Linux Laptop Orchestra

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing L2Ork: Linux Laptop Orchestra

Virginia Tech Department of Music’s Digital Interactive Sound & Intermedia Studio in collaboration with the College of Engineering and School of Visual Arts presents the latest addition to the *Ork family, the Linux Laptop Orchestra. Apart from maintaining compatibility with its precursors and sources of inspiration, Princeton’s PLOrk, and Stanford’s SLOrk, L2Ork’s particular focus is on delive...

متن کامل

Why a laptop orchestra?

That the notion of a ‘laptop orchestra’ is seemingly paradoxical is one of my prime motivations for creating one; the pairing of these two inventions is perhaps obvious only because of its apparent impossibility. One is an almost archaic institution whose continued existence is something of a miracle, the other a technological newcomer that has become commonplace and seems likely to be with us,...

متن کامل

The Carnegie Mellon Laptop Orchestra

The Carnegie Mellon Laptop Orchestra (CMLO) is a collection of computers that communicate through a wireless network and collaborate to generate music. The CMLO is the culmination of a course on Computer Music Systems and Information Processing, where students learn and apply techniques for audio and MIDI programming, real-time synchronization and scheduling, music representation, and music inf...

متن کامل

PLOrk: The Princeton Laptop Orchestra, Year 1

In this paper we report on the current state of the newly established Princeton Laptop Orchestra (PLOrk), a collection of 15 meta-instruments each consisting of a laptop computer, interfacing equipment, and a hemispherical speaker. Founded in the fall of 2005, PLOrk represents the first laptop ensemble of its size and kind, and brings together many of our research and aesthetic interests as mus...

متن کامل

Encrypted Watermarks and Linux Laptop Security

The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Philologia

سال: 2011

ISSN: 2372-1952,2372-1928

DOI: 10.21061/ph.v3i1.72