首页 > 最新文献

Intermedialites最新文献

英文 中文
Introduction. The Mediality of Concealment: Material Practices and Symbolic Operativity 介绍。隐蔽性的中介性:物质实践与符号操作性
Pub Date : 2019-04-02 DOI: 10.7202/1058467AR
Nathalie Casemajor, S. Toupin
This special issue focuses on the cultural forms, technologies, and social logics of dissimulation. In this introduction, we propose a critical examination of the cultural and political entanglements of three emblematic domains of dissimulation: camouflage, steganography, and encryption. Focusing on the study of mediality, our analysis crosses the evolution of media environments and representations of these dissimulation processes to better understand their modes of legitimization and symbolic operativity.
本期专题聚焦于掩饰的文化形式、技术和社会逻辑。在这篇引言中,我们提出了对伪装的三个象征性领域的文化和政治纠缠的批判性检查:伪装,隐写术和加密。以媒介性研究为重点,我们的分析跨越了媒介环境的演变和这些伪装过程的表现,以更好地理解它们的合法化模式和符号操作性。
{"title":"Introduction. The Mediality of Concealment: Material Practices and Symbolic Operativity","authors":"Nathalie Casemajor, S. Toupin","doi":"10.7202/1058467AR","DOIUrl":"https://doi.org/10.7202/1058467AR","url":null,"abstract":"This special issue focuses on the cultural forms, technologies, and social logics of dissimulation. In this introduction, we propose a critical examination of the cultural and political entanglements of three emblematic domains of dissimulation: camouflage, steganography, and encryption. Focusing on the study of mediality, our analysis crosses the evolution of media environments and representations of these dissimulation processes to better understand their modes of legitimization and symbolic operativity.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41494534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Les gueules cassées ou l’éthique de l’écran crevé : du masque au visage cinématographique 破碎的脸或破裂的屏幕的伦理:从面具到电影的脸
Pub Date : 2019-04-02 DOI: 10.7202/1058471AR
K. Chevalier
Cet article analyse comment le cinéma représente les gueules cassées en relation avec les autres médias (actualités, photographie, littérature, peinture, bande dessinée). À partir de la distinction de Levinas entre « la face » et « le visage », l’auteure questionne le recours au camouflage. Les blessures de guerre sont ainsi cachées par une esthétique du masque, telle que la surimpression, qui permet selon une approche éthique ambivalente de révéler le « visage » au-delà de la défiguration.
这篇文章分析了电影如何代表与其他媒体(新闻、摄影、文学、绘画、漫画)的关系。从列维纳斯对“脸”和“脸”的区分开始,作者质疑伪装的使用。因此,战争创伤被一种面具美学所掩盖,比如叠加,通过一种矛盾的伦理方法,揭示了超越毁容的“脸”。
{"title":"Les gueules cassées ou l’éthique de l’écran crevé : du masque au visage cinématographique","authors":"K. Chevalier","doi":"10.7202/1058471AR","DOIUrl":"https://doi.org/10.7202/1058471AR","url":null,"abstract":"Cet article analyse comment le cinéma représente les gueules cassées en relation avec les autres médias (actualités, photographie, littérature, peinture, bande dessinée). À partir de la distinction de Levinas entre « la face » et « le visage », l’auteure questionne le recours au camouflage. Les blessures de guerre sont ainsi cachées par une esthétique du masque, telle que la surimpression, qui permet selon une approche éthique ambivalente de révéler le « visage » au-delà de la défiguration.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43774491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prises de vue clandestines comme exercice du (contre)pouvoir de l’art : Trevor Paglen et Mohamed Bourouissa reprennent le contrôle du visible 秘密拍摄作为艺术(反)力量的行使:特雷弗·帕格伦和穆罕默德·布鲁萨重新控制了可见的东西
Pub Date : 2019-04-02 DOI: 10.7202/1058470AR
Katrin Gattinger
L’article soulève le potentiel subversif de démarches artistiques contemporaines qui se positionnent face à la domination du regard et de la production d’images en visant des territoires invisibles, inaccessibles ou interdits. À travers les analyses de deux projets artistiques réalisés illégalement en prison — Temps mort de Mohamed Bourouissa et Recording Carceral Landscapes de Trevor Paglen — et de plusieurs séries photographiques de Trevor Paglen investiguant sur des secrets de l’armée américaine ou sur les câbles Internet transatlantiques, l’auteure présente les modes opératoires et les enjeux de telles représentations « volées ». Aux yeux de l’auteure, si ces oeuvres dévoilent des vues inédites, elles le font pour inviter à penser différemment le réel et exemplifier des possibilités de résistance menées de l’intérieur de la société du contrôle.
