• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 13
  • 10
  • 8
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 131
  • 16
  • 14
  • 12
  • 12
  • 12
  • 11
  • 11
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Intrusion Detection System for Android : Linux Kernel System Salls Analysis

Borek, Martin January 2017 (has links)
Smartphones provide access to a plethora of private information potentially leading to financial and personal hardship, hence they need to be well protected. With new Android malware obfuscation and evading techniques, including encrypted and downloaded malicious code, current protection approaches using static analysis are becoming less effective. A dynamic solution is needed that protects Android phones in real time. System calls have previously been researched as an effective method for Android dynamic analysis. However, these previous studies concentrated on analysing system calls captured in emulated sandboxed environments, which does not prove the suitability of this approach for real time analysis on the actual device. This thesis focuses on analysis of Linux kernel system calls on the ARMv8 architecture. Given the limitations of android phones it is necessary to minimise the resources required for the analyses, therefore we focused on the sequencing of system calls. With this approach, we sought a method that could be employed for a real time malware detection directly on Android phones. We also experimented with different data representation feature vectors; histogram, n-gram and co-occurrence matrix. All data collection was carried out on a real Android device as existing Android emulators proved to be unsuitable for emulating a system with the ARMv8 architecture. Moreover, data were collected on a human controlled device since reviewed Android event generators and crawlers did not accurately simulate real human interactions. The results show that Linux kernel sequencing carry enough information to detect malicious behaviour of malicious applications on the ARMv8 architecture. All feature vectors performed well. In particular, n-gram and co-occurrence matrix achieved excellent results. To reduce the computational complexity of the analysis, we experimented with including only the most commonly occurring system calls. While the accuracy degraded slightly, it was a worthwhile trade off as the computational complexity was substantially reduced. / Smartphones ger tillgång till en uppsjö av privat information som potentiellt kan leda till finansiella och personliga svårigheter. Därför måste de vara väl skyddade. En dynamisk lösning behövs som skyddar Android-telefoner i realtid. Systemanrop har tidigare undersökts som en effektiv metod för dynamisk analys av Android. Emellertid fokuserade dessa tidigare studier på systemanrop i en emulerad sandbox miljö, vilket inte visar lämpligheten av detta tillvägagångssätt för realtidsanalys av själva enheten. Detta arbete fokuserar på analys av Linux kärnan systemanrop på ARMv8 arkitekturen. Givet begränsningarna som existerar i Android-telefoner är det väsentligt att minimera resurserna som krävs för analyserna. Därför fokuserade vi på sekvenseringen av systemanropen. Med detta tillvägagångssätt sökte vi en metod som skulle kunna användas för realtidsdetektering av skadliga program direkt på Android-telefoner. Vi experimenterade dessutom med olika funktionsvektorer för att representera data; histogram, n-gram och co-occurrence matriser. All data hämtades från en riktig Android enhet då de existerande Android emulatorerna visade sig vara olämpliga för att emulera ett system med ARMv8 arkitekturen. Resultaten visar att Linus kärnans sekvensering har tillräckligt med information för att upptäcka skadligt beteende av skadliga applikationer på ARMv8 arkitekturen. Alla funktionsvektorer presterade bra. N-gram och cooccurrence matriserna uppnådde till och med lysande resultat. För att reducera beräkningskomplexiteten av analysen, experimenterade vi med att enbart använda de vanligaste systemanropen. Fast noggrannheten minskade lite, var det värt uppoffringen eftersom beräkningskomplexiteten reducerades märkbart.
92

Studies on Heat-related Health Risks and Evaluation Methods in Japan: The Effects of Global Warming and COVID-19 Pandemic / 日本の熱関連健康リスクとその評価手法に関する研究-地球温暖化と新型コロナウイルスの影響を踏まえて-

