leonardo bonetti | Conservatorio di Musica Giuseppe Verdi, Milano (original) (raw)
Uploads
Papers by leonardo bonetti
When How to Meditate was first published more than twenty years ago, meditation was not widely kn... more When How to Meditate was first published more than twenty years ago, meditation was not widely known or practiced in the West, and there were few books about it. Things are different now. Millions of Western people practice meditation regularly; doctors prescribe it to their patients as a way to deal with pain, heart disease, cancer, depression, and other problems; scientists are studying its effects on the brain and the immune system. There are dozens of books, tapes, CDs, and websites about meditation, and meditation classes are available in most cities. Whatever I know about Buddhism and meditation I have learned from my kind and compassionate teachers, especially Lama Thubten Yeshe, Zopa Rinpoche, His Holiness the Dalai Lama, Geshe Ngawang Dhargyey, Geshe Jampa Tegchog, and Ribur Rinpoche. I thank these precious teachers from my heart for sharing with us their knowledge and insight and pray sincerely that their work may continue for a long time to come. Many people have worked to make this book possible. I extend thanks to Wendy Finster for her Handbook of Mahayana Practices, from which this book developed; to Thubten Wongmo, Jon Landaw, and T. Yeshe for their initial editing and translating work; to Nick
This paper presents an investigation of spectral entropy features, used for voice activity detect... more This paper presents an investigation of spectral entropy features, used for voice activity detection, in the context of speech recognition. The entropy is a measure of disorganization and it can be used to measure the peakiness of a distribution. We compute the entropy features from the short-time Fourier transform spectrum, normalized as a PMF. The concept of entropy shows that the voiced regions of speech have lower entropy since there are clear formants. The flat distribution of silence or noise would induce high entropy values. In this paper, we investigate the use of the entropy as speech features for speech recognition purpose. We evaluate different sub-band spectral entropy features on the TI-DIGIT database. We have also explored the use of multi-band entropy features to create higher dimensional entropy features. Furthermore, we append the entropy features to baseline MFCC 0 and evaluate them in clean, additive babble noise and reverberant environments. The results show that entropy features improve the baseline performance and robustness in additive noise.
Repcheck, then editor-in-chief of Helix Books at Addison-Wesley, approached me with a request: Wo... more Repcheck, then editor-in-chief of Helix Books at Addison-Wesley, approached me with a request: Would I inaugurate the Lllarn Lectures? The series was to be an annual event, honoring the renowned twentieth-century polymath Stanislaw tJlam. The lectures were to be aimed at a general, science-interested audience, and they were to be expanded into a book so that there would be a permanent record-Although I am quite active in institute affairs, the request came as a complete surprise. At first I was apprehensive because the time was short-the lectures were to be given sometime in the first half of 1994 and a publishable manuscript was due at the end of that summer. But there were several incentives. At the top of the list was my long admiration of Stan l.Jlam's work-'When I was a student, there were a few contemporary scientists whose work and abilities I particularly admired: John von Neumann, Ronald Fisher, and Robert Oppenheimer. In pursuing the many facets of von Neumann's work, I repeatedly came across the name Stanislaw LJlam in contexts close to my main interests. So I began to look into his work-That was the beginnirg of an increasirg affintty for Ulamt approach to science , tn affinity considerably enhanced when I read his 1 97 6 book, XVII
Books by leonardo bonetti
Il presente file può essere usato esclusivamente per finalità di carattere personale. Tutti i con... more Il presente file può essere usato esclusivamente per finalità di carattere personale. Tutti i contenuti sono protetti dalla Legge sul diritto d'autore. Nomi e marchi citati nel testo sono generalmente depositati o registrati dalle rispettive case produttrici. Typeset with ConT E Xt and SuperCollider by Andrea Valle Sintesi, I: fondamenti di elaborazione del segnale 4.1 Poche centinaia di parole d'acustica 4.2 Analogico vs. digitale 4.3 Algoritmi di sintesi 4.4 Metodi di Signal 4.5 Altri segnali e altri algoritmi 4.6 Ancora sull'elaborazione di segnali 4.7 Segnali di controllo 4.8 Conclusioni 5 L'architettura e il server 5.1 Client vs. server 5.2 Ontologia del server audio come impianto di sintesi 5.3 Il server 5.4 SynthDef 5.5 UGen e UGen-Graph 5.6 Synth e Group 5.7 Un theremin 5.8 Un esempio di sintesi e controllo in tempo reale 5.9 Espressività del linguaggio: algoritmi 5.10 Espressività del linguaggio: abbreviazioni 5
Dello stesso autore nel catalogo Einaudi Brevi interviste con uomini schifosi Oblio Considera l'a... more Dello stesso autore nel catalogo Einaudi Brevi interviste con uomini schifosi Oblio Considera l'aragosta Infinite Jest Questa è l'acqua Titolo originale The Broom of the System
