Not Hyper, Not Meta, Not Cyber but Infra-Instruments
نویسندگان
چکیده
As a response to a number of notable contemporary aesthetic tendencies, this paper introduces the notion of an infrainstrument as a kind of ‘new interface for musical expression’ worthy of study and systematic design. In contrast to hyper-, metaand virtual instruments, we propose infra-instruments as devices of restricted interactive potential, with little sensor enhancement, which engender simple musics with scarce opportunity for conventional virtuosity. After presenting numerous examples from our work, we argue that it is precisely such interactionally and sonically challenged designs that leave requisite space for computer-generated augmentations in hybrid, multi-device performance settings.
منابع مشابه
Evaluation of an evaluation
Introduction. Evaluation is a systematic way to improve and make more effective actions that involves procedures which are useful, feasible, ethical, and accurate. Common questions in all evaluations are: do all part of program do well and effective? What is the good functioning? Why the program or its parts do not work well? What are the effects and consequences of the program? Is this progra...
متن کاملSociological Investigation of the Usage of Cyber Space and its Relation with Social Isolation (Case Study: Science and Research Branch Students)
The development and improvement of electronic communication instruments and means in postmodern societies with fast intention has caused further multiplication in meanings and content of the communication itself. On the other hand the involvement of cyber space in our privacy has caused massive personality changes in people particularly the youth, In a way that individuals are separated from re...
متن کاملUsing Bayesian Attack Detection Models to Drive Cyber Deception
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...
متن کاملرهن و وثیقه اسناد براتی در حقوق ایران و انگلیس
Commercial instruments, in particular meaning, or bills are one of the most important means for business parties to enter into transactions. Such instruments are considered as a certain form of property with a great variety of uses. For example, they can be used as a means to pay or to use as a guarantee or security. But a question has always been posed:” whether such instruments can be used ...
متن کاملAn Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine
Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...
متن کامل