Itzhak Goldberg, Installations

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Itzhak Bars

The physics that is traditionally formulated in one–time-physics (1T-physics) can also be formulated in two-time-physics (2T-physics). The physical phenomena in 1T or 2T physics are not different, but the spacetime formalism used to describe them is. The 2T description involves two extra dimensions (one time and one space), is more symmetric, and makes manifest many hidden features of 1T-physic...

متن کامل

Itzhak Gilboa , Andrew Postlewaite

People often consume non-durable goods in a way that seems inconsistent with preferences for smoothing consumption over time. We suggest that such patterns of consumption can be better explained if one takes into account the future utility flows generated by memorable consumption goods—goods, such as a honeymoon or a vacation, whose utility flow outlives their physical consumption. We consider ...

متن کامل

Alfred Goldberg

system, where non-sexualised images, e.g. from clothes ads or even from nudist beaches get the green light, erotic posing counts as amber, and material focusing on genitals or actual acts of child abuse gets the red light. “We train the patient to move only in the green area,” Ahlers told the paper. “Amber means: Caution! Potential danger for children and for myself! Risky behaviour on the verg...

متن کامل

Lisa Goldberg colloquium talk

The importance of diversification and risk management was recognized by a few visionaries in the early days of investing. Only in the 1950's, however, did these concepts become central. Since then, increasingly sophisticated mathematical and statistical tools have been brought to bear on the problem of estimating the aggregate risk of a portfolio. This risk depends crucially on the covariances ...

متن کامل

Sharon Goldberg ­­­ Research Statement

As a security researcher, my goal is to develop practical solutions that make computer networks more reliable, predictable, and resilient to attack. To address the grand challenges in security research, I believe that we need to go beyond traditional disciplinary barriers. For instance, cryptography is crucial to deal with hacked devices and malicious parties, but cannot deal with the fact that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Critique d’art

سال: 2014

ISSN: 1246-8258,2265-9404

DOI: 10.4000/critiquedart.15258