这篇文章提出了当代艺术方法的颠覆潜力,这些方法通过瞄准看不见的、不可接近的或被禁止的领域,将自己定位于视觉和图像制作的主导地位。通过分析两个非法取得的艺术项目(Mohamed Bourouissa坐牢—死亡时间及动物记录Carceral Landscapes Trevor Paglen—和多个摄影系列(Trevor Paglen investiguant对美军机密或跨大西洋电缆网路作家,本类表演手法和挑战被盗«»。在作者看来,如果这些作品揭示了新的观点,它们这样做是为了邀请人们以不同的方式思考现实,并例证来自控制社会内部的抵抗可能性。
{"title":"Prises de vue clandestines comme exercice du (contre)pouvoir de l’art : Trevor Paglen et Mohamed Bourouissa reprennent le contrôle du visible","authors":"Katrin Gattinger","doi":"10.7202/1058470AR","DOIUrl":"https://doi.org/10.7202/1058470AR","url":null,"abstract":"L’article soulève le potentiel subversif de démarches artistiques contemporaines qui se positionnent face à la domination du regard et de la production d’images en visant des territoires invisibles, inaccessibles ou interdits. À travers les analyses de deux projets artistiques réalisés illégalement en prison — Temps mort de Mohamed Bourouissa et Recording Carceral Landscapes de Trevor Paglen — et de plusieurs séries photographiques de Trevor Paglen investiguant sur des secrets de l’armée américaine ou sur les câbles Internet transatlantiques, l’auteure présente les modes opératoires et les enjeux de telles représentations « volées ». Aux yeux de l’auteure, si ces oeuvres dévoilent des vues inédites, elles le font pour inviter à penser différemment le réel et exemplifier des possibilités de résistance menées de l’intérieur de la société du contrôle.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48714140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voyage sous « Goyave » : anagrammes et autres clefs d’accès à l’univers romanesque de Yodi Karone “番石榴之旅”:进入约迪·卡隆浪漫世界的字谜和其他钥匙
Pub Date : 2019-04-02 DOI: 10.7202/1058468AR
Blaise Tsoualla
L’emblématique anagramme de « Goyave » recouvre chez Karone la notion de voyage. Avec d’autres techniques de dissimulation, elle participe d’une stratégie de survie dans un contexte hostile aux auteurs camerounais gagnés à l’indignation et à la résistance. De tels motifs cachent alors une façon de se mettre hors d’atteinte, d’exemplifier le vide de la quête existentielle, d’atteindre chaque cible/lecteur sans compromettre la vision progressiste de l’écriture, mais aussi d’assurer le plaisir et la jouissance du texte.