Ke, Deng 25 March 2024 (has links)
学位プログラム名: 京都大学大学院思修館 / 京都大学 / 新制・課程博士 / 博士(総合学術) / 甲第25460号 / 総総博第36号 / 新制||総総||6(附属図書館) / 京都大学大学院総合生存学館総合生存学専攻 / (主査)教授 IALNAZOVDimiter Savov, 教授 山敷 庸亮, 准教授 関山 健, 寶 馨 (防災科学技術研究所) / 学位規則第4条第1項該当 / Doctor of Philosophy / Kyoto University / DFAM
93

The interactional organisation of initial business-to-business sales calls with prospective clients

Huma, Bogdana January 2018 (has links)
The aim of this thesis is to break new ground by investigating the interactional organisation of real events that comprise live business-to-business cold calls. Despite being a ubiquitous part of everyday life, we know very little about how cold calls are initiated, progressed, and completed. Cold calls are unsolicited telephone encounters, initiated by salespeople aiming to get prospective clients ( prospects ) interested in their services, with the distal goal of turning them into clients and the proximal goal of getting them to agree to an initial meeting. Cold calls are often treated as a nuisance by call-takers, and salespeople must deal with reluctant gatekeepers, recurrent sales resistance, and the occasional hang-up. The training they receive often draws on outdated theories of communication and is rarely supported by empirical evidence. Thus, this study not only addresses an important domain for interactional research, but also fulfils a practical necessity for empirical research that will inform sales training and improve callers and call-takers experiences. The data comprise 150 recorded calls supplied by three British companies that sell, service, and lease office equipment. The data were collected, transcribed, and analysed within an ethnomethodological framework using conversation analysis and discursive psychology. The first analytic chapter outlines the overall structural organisation of cold calling. It documents the constituent activities within the opening, the business of the call, and the closing. It identifies and describes two types of cold calls. Freezing calls are initiated by salespeople who are contacting a prospect for the very first time. Lukewarm calls feature salespeople who claim to have been in contact with the prospect s organisation in the past. The second chapter excavates the initial turns of lukewarm calls in which salespeople ask to speak to another person within the company, with whom they indicate to be acquainted. The analysis revealed that this third-party acquaintanceship was crucial for establishing the legitimacy of the switchboard request and for improving the chances of getting it granted. The third chapter focused on appointment-making sequences in both freezing and lukewarm calls, showing that they comprise two components: a preamble and a meeting request sequence. I also highlight how salespeople exploit sequential and turn-taking mechanisms to secure meetings with prospects without giving the latter the opportunity to refuse. The final chapter examines two practices for enacting resistance in cold calls blocks and stalls and documents the range of methods salespeople employ for dealing with each type of resistance. Sales blocks expose the salesperson s commercial agenda, attempt to stop the prospecting activity, and move towards call pre-closure. In response, salespeople can challenge, counter, or circumvent blocks as well as redo their initiating actions. Stalls slow down the progress of the sales process by delaying the next phase of the sale or by proposing less commitment-implicative alternatives. Salespeople deal with stalls by either justifying their initial proposal or by spontaneously introducing new action plans, both being more conducive to the progress of the sale. The thesis contributes to a growing body of interactional research on commercial encounters by shedding empirical light on a previously unexamined setting, business-to-business cold calls. It also moves forward discursive psychology s project of respecifying psychological phenomena by documenting the communicative practices associated with persuasion and resistance. Finally, it expands the extant conversation analytic toolkit by examining new practices (such as appointment-making) and by providing new insights into key conversation analytic topics (such as requests, pre-sequences, and accounts for calling). Overall, the findings presented in this thesis challenge existing conceptions of prospecting through cold calling that are prevalent in the sales literature. The thesis puts forward a strong argument for opening the black box of cold calls to better understand these interactions and to identify good practices as the basis for communication training. Research presented in this thesis has already been used in the development of CARM (Conversation Analytic Role-play Method) training for salespeople, who reported having doubled their appointment rates. Based on the findings in this thesis, I plan to develop further training not only for salespeople but also for prospective customers, thus improving the overall outcome of cold call encounters.
94

