منابع مشابه
Alex Gillespie Malcolm X and his autobiography : identity development and self - narration
LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in furthe...
متن کاملNarration, Visualization and Mind
The paper is analyzing how people in late modern society characterized by detraditionalization, use moving images as a cultural resource for the construction of meaningful subjective world views. As a theoretical concept with several dimensions, “sacralization of the self” (Woodhead & Heelas 2000: 344), is related to media theory. With a critical focus on ‘the self’, as a core aspect in contemp...
متن کاملArchitecture Narration: A Comparative Study on Narration in Architecture and Story
The way architects think about different issues from developing plans, perspectives, and views to cross-sections and structure of a building is a common and general one. Regardless of its merits and efficiency, this way of thinking indicates a degradation in architectural thinking. Indeed, architectures today are caught in a specific architecture language where the boundaries of language create...
متن کاملInteractive Narration Requires Interaction and Emotion
Abstract This work shows how interaction is essential for storytelling with a child. A corpus of narrative dialogues between parents and their children was coded with a mentalist grid. The results of two modelling methods were analysed by an expert in parent-child dialogue analysis. The extraction of dialogue patterns reveals regularities explaining the character’s emotion. Results showed that ...
متن کاملAutomatic Validation of Protocol Narration
We perform a systematic expansion of protocol narrations into terms of a process algebra in order to make precise some of the detailed checks that need to be made in a protocol. We then apply static analysis technology to develop an automatic validation procedure for protocols. Finally, we demonstrate that these techniques suffice for identifying a number of authentication flaws in symmetric ke...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Turkish Studies
سال: 2012
ISSN: 1308-2140
DOI: 10.7827/turkishstudies.3243