1.

Record Nr.

UNINA9910970649503321

Autore

Szendy Peter

Titolo

Listen : a history of our ears / / Peter Szendy ; preceded by Ascoltando by Jean-Luc Nancy ; translated by Charlotte Mandell

Pubbl/distr/stampa

New York, : Fordham University Press, 2008

ISBN

9786612698767

9780823237883

0823237885

9780823259816

0823259811

9781282698765

1282698761

9780823228010

0823228010

Edizione

[1st ed.]

Descrizione fisica

1 online resource (176 p.)

Altri autori (Persone)

NancyJean-Luc

Disciplina

781.1/7

Soggetti

Music - Philosophy and aesthetics

Music - History and criticism

Musical criticism

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references (p. [145]-160).

Nota di contenuto

Prelude and address. I'm listening -- Author's rights, listener's rights (journal of our ancestors) -- Writing our listenings: arrangement, translation, criticism -- Our instruments for listening before the law (second journal entry) -- Listening (to listening): the making of the modern ear -- Plastic listening.

Sommario/riassunto

In this intimate meditation on listening, Peter Szendy examines what the role of the listener is, and has been, through the centuries. The role of the composer is clear, as is the role of the musician, but where exactly does the listener stand in relation to the music s/he listens to? What is the responsibility of the listener? Does a listener have any rights, as the author and composer have copyright? Szendy explains his love of musical arrangement (since arrangements allow him to listen to



someone listening to music), and wonders whether it is possible in other ways to convey to others how we ourselves listen to music. How can we share our actual hearing with others?Along the way, he examines the evolution of copyright laws as applied to musical works and takes us into the courtroom to examine different debates on what we are and aren?t allowed to listen to, and to witness the fine line between musical borrowing and outright plagiarism. Finally, he examines the recent phenomenon of DJs and digital compilations, and wonders how technology has affected our habits of listening and has changed listening from a passive exercise to an active one, whereby one can jump from track to track or play only selected pieces.

2.

Record Nr.

UNINA9910878046503321

Autore

Huang De-Shuang

Titolo

Advanced Intelligent Computing Technology and Applications : 20th International Conference, ICIC 2024, Tianjin, China, August 5–8, 2024, Proceedings, Part X / / edited by De-Shuang Huang, Chuanlei Zhang, Jiayang Guo

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024

ISBN

9789819756094

981975609X

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (548 pages)

Collana

Lecture Notes in Computer Science, , 1611-3349 ; ; 14871

Altri autori (Persone)

ZhangChuanlei

GuoJiayang

Disciplina

006.3

Soggetti

Computational intelligence

Machine learning

Computer networks

Application software

Computational Intelligence

Machine Learning

Computer Communication Networks

Computer and Information Systems Applications

Intel·ligència computacional

Xarxes d'ordinadors

Aprenentatge automàtic

Programari d'aplicació

Congressos

Llibres electrònics



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Organization -- Contents - Part X -- Information Security -- Eavesdropping Mobile Apps and Actions Through Wireless Traffic in the Open World -- 1 Introduction -- 2 Threat Model -- 3 System Design -- 3.1 System Overview -- 3.2 Traffic Preprocessing -- 3.3 Multi-level Feature Extraction -- 3.4 App and Action Recognition -- 4 Evaluation -- 4.1 Evaluation Methodology -- 4.2 Experimental Results -- 5 Conclusion -- References -- Improving WiFi CSI Fingerprinting with IQ Samples -- 1 Introduction -- 2 Threat Model and CSI Features -- 2.1 Threat Model -- 2.2 CSI Features -- 3 System Design -- 3.1 System Overview -- 3.2 CSI Measurement Transformation -- 3.3 Feature Extraction and Recognition -- 4 Experimental Evaluation -- 4.1 Evaluation Methodology -- 4.2 Experimental Results -- 5 Conclusions -- References -- RIHNet: A Robust Image Hiding Method for JPEG Compression -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Overview -- 3.2 Secret Image Hiding Module (SIH) -- 3.3 Classifier -- 3.4 Denoising Module -- 3.5 Loss Function -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Comparison with SOTA -- 4.3 Ablation Experiments -- 5 Conclusion -- References -- HybridHash: An Efficient Hash Index for Encrypted Databases -- 1 Introduction -- 2 Related Work -- 3 Design of HybridHash -- 3.1 Overall Structure -- 3.2 Operations -- 4 Performance Evaluation -- 4.1 Read Performance -- 4.2 Bucket-Splitting Cost -- 4.3 Index Size -- 5 Conclusions and Future Work -- References -- Textual Backdoor Attack via Keyword Positioning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Threat Model -- 3.2 Overview -- 3.3 Calculation of the Importance Score -- 3.4 Trigger Selection -- 3.5 Generate Toxic Samples -- 3.6 Training-Time Poisoning -- 3.7 Test-Time Poisoning -- 4 Experimental Setup -- 4.1 Equipment -- 4.2 Datasets -- 4.3 Victim Models.