“番石榴”的标志性拼音涵盖了Karone的旅行概念。通过其他隐藏技术,她参与了一项生存战略,在一个充满敌意的环境中,喀麦隆作家赢得了愤怒和抵抗。这些动机隐藏了一种无法实现的方式,体现了存在主义追求的空虚,在不损害写作进步愿景的情况下达到每个目标/读者,同时也确保了文本的乐趣和享受。
{"title":"Voyage sous « Goyave » : anagrammes et autres clefs d’accès à l’univers romanesque de Yodi Karone","authors":"Blaise Tsoualla","doi":"10.7202/1058468AR","DOIUrl":"https://doi.org/10.7202/1058468AR","url":null,"abstract":"L’emblématique anagramme de « Goyave » recouvre chez Karone la notion de voyage. Avec d’autres techniques de dissimulation, elle participe d’une stratégie de survie dans un contexte hostile aux auteurs camerounais gagnés à l’indignation et à la résistance. De tels motifs cachent alors une façon de se mettre hors d’atteinte, d’exemplifier le vide de la quête existentielle, d’atteindre chaque cible/lecteur sans compromettre la vision progressiste de l’écriture, mais aussi d’assurer le plaisir et la jouissance du texte.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43046772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Imprisoned Photographs”: The Looted Archive of Photo Rissas (Rassas)—Ibrahim and Chalil (Khalil) Rissas1 “被监禁的照片”:被盗的照片档案Rissas(Rassas)——Ibrahim和Chalil(Khalil)Rissas1
Pub Date : 2019-04-02 DOI: 10.7202/1058469AR
Ron Sela
This essay is the first dedicated solely to the work and archive of Ibrahim and Chalil (Khalil) Rissas (Rassas). Ibrahim was one of the pioneers of Palestinian photography in Jerusalem in the early twentieth century and Chalil, his son, was one of the first Palestinian photojournalists in the 1940s. Rissas’ images were looted and seized by Israeli officer from the photographers’ studio, from the body of a soldier or “slain Arab,” or “rescued” from a burning shop. Those photographs that had been looted from the studio, were the first collection I found in the Israeli military archives. In this essay I chart and analyze the way Rissas’ images were looted on several occasions and the moral, sociological, and political consequences of these acts—for instance how the looted object becomes a symbol of triumph or acts as a vehicle to dehumanize the enemy. The essay is also the first to focus on the phenomenon of pillage by individuals who transfer the looted cultural assets to colonial official archives where they are ruled by the colonial administration. It thus reflects not only the responsibility of states in the process of “knowledge production” and on their role in distorting the past and rewriting history by various bureaucratic, linguistic, and legal means, but also on the role of citizens in these destructive processes.
这篇文章是第一篇专门介绍易卜拉欣(Ibrahim)和查里尔(Khalil)里萨斯(Rassas)的工作和档案的文章。易卜拉欣是二十世纪早期耶路撒冷巴勒斯坦摄影的先驱之一,他的儿子查里尔是20世纪40年代第一批巴勒斯坦摄影记者之一。瑞萨斯的照片被以色列军官从摄影工作室、从士兵或“被杀的阿拉伯人”的尸体或从燃烧的商店“抢救”出来的照片中洗劫和没收。那些从照相馆被洗劫的照片,是我在以色列军事档案中发现的第一批照片。在这篇文章中,我绘制并分析了Rissas的作品在不同场合被掠夺的方式,以及这些行为的道德、社会学和政治后果——例如,被掠夺的物品如何成为胜利的象征,或成为使敌人失去人性的工具。这篇文章还首次关注了个人将被掠夺的文化资产转移到殖民当局统治的殖民官方档案的掠夺现象。因此,它不仅反映了国家在“知识生产”过程中的责任,以及它们通过各种官僚、语言和法律手段扭曲过去和改写历史的作用,而且反映了公民在这些破坏性过程中的作用。
{"title":"“Imprisoned Photographs”: The Looted Archive of Photo Rissas (Rassas)—Ibrahim and Chalil (Khalil) Rissas1","authors":"Ron Sela","doi":"10.7202/1058469AR","DOIUrl":"https://doi.org/10.7202/1058469AR","url":null,"abstract":"This essay is the first dedicated solely to the work and archive of Ibrahim and Chalil (Khalil) Rissas (Rassas). Ibrahim was one of the pioneers of Palestinian photography in Jerusalem in the early twentieth century and Chalil, his son, was one of the first Palestinian photojournalists in the 1940s. Rissas’ images were looted and seized by Israeli officer from the photographers’ studio, from the body of a soldier or “slain Arab,” or “rescued” from a burning shop. Those photographs that