-
1
Ecological combustion: the atmospherics of the bushfire as choreography
Published 2020-12-01“…This paper examines the atmospheres generated by the elemental power of bushfires as embodiment, invention and reconstruction through choreography. Drawing upon Bachelard’s analysis of the phenomenology of fire leads to an appreciation of its substance and symbolic volatility, that is interlaced with an understanding of fire’s place in the Australian environment from both settler and indigenous perspectives. …”
Get full text
Article -
2
Choreography of cancer and foetal cells: An evolutionary trick!
Published 2024-03-01Get full text
Article -
3
Choreography-driven business process management framework based on blockchain
Published 2021-09-01Subjects: “…choreography…”
Get full text
Article -
4
Fugitive Plots: Adaptation, Storytelling, and Choreography in Cabin in the Sky and Stormy Weather
Published 2023-07-01Subjects: Get full text
Article -
5
“Thinking along the margins”: the choreography of trauma in The Body Artist, by Don DeLillo
Published 2015-11-01Get full text
Article -
6
Traverser la ville ininterrompue : sentir et se figurer à l’aveugle. À propos de Walk, Hands, Eyes (a city) de Myriam Lefkowitz
Published 2017-12-01Subjects: Get full text
Article -
7
-
8
-
9
Co-creation of Activity Spaces in an amateur dance group: interactional construction of the Teaching Space
Published 2025-01-01Subjects: Get full text
Article -
10
Dépossessions : le rôle de la chorégraphie dans A Dance of the Forests et The Bacchae of Euripides de Wole Soyinka
Published 2014-06-01Subjects: Get full text
Article -
11
Features of the development of coordination abilities in young schoolchildren
Published 2024-06-01Subjects: Get full text
Article -
12
Every Second Counts: Integrating Edge Computing and Service Oriented Architecture for Automatic Emergency Management
Published 2018-01-01“…A service choreography is designed to globally model the emergency management process from the time an accident occurs until the rescue is finished. …”
Get full text
Article -
13
Design and implementation of a resource operation and maintenance system based on container arrangement technology
Published 2018-06-01“…Kubernetes container layout tools,Docker operation technology and Mesos framework choreography technology selection were used to solve China Unicom’s existing problems of business application container’s unbalance of resource scheduling.The problem of existing physical cluster elastic scalability capacity was solved.Through cluster and the technique of Mesos,the original big data deploy faster and the scalability problems were solved.Finally,container operation and management system was realized.…”
Get full text
Article -
14
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01“…Aiming at the challenges of continuous evolution of large-scale systems, massive attack data management and control, and flexible implementation of diversified test tasks, a system architecture and technical structure based on software-defined network and cloud platform were proposed.Key technologies such as high-fidelity large-scale network element simulation, high concurrent traffic generation, and dynamic choreography of security service chain based on SDN were studied in depth, and solutions were proposed.The experimental results showed that these three technologies were innovative and could be applied to the construction of the integrated simulation test platform.…”
Get full text
Article -
15
Devenir reine kakataibo. Performance, séduction et genre en Amazonie péruvienne
Published 2017-06-01“…Privileging a pragmatic and interactionist approach, we initially focus on the spectacular and mimetic aspects of the event (training, costumes, choreography), and then proceed to examine the performative dimension of this specific play of being the Other.…”
Get full text
Article -
16
The Centrifugal State: In Search of an Explanation of Why Countries Decentralise
Published 2024-12-01“…This complexity defies simple causation, suggesting instead that the dispersal of power responds to an elaborate choreography of classical and modern forces. The paper dwells on the subtle mechanics of governmental reorganisation, offering insights into the evolving architecture of multi-level governance while acknowledging the inherent challenges in isolating singular causes for these transformative trends.…”
Get full text
Article -
17
Le printemps à la portée des gestes. Danser le solo de l’élue dans Le sacre du printemps au XXIe siècle
Published 2020-12-01“…This article is based on archives of the renowned ballet, notably the famous critic of Jacques Rivière (1913) analyzing the esthetic atmosphere of the ballet, and essentially on the historical reconstruction of its choreography by Dominique Brun entitled Sacre #2 (2014), interpreted by Julie Salgues and on her own words about her gestures. …”
Get full text
Article -
18
INTERAKTYVUMAS: SANTYKIŲ SU TEKSTU MODELIS
Published 2002-01-01“…Keywords:interactivity, hypertext, non-linear writing, choreography of reading. …”
Get full text
Article -
19
INTERAKTYVUMAS: SANTYKIŲ SU TEKSTU MODELIS
Published 2002-01-01“…Keywords:interactivity, hypertext, non-linear writing, choreography of reading. …”
Get full text
Article -
20
Differential fault attack on LiCi cipher
Published 2021-04-01“…LiCi lightweight block cipher is a new algorithm proposed in 2017.With advantages of small structure and low energy consumption, LiCi is more suitable for resource-constrained environments such as the internet of things (IoT).In the design document of LiCi, the ability of LiCi algorithm to resist differential attack and linear attack is analyzed, but the resistance of LiCi algorithm to differential fault attack has not been discussed.According to the permutation law of each round iteration of LiCi algorithm, 32-bit key can be recovered by injecting a single bit fault into the left half of the 31st round iteration combined with its differential property.According to the key choreography scheme of the LiCi algorithm, the same differential fault attack was performed on iterations 30th, 29th, 28th, 27th and 26th round to recover all the original keys.The attack requires a total of 48-bit faults, and the computational complexity is 2<sup>32</sup>, which indicates the LiCi algorithm is difficult to resist differential fault attacks.…”
Get full text
Article