LEADER 03711nam 22006375 450 001 9910255086903321 005 20240809141750.0 010 $a9783319582627 010 $a3319582623 024 7 $a10.1007/978-3-319-58262-7 035 $a(CKB)4100000001382211 035 $a(DE-He213)978-3-319-58262-7 035 $a(MiAaPQ)EBC5205530 035 $a(Perlego)3493482 035 $a(EXLCZ)994100000001382211 100 $a20171219d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMusical Modernism and German Cinema from 1913 to 1933 /$fby Francesco Finocchiaro 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Palgrave Macmillan,$d2017. 215 $a1 online resource (XIX, 259 p. 7 illus.) 311 08$a9783319582610 311 08$a3319582615 320 $aIncludes bibliographical references and index. 327 $a1. Introduction: The cinematic paradigm -- 2. Prologue. Cinema and the arts -- 3. Cinema and expressionist drama -- 4. Paul Hindemtih and the cinematic universe --  5. Edmund Meisel: the cinematic composer.- 6. Der Rosenkavalier: a problematic remediation --  7. Cinema and musical theatre: Kurt Weill and the Filmmusik in Royal Palace.- 8. Alban Berg, Lulu and cinema as artifice.-  9. New Objectivity and abstract cinema.- 10. Between film music and chamber music -- 11. Epilogue. The dawn of sound cinema. . 330 $aThis book investigates the relationship between musical Modernism and German cinema. It paves the way for anunorthodox path of research, one which has been little explored up until now. The main figures of musical Modernism, from Alban Berg to Paul Hindemith, and from Richard Strauss to Kurt Weill, actually had a significant relationship with cinema. True, it was a complex and contradictory relationship in which cinema often emerged more as an aesthetic point of reference than an objective reality; nonetheless, the reception of the language and aesthetic of cinema had significant influence on the domain of music. Between 1913 and 1933, Modernist composers' exploration of cinema reached such a degree of pervasiveness and consistency as to become a true aesthetic paradigm, a paradigm that sat at the very heart of  the Modernist project. In this insightful volume, Finocchiaro shows that the creative confrontation with the avant-garde medium par excellence can be regarded as a vector of musical Modernism: a new aesthetic paradigm for the very process - of deliberate misinterpretation, creative revisionism, and sometimes even intentional subversion of the Classic-Romantic tradition - which realized the "dream of Otherness" of the Modernist generation. 606 $aMotion pictures 606 $aTelevision broadcasting 606 $aMusic 606 $aEthnology$zEurope 606 $aCulture 606 $aCivilization$xHistory 606 $aFilm and Television Studies 606 $aMusic 606 $aEuropean Culture 606 $aCultural History 615 0$aMotion pictures. 615 0$aTelevision broadcasting. 615 0$aMusic. 615 0$aEthnology 615 0$aCulture. 615 0$aCivilization$xHistory. 615 14$aFilm and Television Studies. 615 24$aMusic. 615 24$aEuropean Culture. 615 24$aCultural History. 676 $a791.4 700 $aFinocchiaro$b Francesco$4aut$4http://id.loc.gov/vocabulary/relators/aut$0211115 906 $aBOOK 912 $a9910255086903321 996 $aMusical Modernism and German Cinema from 1913 to 1933$92533308 997 $aUNINA LEADER 05738nam 22007455 450 001 996668471303316 005 20250712074756.0 010 $a981-9691-01-X 024 7 $a10.1007/978-981-96-9101-2 035 $a(MiAaPQ)EBC32205725 035 $a(Au-PeEL)EBL32205725 035 $a(CKB)39622847000041 035 $a(DE-He213)978-981-96-9101-2 035 $a(EXLCZ)9939622847000041 100 $a20250710d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14?16, 2025, Proceedings, Part III /$fedited by Willy Susilo, Josef Pieprzyk 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (764 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15660 311 08$a981-9691-00-1 327 $a -- Privacy Enhancing Technologies. -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy. -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles. -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. -- Sentence Embedding Generation Method for Differential Privacy Protection. .-KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation. -- AI Security and Privacy. -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. .-RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning. -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. -- MG-Det: Deepfake Detection with Multi-Granularity. -- LPIA: Label Preference Inference Attack against Federated Graph Learning. -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. -- Understanding the Robustness of Machine-Unlearning Models. -- System Security. -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities. -- SoK: From Systematization to Best Practices in Fuzz Driver Generation. -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps. -- Short Papers. -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application. -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith?s Techniques. -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. -- Position Paper. -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases. 330 $aThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14?16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15660 606 $aData protection 606 $aComputer security 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aBlockchains (Databases) 606 $aData and Information Security 606 $aPrinciples and Models of Security 606 $aCryptology 606 $aPrivacy 606 $aMobile and Network Security 606 $aBlockchain 615 0$aData protection. 615 0$aComputer security. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aBlockchains (Databases) 615 14$aData and Information Security. 615 24$aPrinciples and Models of Security. 615 24$aCryptology. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aBlockchain. 676 $a005.8 700 $aSusilo$b Willy$01759814 701 $aPieprzyk$b Josef$0486892 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996668471303316 996 $aInformation Security and Privacy$94406540 997 $aUNISA