Anti-predator behaviour of black-fronted titi monkeys (Callicebus nigrifrons)

Ca¨sar, Cristiane January 2012 (has links)
Titi monkeys have long been known for their complex vocal behaviour with numerous high- and low-pitched calls, which can be uttered singly or combined in more complex structures. However, up to date very little is known concerning the function, meaning and context-specific use of these vocal utterances, and virtually nothing is known about their vocalisations in the predation context. This thesis presents a detailed description of the form and function of the anti-predator behaviour of one species of titi monkeys, the black-fronted titi monkey (Callicebus nigrifrons), with a specific focus on their alarm call behaviour. A second aim was to determine the exact mechanisms of alarm calling behaviour, with an emphasis on production and comprehension. Data were collected from several habituated groups in the Caraça Reserve, Minas Gerais, Brazil. Results showed that, when detecting predator species, C nigrifrons produce sequences that initially contain two types of brief, high-pitched calls with distinct frequency contours. Further evidence suggested that some of these sequences are meaningful to conspecific receivers, by indicating the general predator class and location of threat. There were also indications that, within the terrestrial threats, additional information may be encoded by acoustic and compositional differences. Analyses of call order and number of calls per sequence suggested that callers may be able to convey information on both predator type and location. The black-fronted titi monkeys’ vocal system thus provides a further example of zoo-syntax, in which acoustically fixed units of a vocal repertoire are combined into higher order sequences that are meaningful to recipients. According to current definitions, this type of calling behaviour qualifies as functionally referential, by indicating general predator class, terrestrial predator type and location. As such, this is the first empirical demonstration of a sequence-based alarm call system that conveys information on both predator category and location.
95

