزان پیچیدگی تکالیف در نظر گرفته شده بصورت همزمان، بر دقت و صحت و پیچیدگی عملکرد نوشتاری زبان آموزان می باشد. بدین منظور، 50 نفر از دانش آموزان دختر در رده ی سنی 16 الی 18 سال به عنوان شرکت کنندگان در این زمینه ی تحقیق در نظر گرفته شدند و به دو گروه آزمایشی و کنترل بصورت اتفاقی تقسیم شدند. اعضای گروه آزمایشی هر دو تکلیف ساده و پی...

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

Fictions, fantasies, and fears

The debate about cloning and genetic engineering, which began in 1997, has been strongly influenced by fictional narratives, scripts, and images. They in turn provided the seeds for the creation of various metaphors used in the debate, especially by the media. The flow of metaphors and images associated with cloning is now ebbing away and is being replaced by a new wave of images and metaphors ...

متن کامل

Indexicals, Fictions, and Ficta

We defend the view that an indexical uttered by an actor works on the model of deferred reference. If it defers to a character which does not exist, it is an empty term, just as ‘Hamlet’ and ‘Ophelia’ are. The utterance in which it appears does not express a proposition and thus lacks a truth value. We advocate an ontologically parsimonious, anti-realist, position. We show how the notion of tru...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Twentieth century literature

سال: 2021

ISSN: ['2325-8101', '0041-462X']

DOI: https://doi.org/10.1215/0041462x-9084315