... 23In short, we have abundant aesthetic models for media works that celebrate low technology, slow speed, and small files. I am particularly excited about ASCII movies. You can build them from scratch, or ... Sharma to convert video frames to frames of ASCII text.24 Low-res, small-file media are sexy, literally, because unlike high-resolution media that, in Marshall McLuhan's term, "push" out at the viewer, these crunchy and approximate movies can draw you in.In August 2020, with friends in Vancouver, I will launch the Small File Media Festival that will stream works of extremely limited file size, to show that ...
Tópico(s): Digital
2020 - The Visual Studies Workshop | Afterimage
... chapter explores the history and characteristics of online media such as textfiles, ASCII text-only ezines, home pages, online journals, online magazines, and weblogs, arguing that their legacy influenced the work of zine publishers online.The fifth chapter explains ...
Tópico(s): Digital Games and
2008 - Michigan Publishing | Journal of Electronic Publishing
... A ‘close reading’ of the technical specifications of ASCII - a standard designed in the early 1960s to work across multiple technological platforms - will reveal the extent to which this code incorporates the materiality of media such as punched tape and teletype terminals.
Tópico(s): Advanced Steganography and Watermarking Techniques
2015 - Transcript Verlag | Digital Culture & Society
Gregory P. Hamill, R. Jenkins, W. N. Schreiner,
... information stored in JCAMP-DX format is in ASCII characters. Therefore, these data are printable, easily read by the user and compatible with almost any computer or media storage device. Codes defining the information are primarily in shortened, but readable, English. The task group is completing the work on this project and will be presenting its ...
Tópico(s): Nuclear Physics and Applications
1989 - International Centre for Diffraction Data | Advances in X-ray Analysis
Sally Kuhlenschmidt, Charmaine Mosby,
... conceptual distinctions among Fixed-Format, Electronic, and Meta-media Editors. We propose a keyboard editing/commenting technique that will work across platforms and software programs and in every mode of electronic communication including simple e-mail. This ASCII based system uses only four symbols in various ...
Tópico(s): Wikis in Education and Collaboration
2001 - SAGE Publishing | Journal of Technical Writing and Communication
Perhaps the most important skill for someone working with computer forensics is to know how computers work. In order to locate digital traces of an e-mail, the examiner must know that such traces may look like. While this book is intended for someone who is fairly skilled in the computer world, there are some theories that are extra important for a forensic examiner and this computer theory is presented in this chapter. This includes an overview of encryption and decryption as well as a presentation ...
Tópico(s): Digital
2017 - Springer Nature | SpringerBriefs in computer science
Elizabeth T. Borer, Eric W. Seabloom, Matthew B. Jones, Mark Schildhauer,
... at this time, by trying to use only ASCII characters, which are based on the English alphabet, ... file names, variable names, and data values. The ASCII code includes all the English letters (uppercase and ... etc. However, one should avoid using certain specialized ASCII characters in data values, since these can lead to unexpected results. For example, one can encode ASCII values for "tabs," "backspace," and "carriage return" into ...
Tópico(s): Species Distribution and Climate Change
2009 - Ecological Society of America | Bulletin of the Ecological Society of America
... 12.0pt;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:" ... props:yes;font-family:"Calibri",sans-serif;mso-ascii-font-family:Calibri;mso-ascii-theme-font:minor-latin;mso-fareast-font-family:" ...
Tópico(s): Gender, Feminism, and
2021 - Open Library of Humanities | The Comics Grid Journal of Comics Scholarship
... in many African languages are written in plain ASCII. We call the process of converting an ASCII text to its proper Unicode form unicodification. This ...
Tópico(s): Language and cultural evolution
2011 - Springer Science+Business Media | Language Resources and Evaluation
Jamie L. Rothfeder, R. Manmatha, Toni M. Rath,
... between the segmented handwritten word images and the ASCII transcriptions. Creating this correspondence or alignment is challenging because the segmentation is often errorful and the ASCII transcription may also have errors in it. Very ...
Tópico(s): Image Processing and 3D Reconstruction
2006 - Springer Science+Business Media | Lecture notes in computer science
Mirosław Kutyłowski, Jaideep Vaidya,
... of ZKPPC protocols and suitable VPAKE protocols for ASCII-based passwords and policies that are commonly used ... this end we introduce a reversible mapping of ASCII characters to integers that can be used to ... and a new randomized password hashing scheme for ASCII-based passwords.
Tópico(s): Big Data Technologies and Applications
2014 - Springer Science+Business Media | Lecture notes in computer science
Franziskus Kiefer, Mark Manulis,
... of ZKPPC protocols and suitable VPAKE protocols for ASCII-based passwords and policies that are commonly used ... this end we introduce a reversible mapping of ASCII characters to integers that can be used to ... and a new randomized password hashing scheme for ASCII-based passwords.
Tópico(s): Cryptography and Data Security
2014 - Springer Science+Business Media | Lecture notes in computer science
Ines Jemal, Mohamed Haddar, Omar Cheikhrouhou, Adel Mahfoudhi,
... the input of neural networks. This technique, called ASCII Embedding, aims to efficiently detect web server attacks. ...
Tópico(s): Advanced Malware Detection Techniques
2021 - Springer Science+Business Media | Communications in computer and information science
... camera. Response data from participants are recorded as ASCII files so that other computer programs such as ...