O universo do 190 pela perspectiva da fala-em-interação

Corona, Márcia de Oliveira Del 19 December 2011 (has links)
Submitted by William Justo Figueiro (williamjf) on 2015-06-13T12:07:18Z No. of bitstreams: 1 9.pdf: 10943937 bytes, checksum: 80b5f4f166aef1f41cf8270b9c1def07 (MD5) / Made available in DSpace on 2015-06-13T12:07:18Z (GMT). No. of bitstreams: 1 9.pdf: 10943937 bytes, checksum: 80b5f4f166aef1f41cf8270b9c1def07 (MD5) Previous issue date: 2011-12-19 / UNISINOS - Universidade do Vale do Rio dos Sinos / Esse estudo, de cunho etnográfico (O’REILLY, 2009) e fundamentado pelo arcabouço teórico-metodológico da Análise da Conversa Etnometodológica (GARFINKEL, 1967; SACKS, 1992) e da Análise de Categorias de Pertença (SACKS, 1992; SCHEGLOFF, 1972; SELL; OSTERMANN, 2009)), analisa duzentas interações telefônicas entre comunicantes e atendentes do serviço de emergência “190” da Brigada Militar de Porto Alegre. Os resultados da pesquisa mostram que as interações apresentam uma macroorganização estruturada em cinco atividades chave (ZIMMERMAN, 1984; 1992), sequencialmente negociadas: 1) abertura/identificação/alinhamento; 2) solicitação; 3) sequência interrogativa; 4) resposta; e 5) fechamento, em que o grande par adjacente solicitação/resposta se constitui na sequência central do evento. Percebe-se, também, uma forte orientação dos comunicantes para a solicitação de uma viatura, e dos atendentes, para o envio de uma viatura como o produto final desse par adjacente central e da prestação de serviço dos atendimentos do 190. Quando a necessidade do envio de uma viatura é posta em dúvida, a rotina das práticas de atender é desestabilizada, e o mandato institucional desse serviço é questionado, gerando consequências interacionais para a conversa em andamento. A análise dos dados revela a orientação dos comunicantes para suas Categorias de Pertença (SACKS, 1992; SCHEGLOFF, 1972; SELL; OSTERMANN, 2009) na produção de accounts narrativos (DE FINA, 2009) que buscam convencer os atendentes da legitimidade de sua solicitação de ajuda. Orientados pelo conhecimento socialmente compartilhado do que se constituem em eventos moralmente sancionáveis, ao mesmo tempo em que vitimizam o comunicante, os accounts narrativos produzidos pelos comunicantes constroem uma relação de antagonismo entre ele e o seu agressor, o qual é responsabilizado pelos fatos reportados. A orientação dos participantes para determinadas Categorias de Pertença também é revelada na formulação do local para onde a viatura deve ser enviada. O engessamento provocado pelas limitações do formulário eletrônico de solicitação de serviço é materializado, por exemplo, na necessidade de informação do nome de um logradouro e de um numeral previamente cadastrados no software utilizado. Esse tipo de restrição impõe limitações quanto à inserção de outros formatos de endereço – vigentes na organização social atual, principalmente das camadas sociais menos favorecidas – e que divergem do formato padrão, dificultando, assim, o acesso dessas pessoas à segurança pública. Verificou-se também que, para a manutenção da intersubjetividade no atendimento telefônico do 190, tanto o atendente, quanto o comunicante, precisam estar orientados para o atendimento das demandas impostas pelo software operacional, o que tornou possível compreender que a investigação da intersubjetividade nos novos contextos tecnologizados demanda que o pesquisador alargue os campos semióticos (C.GOODWIN, 2000) investigados. Da mesma forma, os recursos linguístico-interacionais mobilizados pelos comunicantes, ao formularem o local para onde a viatura deve ser enviada, demonstra a sua falta de letramento quanto às práticas sociais em questão. Esse estudo resultou em um curso de capacitação de 50 horas/aula para a qualificação dos atendimentos telefônicos desse serviço de emergência e na implementação de um processo seletivo interno para o ingresso na função de atendente, que também são discutidos no texto. / This study analyzes two hundred telephone emergency calls between callers and call takers at Brigada Militar (190), in Porto Alegre, from an ethnographic (O’REILLY, 2009) perspective and based on Ethnomethodological Conversation Analysis (GARFINKEL, 1967; SACKS, 1992) and Membership Categorization Analysis principles (SACKS, 1992; SCHEGLOFF, 1972; SELL; OSTERMANN, 2009). The results of this research study show that the interactions present a macrostructure organized into five key activities that are sequentially negotiated (ZIMMERMAN, 1984; 1992): 1) opening/identification/alignment; 2) request; 3) interrogative sequence; 4) response; and 5) closing, in which the adjacency pair request/response consists of the main sequence of the event. Callers’ strong orientation to the request for a police car and call takers’ orientation to the dispatch of a police car are also identified as the final product of this adjacency pair and of the provision of the service. When the need for the dispatch of a police car is questioned by a caller, the routine of the practices involved in the processing of the call is destabilized and the institutional mandate of 190 is questioned, and this fact brings in interactional consequences to the flow of the interactions. The analysis of the data reveals callers’ orientation to certain Membership Categories (SACKS, 1992; SCHEGLOFF, 1972; SELL; OSTERMANN, 2009) in the production of narrative accounts (DE FINA, 2009), which aim at convincing call takers of the legitimacy of their requests. Based on the socially shared knowledge of morally loaded events, at the same time that these narrative accounts victimize the caller, they also build an antagonistic relationship between caller and aggressor – with the latter being allegedly responsible for the facts being reported. Participants’ orientations to certain Membership Categories can also be seen in their formulation of the place to where the police car must be dispatched. The limitations imposed by the electronic form is materialized, for instance, in the need to insert the name of a street and a number, which can be retrieved from the database, in the address slot. This restriction limits the insertion of other formats of address – which can be found in the current social organization (especially in the less privileged social classes) – and which restricts the access of those people to public safety. It was also possible to notice that, the maintenance of intersubjectivity in emergency calls depends on callers’ and call takers’ orientation to meet the demands of the software, and this fact shows that the study of intersubjectity in new, technologized contexts demands that the researcher considers other semiotic fields (C.GOODWIN, 2000) in the investigation. At the same time, the linguistic resources mobilized by the callers when formulating the place where the police car must be sent to displays their illiteracy concerning the social practices of the modern world. This research resulted in a fifty-hour training program to qualify the call-taking services and in the implementation of an internal recruitment process for the position of call taker, which are also discussed in this work.
96

