1-20 of 211 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
×Close Modal
Sort by
Journal Article
boundary 2 (1 August 2015) 42 (3): 157–170.
Published: 01 August 2015
... tendencies (mobilism and broadcast) and to consider the intensive life that arises between them. Considering subjectivity not only in terms of “molar formations” (codes and ideologies) but also in terms of “molecular practices” (lived rhythms and daily activities) invites a tentative thesis about what is...
Journal Article
boundary 2 (1 August 2016) 43 (3): 133–157.
Published: 01 August 2016
... better way—that there could be nobody but the people of the camp to conceive Lenin. Only when “born to them,” Lenin could grow into the particular militancy and need of the camps to say the world in a totally new—the only appropriate—code. © 2016 by Duke University Press 2016 camp translation...
Journal Article
boundary 2 (1 February 2017) 44 (1): 191–212.
Published: 01 February 2017
... selected codes of symbolic order. © 2017 by Duke University Press 2017 Charles Darwin différance evolutionary aesthetics André Leroi-Gourhan trauma References Armstrong Paul B. 2013 . How Literature Plays with the Brain: The Neuroscience of Reading and Art . Baltimore : Johns...
Journal Article
boundary 2 (1 November 2015) 42 (4): 187–219.
Published: 01 November 2015
... explores the Zionist and Israeli demand that the Palestinians accept their loss, mourn Palestine privately, and move on to find another love object, coding the Palestinians' refusal to mourn as a form of “anti-Semitism.” The analysis offered makes use of Freud's insights and shows the explanatory limits of...
Journal Article
boundary 2 (1 May 2017) 44 (2): 127–143.
Published: 01 May 2017
... perceptual coding, compression, and format in an attempt to place them in a broader cultural and psychological context. By doing so, I hope to provide a clearer picture of who we are as musical beings and offer an alternate view of how musical formats serve us. I refine Sterne's format theory to include the...
Journal Article
boundary 2 (1 August 2007) 34 (3): 87–107.
Published: 01 August 2007
... The Da Vinci Code two centuries later, The Monk created an interna- tional sensation and made its author an overnight celebrity. Like Brown, “Monk” Lewis, as he came to be known, was accused of copying other sources; by its fourth edition, The Monk had also been expurgated of some...
Journal Article
boundary 2 (1 August 2009) 36 (3): 3–7.
Published: 01 August 2009
... measure is based on how much is excluded: if everything is there, nothing means. The Shan- non measure of information is based on the probability of the codon occur- ring in the code: if it’s always going to be there, there are zero bits. Thus Shannon measures by exclusion: information measured by...
Journal Article
boundary 2 (1 November 2017) 44 (4): 95–112.
Published: 01 November 2017
... 25: Remembering the Case that Established Code as Speech.” EFF Deeplinks , April 16 . https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech . Dooley John F. 2013 . A Brief History of Cryptology and Cryptographic Algorithms . New York : Springer...
Journal Article
boundary 2 (1 August 2004) 31 (3): 1–46.
Published: 01 August 2004
... with Guha because, like Said, he has modeled a type of critical practice that profoundly shapes the directions of postcolonial theory. The general charge against the discursive codes of Bhakti made by Guha is that the Bhakti literatures are ‘‘an ideology of subor- dination par excellence 10 Guha...
Journal Article
boundary 2 (1 May 2001) 28 (2): 9–12.
Published: 01 May 2001
...- tural codes of the 1980s and 1990s. While not quite Barthes on Barthes, Books Reviewed: Pamela Lu, Pamela: A Novel (Berkeley, Calif.: Atelos Press, 1998); and Catalina Cariaga, Cultural Evidence (Honolulu: subpress books, 1999). These works are cited parenthetically. boundary 2 28:2, 2001...
Journal Article
boundary 2 (1 August 2009) 36 (3): 123–132.
Published: 01 August 2009
..., Lévi-Strauss seems to be writing (clairvoyantly?) of Weiner’s pre-clairvoyant Code Poems, based on the (nautical) International Code of Signals, performed with lights and flags in Central Park and published as a book in ’68, when he further holds, “Both the scientist and ‘brico...
Journal Article
boundary 2 (1 February 2002) 29 (1): 223–257.
Published: 01 February 2002
..., what has come into view is a much more interesting and much more ambivalent body of work, one in which, as Mark Spilka has suggested, the Hemingway of Papa’s Code is representa- tive not of the entire career, nor even of its most ambitious undertakings, but is instead anchored largely in the macho...
Journal Article
boundary 2 (1 May 2012) 39 (2): 209–212.
Published: 01 May 2012
... D. The Darker Side of Western Modernity: Global Futures, Decolonial Options. Durham, NC: Duke University Press, 2012. Miller, Ruth A. Seven Stories of Threatening Speech: Women’s Suffrage Meets Machine Code. Ann Arbor: University of Michigan Press, 2011. Mirzoeff, Nicholas. The Right...
Journal Article
boundary 2 (1 November 2015) 42 (4): 38–46.
Published: 01 November 2015
... face down so the whole world can kiss my ass.” On Race and Innovation Dossier / Nguyen 41 from The US Military Psychological Operation Recording (Code-­Named “Wandering Soul Played on the Fronts at Night, Translated [. . . Enter Buddhist funeral...
Journal Article
boundary 2 (1 November 2015) 42 (4): 58–61.
Published: 01 November 2015
...: (a) buy their own uniforms (b) afford their own uniforms (c) buy from sprawl-­mart—at everyday low prices—the vests that meet the new sprawl-­mart dress code (because uniforms must be supplied by the employer) [i...
Journal Article
boundary 2 (1 February 2013) 40 (1): 223–243.
Published: 01 February 2013
... effect “ethnic food” that has no real content, the Mus- lim subject has not done so and reserves the right to have a different con- ception of the relationship between faith and praxis.17 16. On Byzantine texts encoding religious difference, see Justinian, Code I.11.1.1–2, 4–7; Theodosian Code...
Journal Article
boundary 2 (1 February 2005) 32 (1): 191–208.
Published: 01 February 2005
... example of the limitations of Kantian morality Nussbaum argues, but this charge is unfounded. Instetten is acting not on the basis of Kantian morality but from a traditional code of honor. What the story really shows, she contends, is the need for ethical rules to be supplemented by ‘‘love and...
Journal Article
boundary 2 (1 August 2012) 39 (3): 1–5.
Published: 01 August 2012
... Turing in breaking up German war codes and how this led to the rise of computers. He was himself quite computer savvy, capable of writing code in several computer languages, always focusing, however, on the transformations of the human that were at stake in them. Still following Pynchon, he was...
Journal Article
boundary 2 (1 May 2006) 33 (2): 159–176.
Published: 01 May 2006
... the other hand, is the movement of any part of the body to signify an idea or concept.6 While a gesture presupposes a sender and a receiver of a coded message, the performance of an action does not necessarily assume the absence of an addressee, but it includes that possibility. A signified action...
Journal Article
boundary 2 (1 November 2018) 45 (4): 127–159.
Published: 01 November 2018
... G. 2003 . The Criminal Body, Lombroso and the Anatomy of Deviance . London : Routledge . Jann Rosemary . 1990 . “ Sherlock Holmes Codes the Social Body .” ELH 57 , no. 3 : 685 – 708 . Kaluszynski Martine . 2001 . “ Republican Identity: Bertillonage as Government...