had been looted from the studio, were the first collection I found in the Israeli military archives. In this essay I chart and analyze the way Rissas’ images were looted on several occasions and the moral, sociological, and political consequences of these acts—for instance how the looted object becomes a symbol of triumph or acts as a vehicle to dehumanize the enemy. The essay is also the first to focus on the phenomenon of pillage by individuals who transfer the looted cultural assets to colonial official archives where they are ruled by the colonial administration. It thus reflects not only the responsibility of states in the process of “knowledge production” and on their role in distorting the past and rewriting history by various bureaucratic, linguistic, and legal means, but also on the role of citizens in these destructive processes.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42355722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inhabiting the Profile: Zach Blas’ Facial Weaponization Suite 居住在侧面:扎克·布拉斯的面部武器化套件
Pub Date : 2019-04-02 DOI: 10.7202/1058472AR
Sebastian Althoff
This article places Zach Blas’ Facial Weaponization Suite (2011–2014) in relation to the notion of algorithmic governmentality in order to reveal a tactic of disidentification. Algorithmic governmentality refers to the implementation of big data surveillance that does not render individuals visible, but rather circumvents them, thereby complicating the possibility of a critical engagement. Such critical engagement, however, can be envisioned through the Facial Weaponization Suite.
本文将Zach Blas的面部武器化套件(2011-2014)与算法治理的概念联系起来,以揭示一种去认同的策略。算法治理指的是实施大数据监控,这种监控不会让个人可见,而是绕过他们,从而使关键参与的可能性复杂化。然而,这种关键的参与可以通过面部武器化套件来设想。
{"title":"Inhabiting the Profile: Zach Blas’ Facial Weaponization Suite","authors":"Sebastian Althoff","doi":"10.7202/1058472AR","DOIUrl":"https://doi.org/10.7202/1058472AR","url":null,"abstract":"This article places Zach Blas’ Facial Weaponization Suite (2011–2014) in relation to the notion of algorithmic governmentality in order to reveal a tactic of disidentification. Algorithmic governmentality refers to the implementation of big data surveillance that does not render individuals visible, but rather circumvents them, thereby complicating the possibility of a critical engagement. Such critical engagement, however, can be envisioned through the Facial Weaponization Suite.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43463310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Storing Authenticity at the Surface and into the Depths: Securing Paper with Human- and Machine-Readable Devices1 在表面和深度存储真实性:用人机可读设备固定纸张1
Pub Date : 2019-04-02 DOI: 10.7202/1058474AR
A. Kamińska
This article examines the media technologies that mark paper as authentic. Using the examples of passports and paper banknotes, it considers the security features (e.g. graphic marks, holographs, chips) that do the work of reliably storing, protecting, and communicating authenticity across both space and time. These overt and covert authentication devices are examined in two interconnected ways: 1) as technologies with specific temporal conditions, constrained both by technical longevity and functional lifespan; and 2) as technologies that must be continuously reinvented to outpace counterfeiters and forgers. Together, these attributes have led to strategies of concealment that shift authentication from a human-legible activity at the perceptible surface to one that is concealed in the depths of machine readability. While this adds a level of security, it is also an example of how the material environment becomes rich in information that is inaccessible to human processing.