The Nepotistic Parent; Predator Protection, Kinship and Philopatry

Griesser, Michael January 2003 (has links)
<p>Evolution is fuelled by independent reproduction events. Yet, the offspring of at least three percent of all bird species postpone dispersal and forego independent reproduction. The Siberian jay, <i>Perisoreus infaustus, </i>is such a species where some<i> </i>offspring are philopatric and remain in their natal territory for up to three years, forming family groups. The main finding of this thesis is that nepotistic anti-predator behaviour displayed by parents provided philopatric offspring benefits, which could be an incentive to stay and forego independent reproduction. Predation, (hawks - 80 % and owls - 15% of deaths observed) is the main cause of mortality. Parents increased their vigilance nepotistically; they were more vigilant against surprise predator attacks, and gave alarm calls when attacked when feeding together with offspring. However, the two parents differed in their behaviour. Mothers gave calls only when together with their offspring, while males also warned unrelated immigrants. Sitting predators were approached and mobbed more intensely by parents in the presence of philopatric offspring. The vocalisation of Siberian jays provides information about predation risk. Specific calls are given for hawks and owls, and calls also varied with hawk behaviour. The nepotistic anti-predator behaviour of parents is a benefit, which the offspring can gain only “at home”, and such behaviour appears to promote offspring to forego dispersal and independent reproduction. This was confirmed in an experimental manipulation; philopatric offspring dispersed when fathers were removed and replaced by a despotic, immigrant stepfather. From a life-history perspective, parents have an incentive to protect their reproductive investment. Nepotistic anti-predator behaviour create a safe haven in the natal territory for philopatric offspring and provides direct fitness benefits. Without such direct fitness benefits offspring may disperse and wait for a breeding opening elsewhere. </p>
97

The Nepotistic Parent; Predator Protection, Kinship and Philopatry

Griesser, Michael January 2003 (has links)
Evolution is fuelled by independent reproduction events. Yet, the offspring of at least three percent of all bird species postpone dispersal and forego independent reproduction. The Siberian jay, Perisoreus infaustus, is such a species where some offspring are philopatric and remain in their natal territory for up to three years, forming family groups. The main finding of this thesis is that nepotistic anti-predator behaviour displayed by parents provided philopatric offspring benefits, which could be an incentive to stay and forego independent reproduction. Predation, (hawks - 80 % and owls - 15% of deaths observed) is the main cause of mortality. Parents increased their vigilance nepotistically; they were more vigilant against surprise predator attacks, and gave alarm calls when attacked when feeding together with offspring. However, the two parents differed in their behaviour. Mothers gave calls only when together with their offspring, while males also warned unrelated immigrants. Sitting predators were approached and mobbed more intensely by parents in the presence of philopatric offspring. The vocalisation of Siberian jays provides information about predation risk. Specific calls are given for hawks and owls, and calls also varied with hawk behaviour. The nepotistic anti-predator behaviour of parents is a benefit, which the offspring can gain only “at home”, and such behaviour appears to promote offspring to forego dispersal and independent reproduction. This was confirmed in an experimental manipulation; philopatric offspring dispersed when fathers were removed and replaced by a despotic, immigrant stepfather. From a life-history perspective, parents have an incentive to protect their reproductive investment. Nepotistic anti-predator behaviour create a safe haven in the natal territory for philopatric offspring and provides direct fitness benefits. Without such direct fitness benefits offspring may disperse and wait for a breeding opening elsewhere.
98