Tópico(s): Eating Disorders and Behaviors
2002 - Springer Science+Business Media | Behavior Research Methods Instruments &Computers
Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao,
... static analysis difficult, be printable to evade non-ASCII filtering, be polymorphic to evade signature-based detection, ...
Tópico(s): Cryptographic Implementations and Security
2011 - Springer Science+Business Media | Lecture notes in computer science
Stéphane Duvezin‐Caubet, Malgorzata Rak, Linnka Lefebvre‐Legendre, Emmanuel Tétaud, Nathalie Bonnefoy, Jean‐Paul di Rago,
... if they cannot express ARG8m. As expected, the ascii usually contained two spores, both respiratory growth-deficient ... as well, although to a lesser extent, with ascii from the wild type SDC12 strain. It might ...
Tópico(s): Photosynthetic Processes and Mechanisms
2006 - Elsevier BV | Journal of Biological Chemistry
... size:12.0pt; font-family:Cambria,serif; mso-ascii-font-family:Cambria; mso-ascii-theme-font:minor-latin; mso-hansi-font-family: ...
Tópico(s): Critical Race Theory in Education
2012 - Routledge | JCT
... 2] Even though messages were limited to nongraphical ASCII text, the ability for one class to easily ...
Tópico(s): Education and Technology Integration
1996 - 1105 Media | THE journal
Ritzky Karina Brahmana, Rayenda Khresna Brahmana,
... 11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:" ...
Tópico(s): Knowledge Management and Sharing
2013 - University of Indonesia | The South East Asian Journal of Management
... 11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family: ...
Tópico(s): Impact of Technology on Adolescents
2013 - Ubiquity Press | Journal of Interactive Media in Education
Pascale Roux, Muriel Delepierre, Michel Goldberg, Alain-F. Chaffotte,
... least 3 times. The files were converted into ASCII files by the ISA/hda ASCII conversion subroutine of the CD6 software, and data ...
Tópico(s): Enzyme Structure and Function
1997 - Elsevier BV | Journal of Biological Chemistry

Cláudia Cristiane Filgueira Martins Rodrigues, Petala Tuani Cândido de Oliveira Sanvador, Yole Matias Silveira de Assis, Andréa Tayse de Lima Gomes, Manacés dos Santos Bezerril, Viviane Euzébia Pereira Santos,
... 11.0pt; font-family:Calibri,sans-serif; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family: ...
Tópico(s): Occupational Health and Burnout
2017 - | Revista de Enfermagem UFPE on line
BURHAN FAJRIANSYAH, Muhammad Ichwan, Ratna Susana,
... Evaluasi dilakukan dengan mengirimkan data dalam bentuk karakter ASCII/ bytes secara kontinyu maupun sekuensial melalui komunikasi serial ... evaluation was done by sending a data in ASCII character/ bytes as continuous and sequensial method using ...
Tópico(s): IoT-based Smart Home Systems
2017 - Teknik Elektro Institut Teknologi Nasional Bandung | ELKOMIKA Jurnal Teknik Energi Elektrik Teknik Telekomunikasi & Teknik Elektronika
Nabanita Das, Swagata Paul, Bidyut Biman Sarkar, Satyajit Chakrabarti,
... store and analyze such huge amount of mixed ASCII and non-ASCII data efficiently, economically, and in no time. The ...
Tópico(s): Data Stream Mining Techniques
2018 - Springer Nature | Advances in intelligent systems and computing
Wenyu Zhang, Yaqun Zhao, Sijie Fan,
... we propose the feature extraction scheme based on ASCII statistics of ciphertexts which decrease the dimension of ...
Tópico(s): Advanced Malware Detection Techniques
2020 - Hindawi Publishing Corporation | Security and Communication Networks
Masayuki Takeda, Satoru Miyamoto, Takuya Kida, Ayumi Shinohara, Shuichi Fukamachi, Takeshi Shinohara, Setsuo Arikawa,
... at the same speed as on an ordinary ASCII text file, without false detection. The technique is ...
Tópico(s): Web Data Mining and Analysis
2002 - Springer Science+Business Media | Lecture notes in computer science
Sunil Kumar Muttoo, Vinay Kumar, Abhishek Bansal,
... corresponding to the 8-queens solutions, matches with ASCII code of the first character from message, the ...
Tópico(s): Digital
2012 - Taylor & Francis | International Journal of Information Security and Privacy
... and Hamming Distance (H. Dist) and also Hashes (ASCII-based hashing) on token sequences to detect matching ... From the simulation, it has been observed that ASCII-based hashing performs better than other techniques in ... database size, whereas hashing handles this issue efficiently. ASCII-based hashing handles the issue of scalability very ...
Tópico(s): Advanced Malware Detection Techniques
2019 - Springer Science+Business Media | Lecture notes in electrical engineering
... in the American Standard Code for Information Interchange (ASCII) encoding or in the binary encoding.[47] Mostly, ... used if the file size is small and ASCII encoding is followed in debugging situations. Many formats ...
Tópico(s): Dental Implant Techniques and Outcomes
2020 - Springer Science+Business Media | The Journal of Indian Prosthodontic Society
... Their Abusers, PoLAR: Political html_ent glyph="@amp;" ascii=" "/ Legal Anthropology Review 20, no.22 (Nov 1997): ...
Tópico(s): Gender Roles and Identity Studies
1987 - University of Chicago Press | Signs