4.4 Baseline Methods -- 4.5 Evaluation Metrics -- 5 Experimental Results -- 5.1 Backdoor Attack Results and Discussion -- 5.2 The Impact of the Number of Operations -- 6 Conclusion -- References -- A Hybrid DCT/DST Based Embedding Framework for Video Steganography in H.265/HEVC -- 1 Introduction -- 2 Averting Intra-Distortion Drift and Spacing Coding -- 2.1 Averting Intra-Distortion Drift -- 2.2 Spacing Coding -- 3 The Architecture of the Hybrid Embedding Framework -- 3.1 Intra-Prediction Embedding and Extraction -- 3.2 Inter-Prediction Embedding and Extraction -- 4 Experimental Results -- 5 Security Analysis -- 6 Conclusion -- References -- Intelligent Computing in Computer Vision -- YOLO-FLC: Lightweight Traffic Sign Detection Algorithm -- 1 Introduction -- 2 Yolo-F -- 2.1 Improved C3 Module -- 2.2 Feature Pyramid Optimization -- 2.3 The Improvement of the Loss Function -- 2.4 Detection Scale Optimization -- 3 Model Compression -- 3.1 Pruning -- 3.2 Knowledge Distillation -- 4 Results of Experiments and Data Analysis -- 4.1 Dataset Processing -- 4.2 Evaluation Metrics -- 4.3 The Experimental Environment -- 4.4 The Experimental Results -- 5 Conclusion -- References -- Self-supervised Visual Anomaly Detection with Image Patch Generation and Comparison Networks -- 1 Introduction -- 2 Related Work -- 2.1 Unsupervised Anomaly Detection Based on Reconstruction -- 2.2 VIT-Based Network -- 2.3 Siamese



Network -- 3 Method -- 3.1 VIT-Based Patch Generation Network -- 3.2 Siamese-Based Fine-Grained Comparison Network -- 3.3 Bi-directional Inference Strategy -- 4 Experiment -- 4.1 Datasets and Metrics -- 4.2 Implementation Details -- 4.3 Evaluation on MVTec AD Dataset -- 4.4 Evaluation on Our Own Dataset -- 4.5 Ablation Study -- 5 Conclusion -- References -- Spatial-Temporal Transformer Network for Continuous Action Recognition in Industrial Assembly.

1 Introduction -- 2 Related Work -- 2.1 Action Recognition for Assembly Operation -- 2.2 Human Object Interaction -- 2.3 Video Transformer -- 3 Method -- 3.1 STTN for Action Recognition -- 3.2 Operation Procedure Edition for Action Sequence Recognition -- 3.3 Continual Learning with Worker-in-the-Loop -- 4 Experiments -- 4.1 Action Recognition on Public Dataset -- 4.2 Action Recognition on Industrial Assembly Dataset -- 4.3 Promotion on Production Quality and Efficiency -- 5 Conclusion -- References -- EVF-YOLO: A Lightweight Network for License Plate Detection Under Severe Weather Conditions -- 1 Introduction -- 2 Related Work -- 3 Model Construction and Analysis -- 3.1 EMA -- 3.2 Feature Fusion V-GFPN -- 3.3 Lightweight Detection Head -- 3.4 Overall Model -- 4 Experimental Design and Result Analysis -- 4.1 Experimental Setup -- 4.2 Evaluation Metrics -- 4.3 Experimental Results -- 5 Conclusion -- References -- Quantum Robust Coding for Quantum Image Watermarking -- 1 Introduction -- 2 Proposed Method -- 2.1 Quantum Robust Coding (QRC) -- 2.2 Quantum Image Watermarking Using QRC -- 3 Experiments and Results -- 3.1 Evaluation of Watermarking with and Without QRC -- 3.2 Quantum Watermarking Evaluation by Comparison -- 4 Conclusion -- References -- Quantum-Enhanced Support Vector Machine for Large-Scale Multi-class Stellar Classification -- 1 Introduction -- 1.1 Types of Stars and Current Methods of Classification -- 2 Methodology -- 2.1 Classical Support Vector Machine -- 2.2 Quantum-Enhanced SVM with Quantum Feature Map -- 3 Feature Engineering for Stellar Classification -- 4 Results and Discussion -- 4.1 QSVM for Large Stellar Dataset with Two Classes -- 4.2 Quantum Simulator for Quantum Kernel with GPU Acceleration Using cuQuantum SDK -- 5 Conclusion -- References -- DDNet: Detection-Focused Dehazing Network -- 1 Introduction -- 2 Related Work.

