Filters








924 Hits in 4.6 sec

Metacommentary [chapter]

Illya Szilak
2020 The Digital Imaginary  
The artworks here are hybrids: human and machine, truth and fiction, content and form.  ...  As Haraway suggests 13 Metacommentary Do Cyborgs Dream of iPhone Apps? The Body and Storytelling in the Digital Imaginary Illya Szilak  ...  They are the ones who produce the rules or lack thereof for the game.  ... 
doi:10.5040/9781501347597.ch-014 fatcat:yj7btpmk7zbpxpl74b5tyzzv7m

What can science fiction tell us about the future of artificial intelligence policy?

Andrew Dana Hudson, Ed Finn, Ruth Wylie
2021 AI & Society: The Journal of Human-Centred Systems and Machine Intelligence  
These activities informed the commissioning of six original works of science fiction and non-fiction response essays on the themes of "intelligence" and "justice" that were published as part of the Slate  ...  find it difficult to govern or interact with such systems.  ...  Acknowledgements The authors would like to thank our many collaborators on this project at ASU, Slate Magazine, and New America.  ... 
doi:10.1007/s00146-021-01273-2 fatcat:kabcindtejffhfdownmjt2sl5m

Beauty That Must Die: Station Eleven, Climate Change Fiction, and the Life of Form

Pieter Vermeulen
2018 Studies in the Novel  
Adam Trexler's Anthropocene Fictions, for example, shows how climate change has had an impact on such genres as the suspense novel, science fiction, or chiller fiction.  ...  on the way genre fiction conveys a sense of dislocation, not on how it shapes that dislocation.  ... 
doi:10.1353/sdn.2018.0001 fatcat:too7l6jshbh5xbdmqnp4onnxa4

"How to Pronounce Meme." Three YouTube Channels

Sandy Baldwin
2017 Humanities  
Internet anomalies produce data and images beyond any authorship or source. They seem to compute and display the depths and potentials of the net "as such."  ...  Examining three such anomalous YouTube channels, this essay does not propose a solution but rather maintains the anomalous as the constituent aesthetic and community of the net.  ...  The dark net or dark nets, by contrast, are particular networks overlaid on the net for purposes of privacy or concealment. Such dark nets create "deep" content.  ... 
doi:10.3390/h6010010 fatcat:vervylobwjgb3jd6bzzftlzw6i

Some Aspects of California Cyberpunk

Mike Mosher
2018 Arts  
Attentive to the Cyberpunk novelists, an animating spirituality of the time also looks to Timothy Leary and Marshall McLuhan.  ...  This paper explores the rise and fall of Cyberpunk influences in California's Silicon Valley and San Francisco Bay area circa 1988–93, in prevalent technologies, industry, by artists and in enthusiastic  ...  Conflicts of Interest: The author declares no conflicts of interest.  ... 
doi:10.3390/arts7040054 fatcat:fjwq5ern3jcu5brsych2sqfkxi

Knowledge extraction from fictional texts [article]

Cuong Xuan Chu, Universität Des Saarlandes
2022
Unlike the real-world domain, knowledge extraction on such specific domains like fiction and fantasy has to tackle several key challenges: • Training data.  ...  State-of-the-art methods for knowledge extraction make assumptions on entity-class, subclass and entity-entity relations that are often invalid for fictional domains.  ...  , on the other hand, takes the input from random texts, and evaluates the results by using crowdsourcing (Section 4.9.3).  ... 
doi:10.22028/d291-36107 fatcat:hdzlcbxc5ngr3hbeotkcdpbjqm

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies

Teing Yee Yang, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Muhammad Khurram Khan
2016 PLoS ONE  
The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new.  ...  Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists  ...  What data remains in Random Access Memory (RAM) after a user has used the above IM services or apps on a Windows 8.1 device? 3. What data can be seen in network traffic?  ... 
doi:10.1371/journal.pone.0150300 pmid:26982207 pmcid:PMC4794233 fatcat:zhlpeeukuzbgjbx6kpgitsba7i

Situating Change: Combinatory Writing, Collaboration, and Technopolitical Reality

Scott Rettberg
2015 Hyperrhiz  
Every iPhone annually consumes about the same amount of energy as an efficient refrigerator.  ...  The contemporary network is neither an anarchy nor a democracy. Capital has won. We inhabit social networks online.  ...  Both the Norwegian Research Council and Arts Council Norway have funded various aspects of my work on these projects.  ... 
doi:10.20415/hyp/012.me01 fatcat:wbesxbshdjczdkdeuwjmpfwgrq