投資人情緒與法人說明會關聯性之研究 / Investor sentiment and conference calls

吳博翀, Wu, Po Chung Unknown Date (has links)
本文旨在探討投資人情緒與法人說明會之關聯性,即公司如何經由召開法人說明會,策略性地回應投資人情緒反應,以企圖影響情緒所導致的預期偏差。實證發現:管理當局策略性地改變其自願性揭露政策,以反映投資人情緒。當投資人情緒愈低落時,公司將傾向於召開法人說明會,且公司召開法人說明會之頻率亦會增加。相反的,當投資人情緒高昂時,公司則愈不會召開法人說明會。再者,當投資人情緒愈低落時,法人說明會所揭露之公司資訊將愈樂觀。此研究亦顯示公司自願性揭露政策的選擇,反映管理當局渴望維持樂觀之評價。 / In this paper we explore the association between investor sentiment and the likelihood of holding conference calls. In other words, this paper investigates how firms react strategically to investor sentiment via their conference calls in an attempt to influence the sentiment-induced biases in expectations. We show that managers strategically vary their voluntary disclosure policies in response to prevailing sentiment. We find that during low-sentiment periods, the firms are more likely to conduct conference calls and conduct them more frequently; while during periods of high sentiment they decrease the frequency of conference calls. In addition, during low-sentiment periods, the conference calls disclose more optimistic information. Overall, this study provides evidence that company’s voluntary disclosure choices reflect managers desire to maintain optimistic valuations.
99

Audience participation using mobile phones as musical instruments

Lee, Sang Won 21 May 2012 (has links)
This research aims at a music piece for audience participation using mobile phones as musical instruments in a music concert setting. Inspired by the ubiquity of smart phones, I attempted to accomplish audience engagement in a music performance by crafting an accessible musical instrument with which audience can be a part of the performance. The research begins by reviewing the related works in two areas, mobile music and audience participation at music performances, builds a charted map of the areas and its intersection to seek an innovation, and defines requisites for a successful audience participation where audience can participate in music making as musicians with their mobile phones. To make accessible audience participation, the concept of a networked multi-user instrument is applied for the system. With the lessons learnt, I developed echobo, a mobile musical instrument application for iOS devices (iPhone, iPad and iPod Touch). With this system, audience can download the app at the concert, play the instrument instantly, interact with other audience members, and contribute to the music by sound generated from their mobile phones. A music piece for echobo and a clarinet was presented in a series of performances and the application was found to work reliably and accomplish audience engagement. The post-survey results indicate that the system was accessible, and helped the audience to connect to the music and other musicians.
100

A estética da montagem em vídeos produzidos por celular: análise de sete vidas (2008) e 5#calls (2010)