本文研究了将纸张标记为真实的媒体技术。以护照和纸币为例,它考虑了安全特征(如图形标记、全息图、芯片),这些特征在空间和时间上可靠地存储、保护和传达真实性。这些公开和隐蔽的认证设备以两种相互关联的方式进行检查:1)作为具有特定时间条件的技术,受到技术寿命和功能寿命的限制;以及2)作为必须不断创新以超越造假者和伪造者的技术。这些属性共同导致了隐藏策略,将身份验证从可感知表面的人类可读活动转变为隐藏在机器可读性深处的活动。虽然这增加了一定程度的安全性,但它也是一个例子,说明物质环境中的信息是如何变得丰富的,而这些信息是人类无法处理的。
{"title":"Storing Authenticity at the Surface and into the Depths: Securing Paper with Human- and Machine-Readable Devices1","authors":"A. Kamińska","doi":"10.7202/1058474AR","DOIUrl":"https://doi.org/10.7202/1058474AR","url":null,"abstract":"This article examines the media technologies that mark paper as authentic. Using the examples of passports and paper banknotes, it considers the security features (e.g. graphic marks, holographs, chips) that do the work of reliably storing, protecting, and communicating authenticity across both space and time. These overt and covert authentication devices are examined in two interconnected ways: 1) as technologies with specific temporal conditions, constrained both by technical longevity and functional lifespan; and 2) as technologies that must be continuously reinvented to outpace counterfeiters and forgers. Together, these attributes have led to strategies of concealment that shift authentication from a human-legible activity at the perceptible surface to one that is concealed in the depths of machine readability. While this adds a level of security, it is also an example of how the material environment becomes rich in information that is inaccessible to human processing.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45993431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hiding from Whom? 躲避谁?
Pub Date : 2019-04-02 DOI: 10.7202/1058473AR
Ksenia Ermoshina, F. Musiani
Following Edward Snowden’s revelations, end-to-end encryption is becoming increasingly widespread in messaging tools—solutions that propose a large variety of ways to conceal, obfuscate, disguise private communications and online activities. Designing privacy-enhancing tools requires the identification of a threat model that serves to agree upon an appropriate threshold of anonymity and confidentiality for a particular context of usage. In this article, we discuss different use-cases, from “nothing-to-hide” low-risk situations to high-risk scenarios in war zones or in authoritarian contexts, to question how users, trainers, and developers co-construct threat models, decide which data to conceal, and how to conceal it. We demonstrate that classic oppositions such as high-risk versus low-risk, privacy versus security, should be redefined within a more relational, processual, and contextual approach.
在爱德华·斯诺登(Edward Snowden)的爆料之后,端到端加密在通讯工具中变得越来越普遍——这些解决方案提出了各种各样的方法来隐藏、模糊、伪装私人通信和在线活动。设计隐私增强工具需要识别威胁模型,该模型用于就特定使用上下文的匿名性和机密性的适当阈值达成一致。在本文中,我们讨论了不同的用例,从“没有什么可隐藏的”低风险情况到战区或专制环境中的高风险场景,以询问用户、培训师和开发人员如何共同构建威胁模型,决定隐藏哪些数据,以及如何隐藏它。我们证明,传统的对立,如高风险与低风险,隐私与安全,应该在一个更相关的,过程的,和上下文的方法中重新定义。
{"title":"Hiding from Whom?","authors":"Ksenia Ermoshina, F. Musiani","doi":"10.7202/1058473AR","DOIUrl":"https://doi.org/10.7202/1058473AR","url":null,"abstract":"Following Edward Snowden’s revelations, end-to-end encryption is becoming increasingly widespread in messaging tools—solutions that propose a large variety of ways to conceal, obfuscate, disguise private communications and online activities. Designing privacy-enhancing tools requires the identification of a threat model that serves to agree upon an appropriate threshold of anonymity and confidentiality for a particular context of usage. In this article, we discuss different use-cases, from “nothing-to-hide” low-risk situations to high-risk scenarios in war zones or in authoritarian contexts, to question how users, trainers, and developers co-construct threat models, decide which data to conceal, and how to conceal it. We demonstrate that classic oppositions such as high-risk versus low-risk, privacy versus security, should be redefined within a more relational, processual, and contextual approach.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.7202/1058473AR","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45878385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cartographie/Thermographie. Regards et corps instruits dans Hollow Man (Paul Verhoeven, 2000) 制图/热成像。《空心人》中受教育的外表和身体(Paul Verhoeven,2000)
Pub Date : 2018-07-10 DOI: 10.7202/1049953AR
R. Lauvin
Cet article porte sur les images thermographiques dans le film hollywoodien Hollow Man (Paul Verhoeven, 2000). La thermographie y est employée comme outil de surveillance faillible, permettant au corps scruté de se camoufler et brisant le pouvoir de contrôle de l'observateur. Nous mettons également en évidence la part impure de l'image thermique, presque étrangère au modèle rétinien de la caméra. En cela, la thermographie annonce le devenir abstrait du cinéma numérique.