Two Suns? The Algorithmic State: History and Theory

Peter Cleave
2021 Te Kaharoa  
We might need to consider our historiography, the culture we find in the past, if you like, and the need to now reconstitute and re-frame that sense of history making the development of robotics and machine  ...  Over in a usually forgotten corner there is a history of machines that may throw light on where we find ourselves today and in this section there is a consideration of that history, a story about robotics  ...  The intention is to set out a platform of facts over time using standard references. Having said that we might also start at the end or one of the ends.  ... 
doi:10.24135/tekaharoa.v17i1.351 fatcat:kl5al2t5knhopk4mctlupobf34

A point-and-shoot weapon design for outdoor multi-player smartphone games

Robert J. Hall
2011 Proceedings of the 6th International Conference on Foundations of Digital Games - FDG '11  
On the other hand, matching outcomes with user expectations is a major challenge, due to the inaccuracy of device sensors and the realities of communications in outdoor field conditions.  ...  We should instead design game elements in ways that allow them to be experienced with minimal or no screen reading.  ...  SENSORS AND SENSOR ERRORS The position sensors available on commodity smartphones, such as the iPhone or Android phones, are not very accurate.  ... 
doi:10.1145/2159365.2159373 dblp:conf/fdg/Hall11 fatcat:4h3jfmxtczd6phxawod6peulzq

Species of (Code) Spaces

Pinelopi Papadimitraki
2017 Journal of Science and Technology of the Arts  
code and space.  ...  As digital technologies make a powerful impact on the production of space and software mediates most of our everyday activities, we find ourselves living, working and interacting in the common ground of  ...  financial networks and so on.  ... 
doi:10.7559/citarj.v9i3.426 fatcat:7f4mmrtfmrhn7ew5c4axebu4ty

ConnectiCity, augmented perception of the city [article]

Salvatore Iaconesi, Oriana Persico
2012 arXiv   pre-print
The form and essence of urban space directly affects people's behavior, describing in their perception what is possible or impossible, allowed or prohibited, suggested or advised against.  ...  highlight how cities express points of view on the environment, culture, economy, transports, energy and politics.  ...  The Electronic Man http://www.artisopensource.net/category/projects/electronicman/ VersuS, the realtime lives of cities http://www.artisopensource.net/category/projects/versus-projects/ Links to personal  ... 
arXiv:1207.4291v1 fatcat:vejgywj6bnbavaj3noq7yqkzje

Sharing Stories "in the Wild"

Elizabeth Bonsignore, Alexander J. Quinn, Allison Druin, Benjamin B. Bederson
2013 ACM Transactions on Computer-Human Interaction  
We detail a long-term, multimethod study on the use of StoryKit, a mobile storytelling application.  ...  By taking advantage of a public distribution channel, we were able to evaluate StoryKit's use on a scale beyond that usually found in lab settings or limited field trials.  ...  Finally, many thanks to Jes Koepfler for her assistance in our evaluation and coding of genre categories for the shared stories.  ... 
doi:10.1145/2491500.2491506 fatcat:s23azzywurch5ozqndb4wa2h6i

An Attribute Extraction for Automated Malware Attack Classification and Detection Using Soft Computing Techniques

Nabeel Albishry, Rayed AlGhamdi, Abdulmohsen Almalawi, Asif Irshad Khan, Pravin R. Kshirsagar, BaruDebtera, Arpit Bhardwaj
2022 Computational Intelligence and Neuroscience  
To preserve networks, information, and intelligence, malware must be detected as soon as feasible.  ...  Overall, 96% the proposed method determines the malware more accurately than the existing methods.  ...  Acknowledgments is project was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah, under grant no.  ... 
doi:10.1155/2022/5061059 pmid:35510059 pmcid:PMC9061036 fatcat:jcly4o4tznhtrjkkriaytj53w4

Young Adults Reading Crossmedia Fiction

Laura J. Winton
2012
This study examines the reading practices of 14 young adults in relation to crossmedia fiction, stories that have been adapted across a variety of media formats.  ...  I cannot imagine a better guide through this process, or a better teacher. During the writing phase, I lived with my parents.  ...  networking sites-mention the show, earn a point (Stelter, 2009 ).  ... 
doi:10.7939/r3tb14 fatcat:2iw2qou2njbo5a6ngj4ra67rwe
« Previous Showing results 1 — 15 out of 924 results