Silva, Aline Lisboa da 03 June 2015 (has links)
Submitted by Clebson Anjos (clebson.leandro54@gmail.com) on 2016-02-17T18:41:30Z No. of bitstreams: 1 arquivototal.pdf: 3143918 bytes, checksum: bd7b01a164bd64c69c7974f844f1b3fc (MD5) / Made available in DSpace on 2016-02-17T18:41:30Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 3143918 bytes, checksum: bd7b01a164bd64c69c7974f844f1b3fc (MD5) Previous issue date: 2015-06-03 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This research aims to examine the principles of the aesthetics of editing in films produced by mobile phone. The paper analyses two short films awarded in festivals, #5calls (2010) directed by Giuliano Chiaradia and Seven Lives (2008), by Gabriel Bortolini. The proposal is to observe how these latest productions are being reconfigured in face of the audiovisual scene, from the technical and aesthetical point of view, also relating these aspects to the fragmentation of contemporary life and its cybrid context. Since it is a modern and multifaceted language, which provides experimental art tendencies, the research aims to look into the mounting of this type of production, not only as a technical operation, but mainly analysing the aesthetic implications presented. At first, under the technological perspective, the language of handheld devices and new art-media poetics, some discussions will be fomented by authors such as Lucia Santaella (2007), observing new hybrid audiovisual formats; Giselle Beiguelman (2011), discussing the artistic practices arising from the use of mobile technologies and Arlindo Machado (2007), with the expansion of the concept of cinema. In a second moment, we propose to observe the types of mounting, according to the approach of Vincent Amiel (2007) - narrative, discursive and by correspondence - as well as some of its peculiarities, among which the articulations and relations between the plans; the principles of merging and transmission; the representation of the world and the dominant aesthetic procedures, using authors like Jacques Aumont (2011), Ismail Xavier (2011) Sergei Eisenstein (2002) and André Bazin (2014) to point relevant issues in mounting theories. As a method, we used the analysis of the image, as of Martine Joly (2010), highlighting three crucial steps towards aesthetic comprehension: decomposing the videos into parts to be analyzed; establishing relationships between the decomposed elements and, finally, interpreting them according to aesthetic theory of the assembly, based on Vincent Amiel (2007). The analysis, which is the last chapter, brings up relevant discussions of current videographic practices through the selection of eight short films – all produced using mobile phones, and more specifically the assembly of these productions, in an aesthetic perspective. The focus, however, are the short films of Bortolini and Chiaradia, which are examined in more detail, dialoguing directly with the issues raised in chapters one and two of this research. / A pesquisa trata de examinar princípios da estética da montagem em filmes produzidos por celular. O trabalho analisa, inicialmente, oito curtas, selecionados a partir de critérios específicos: resultados realizados em sua totalidade com celular e que estão inseridos na rede, desde plataformas como Youtube/Vimeo ou sites dos próprios Festivais, como Cel.U.Cine. em seguida passamos à análise dos dois vídeos, foco da pesquisa, 5#calls (2010), do diretor Giuliano Chiaradia e Sete vidas (2008), de Gabriel Bortolini. A proposta é observar como essas produções vêm se reconfigurando diante do cenário audiovisual, sob o ponto de vista técnico e estético, relacionando ainda esses aspectos à fragmentação da vida contemporânea e ao seu contexto cíbrido. Por se tratar de uma linguagem atual e multifacetada, que propicia tendências a uma arte experimental, a pesquisa tem como objetivo observar a montagem desse tipo de produção, não apenas como operação técnica, mas, sobretudo, analisando as implicações estéticas apresentadas. Em um primeiro momento, sob o prisma tecnológico, da linguagem dos dispositivos portáteis e novas poéticas da arte-mídia, algumas discussões serão fomentadas por autores como Lúcia Santaella (2007), observando novos formatos audiovisuais híbridos; Giselle Beiguelman (2011), que discute as práticas artísticas em decorrência do uso das tecnologias móveis e Arlindo Machado (2007), com a expansão do conceito de cinema. Em um segundo momento, examinamos tipologias da montagem, de acordo com Vincent Amiel (2007) – narrativa, discursiva e por correspondências –, como também algumas de suas especificidades, dentre elas, as articulações e relações entre os planos; os princípios de junção e de transmissão; a representação do mundo e os procedimentos estéticos dominantes, utilizando autores como Jacques Aumont (2011), Ismail Xavier (2012), Sergei Einsenstein (2002) e André Bazin (2014) para pontuar questões relevantes das teorias da montagem. Como método, utilizamos a análise da imagem, a partir de Martine Joly (2010), destacando três etapas cruciais no sentido de compreensão estética: decompondo os vídeos em partes a serem analisadas; estabelecendo relações entre os elementos decompostos e, por fim, interpretando-os de acordo com a teoria estética da montagem, embasada por Vicent Amiel (2007). A análise, que constitui o último capítulo, traz à tona discussões pertinentes acerca das práticas videográficas atuais, através da seleção de oito curtas – todos produzidos com celular, e mais especificamente da montagem dessas produções, numa perspectiva estética. O foco da análise, no entanto, são os curtas de Bortolini e Chiaradia, os quais são examinados de forma mais detalhada, dialogando com os temas levantados nos capítulos um e dois desta pesquisa.

Page generated in 0.0811 seconds