本文讨论了好莱坞电影《空心人》(Paul Verhoeven,2000)中的热成像图像。热成像被用作一种容易出错的监测工具,允许被检查的身体伪装自己,打破观察者的控制能力。我们还强调了热图像的不纯部分,几乎与相机的视网膜模型无关。在这方面,热成像预示着数字电影的抽象未来。
{"title":"Cartographie/Thermographie. Regards et corps instruits dans Hollow Man (Paul Verhoeven, 2000)","authors":"R. Lauvin","doi":"10.7202/1049953AR","DOIUrl":"https://doi.org/10.7202/1049953AR","url":null,"abstract":"Cet article porte sur les images thermographiques dans le film hollywoodien Hollow Man (Paul Verhoeven, 2000). La thermographie y est employée comme outil de surveillance faillible, permettant au corps scruté de se camoufler et brisant le pouvoir de contrôle de l'observateur. Nous mettons également en évidence la part impure de l'image thermique, presque étrangère au modèle rétinien de la caméra. En cela, la thermographie annonce le devenir abstrait du cinéma numérique.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.7202/1049953AR","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47924599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Une dynamique tensive 紧张的动力
Pub Date : 2018-07-10 DOI: 10.7202/1049944AR
Fabien Dumais
Dans sa conférence de clôture présentée lors du premier colloque du CRI en 1999, Éric Méchoulan se questionnait déjà sur l’étrange usage, que font certains chercheurs en études intermédiales, des ouvrages de Gilles Deleuze : « [...] il faudrait à ce moment-là se dire que l’intermédialité ne consisterait pas tant à traquer les jeux incessants et innombrables des médiations qui nous constituent, mais plus sourdement à repérer les moments d'immédiateté qui nous emportent. » C’est la lecture de cette phrase qui a déclenché la présente réflexion; on tentera justement d’articuler théoriquement ces deux manières de penser l’intermédialité, en décrivant par le biais de la philosophie deleuzienne ce que l’on pourrait définir comme une dynamique tensive entre les médiations et ce que Méchoulan appelle les immédiatetés complexes.
在闭幕会议上第一次座谈会上提出的1999年,eric呐喊Méchoulan问自己奇特的用途上,做过一些研究者正在研究intermédiales、参考书Gilles philosophie):«... []当时应该告诉自己,l’intermédialité与其说是在追捕游戏不断的、无数的调解,我们是谁,但更闷闷不乐地找出时刻亲自给我们获胜了。»是读到这句话引发了反思本;碰巧将试图从理论上阐明这两种思维方式l’intermédialité介绍,通过哲学deleuzienne可能被定义为一个动态往杯子之间进行调解和Méchoulan称之为immédiatetés复杂。
{"title":"Une dynamique tensive","authors":"Fabien Dumais","doi":"10.7202/1049944AR","DOIUrl":"https://doi.org/10.7202/1049944AR","url":null,"abstract":"Dans sa conférence de clôture présentée lors du premier colloque du CRI en 1999, Éric Méchoulan se questionnait déjà sur l’étrange usage, que font certains chercheurs en études intermédiales, des ouvrages de Gilles Deleuze : « [...] il faudrait à ce moment-là se dire que l’intermédialité ne consisterait pas tant à traquer les jeux incessants et innombrables des médiations qui nous constituent, mais plus sourdement à repérer les moments d'immédiateté qui nous emportent. » C’est la lecture de cette phrase qui a déclenché la présente réflexion; on tentera justement d’articuler théoriquement ces deux manières de penser l’intermédialité, en décrivant par le biais de la philosophie deleuzienne ce que l’on pourrait définir comme une dynamique tensive entre les médiations et ce que Méchoulan appelle les immédiatetés complexes.","PeriodicalId":42444,"journal":{"name":"Intermedialites","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71149271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Intermedialites
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1