2.1 Object Detection -- 2.2 Image Dehazing -- 2.3 Object Detection Under Hazy Weather -- 3 Proposed Method -- 3.1 Rep-Inception -- 3.2 Dual-Branch Fusion Network -- 3.3 Parallel Differentiable Image Processing Module -- 4 Experiments -- 4.1 Datasets -- 4.2 Comparison with Other Methods -- 4.3 Ablation Study -- 5 Conclusion -- References -- A Secure Voting Scheme Based on Quantum Walk -- 1 Introduction -- 2 Preliminary -- 2.1 One-Dimensional Quantum Walk Model on the Line -- 2.2 Teleportation Based on Quantum Walks -- 3 Security Voting Scheme -- 3.1 Quantum Voting System Model -- 3.2 Authorization of Legitimate Voters -- 3.3 Security Testing -- 3.4 Voting Scheme -- 4 Security Analysis -- 4.1 Non-reusability -- 4.2 Verifiability -- 4.3 Privacy and Security -- 4.4 Fairness -- 5 Comparison -- 6 Conclusion -- References -- PyCIM: A Python Framework for the Dynamics of Coherent Ising Machine -- 1 Introduction -- 2 The Principle of CIM -- 3 The Architecture of PyCIM -- 3.1 Existing Theoretical Models Describing CIM -- 3.2 Design of PyCIM -- 4 Experiments -- 4.1 The Evolution of DOPO State in CIM Without Coupling -- 4.2 The Process of CIM Solving MAX-CUT Problem -- 4.3 The Influence of Coupling Strength and Pump Scheduling on Solution Performance -- 4.4 The Performance of PyCIM on G-Set -- 5 Conclusion -- References -- Dense Center Point Mechanism: A Novel



Approach for Multi-expert Decision Integration in Portfolio Management -- 1 Introduction -- 2 Methodology -- 2.1 Problem Definition -- 2.2 Expert Consensus Decision-Making Method -- 3 Integrate Expert Decision Process -- 3.1 Behavior and Definition of CPESM Experts -- 3.2 Portfolio Optimization of Investor -- 4 Empirical Approach -- 4.1 Experimental Setup -- 4.2 DEDIS Results Analysis -- 4.3 Portfolio Results Analysis -- 5 Conclusion -- References.

Planning for Earth Imaging Tasks via Grid Significance Mapping -- 1 Introduction -- 2 Gird Division and Mapping -- 2.1 Introducing H3 Gridding -- 2.2 Significance Mapping of Points -- 3 Task Planning Using Grid Representations -- 3.1 Grid-Based Planning Model -- 3.2 Planning Problem Solving -- 4 Experiments and Evaluation -- 4.1 Experiment Settings -- 4.2 Significance of Weight Mapping -- 4.3 Experimental Analysis of Load Balancing -- 5 Conclusion and Future Work -- References -- Virtual Reality and Human-Computer Interaction -- FusionCraft: Fusing Emotion and Identity in Cross-Modal 3D Facial Animation -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Overview -- 3.2 Preliminaries -- 3.3 Text2Avatar -- 3.4 Emotion-Identity Fusion Module -- 3.5 Avatar Generator -- 3.6 Key Points Loss -- 4 Experiments -- 4.1 Experimental Settings -- 4.2 Evaluation Methods -- 4.3 Quantitative Evaluation -- 4.4 Qualitative Evaluation -- 4.5 User Study -- 5 Limitations and Future Work -- 6 Conclusion -- References -- DWMF: A Method for Hybrid Multimodal Intent Fusion Based on Dynamic Weights -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Algorithm Description -- 3.2 Analysis of Algorithm -- 4 Experiment Steps and Results -- 4.1 Experiment Setting -- 4.2 Experiment Methods -- 4.3 Experiment Results and Analysis -- 5 Conclusion -- References -- Panoramic Video Inter Frame Prediction and Viewport Prediction Based on Background Modeling -- 1 Introduction -- 2 Related Works -- 2.1 Panoramic Video Coding -- 2.2 Viewport Prediction -- 3 Methodology -- 3.1 Background Modeling -- 3.2 Background Modeling-Based Encoding -- 3.3 Viewport Prediction -- 4 Experiments -- 4.1 Background Modeling -- 4.2 Panoramic Video Encoding -- 4.3 Viewport Prediction -- 5 Conclusion -- References.

Efficient Sensing Network and Decoupled Neural Model for Hand Pose Estimation.

Sommario/riassunto

This 13-volume set LNCS 14862-14874 constitutes - in conjunction with the 6-volume set LNAI 14875-14880 and the two-volume set LNBI 14881-14882 - the refereed proceedings of the 20th International Conference on Intelligent Computing, ICIC 2024, held in Tianjin, China, during August 5-8, 2024. The total of 863 regular papers were carefully reviewed and selected from 2189 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology. .