institutions who assisted me during the decade and a half I spent researching and writing this bo... more institutions who assisted me during the decade and a half I spent researching and writing this book. I especially want to thank Terry Fine and Christina Dunbar-Hester for their advice, assistance, and support over the years. Terry, a professor emeritus in the School of Electrical and Computer Engineering (ECE) at Cornell University, a friend and colleague whose office was down the hall from mine for many years (in my joint appointment between ECE and the Science and Technology Studies Department in the Arts College), helped me understand the basic principles of information theory, discussed the often testy relationships between that field and cybernetics during his career, and critiqued my account of the field he loves. As a Ph.D. student in science and technology studies, Christina, now an assistant professor at Rutgers University, served as a sounding board and friendly critic of the ideas in this book when she was at Cornell, particularly when she took my seminar on cybernetics and helped me teach an undergraduate course on the history of information technology. In combing through the massive Warren McCulloch Papers at the American Philosophical Society as a research assistant, Christina deepened the research for the book at a critical time. Her comments on several chapters were insightful. I would also like to thank other former students for their research assistance: Alec Shuldiner, for finding material on the development of information theory in the extensive AT&T archives; Albert Tu, for copying newspaper and magazine articles on cybernetics and information theory; Lav Varshney, for researching the acceptance of information theory in American electrical engineering journals and for alerting me to obscure published sources on Claude Shannon; and Daniel Kreiss at Stanford University, for gathering material on NASA's cyborg project at the Ames Research Center. Thanks also to Glen Bugos at NASA, for helping navigate the Ames Research Center archives, and to Rachel Prentice at Cornell and David Hounshell at Carnegiex Acknowledgments Mellon University, for providing copies of archival material from their own research. Rick Johnson at Cornell and Julian Reitman, a former officer of the IEEE Society on Systems, Man, and Cybernetics, shared their recollections of that society in the 1960s and 1970s. The late Dick Neisser, a founder of cognitive psychology, painted a vivid picture for me of information studies in the 1950s. In addition to Terry and Christina, I wish to thank Bill Aspray,
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported ... more This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. You are free to: Share-copy and redistribute the material in any medium or format Adapt-remix, transform, and build upon the material The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution-You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. NonCommercial-You may not use the material for commercial purposes. ShareAlike-If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original. This publication was made possible by a SUNY Innovative Instruction Technology Grant (IITG). IITG is a competitive grants program open to SUNY faculty and support staff across all disciplines. IITG encourages development of innovations that meet the Power of SUNY's transformative vision.
Contents 3. Contesting for the Body ofInformation: The Macy Conferences on Cybernetics / 50 4. Li... more Contents 3. Contesting for the Body ofInformation: The Macy Conferences on Cybernetics / 50 4. Liberal Subjectivity Imperiled: Norbert Wiener and Cybernetic Anxiety / 84 5. From Hyphen to Splice: Cybernetic Syntax in Limho / 113 6. The Second Wave of Cybernetics: From Reflexivity to Self-Organization / 131 7. Turning Reality Inside Out and Right Side Out: Boundary Work in the Mid-Sixties Novels of Philip K. Dick / 160 8. The MaterialityofInformatics / 192 9. Narratives of Artificial Life / 222 10. The Semiotics of Virtuality: Mapping the Posthuman / 247 11. Conclusion: What Does It Mean to Be Posthuman? / 283 Notes / 293 Index /325 The notion of distributed cognition, central to the posthuman as it is defined in this book, makes acknowledging intellectual and practical contributions to this project an inevitability as well as a pleasure. The arguments have benefited from conversations and correspondence with many friends and colleagues, among them Evelyn
Talks by leonardo bonetti
When How to Meditate was first published more than twenty years ago, meditation was not widely kn... more When How to Meditate was first published more than twenty years ago, meditation was not widely known or practiced in the West, and there were few books about it. Things are different now. Millions of Western people practice meditation regularly; doctors prescribe it to their patients as a way to deal with pain, heart disease, cancer, depression, and other problems; scientists are studying its effects on the brain and the immune system. There are dozens of books, tapes, CDs, and websites about meditation, and meditation classes are available in most cities. Whatever I know about Buddhism and meditation I have learned from my kind and compassionate teachers, especially Lama Thubten Yeshe, Zopa Rinpoche, His Holiness the Dalai Lama, Geshe Ngawang Dhargyey, Geshe Jampa Tegchog, and Ribur Rinpoche. I thank these precious teachers from my heart for sharing with us their knowledge and insight and pray sincerely that their work may continue for a long time to come. Many people have worked to make this book possible. I extend thanks to Wendy Finster for her Handbook of Mahayana Practices, from which this book developed; to Thubten Wongmo, Jon Landaw, and T. Yeshe for their initial editing and translating work; to Nick
This paper presents an investigation of spectral entropy features, used for voice activity detect... more This paper presents an investigation of spectral entropy features, used for voice activity detection, in the context of speech recognition. The entropy is a measure of disorganization and it can be used to measure the peakiness of a distribution. We compute the entropy features from the short-time Fourier transform spectrum, normalized as a PMF. The concept of entropy shows that the voiced regions of speech have lower entropy since there are clear formants. The flat distribution of silence or noise would induce high entropy values. In this paper, we investigate the use of the entropy as speech features for speech recognition purpose. We evaluate different sub-band spectral entropy features on the TI-DIGIT database. We have also explored the use of multi-band entropy features to create higher dimensional entropy features. Furthermore, we append the entropy features to baseline MFCC 0 and evaluate them in clean, additive babble noise and reverberant environments. The results show that entropy features improve the baseline performance and robustness in additive noise.
Repcheck, then editor-in-chief of Helix Books at Addison-Wesley, approached me with a request: Wo... more Repcheck, then editor-in-chief of Helix Books at Addison-Wesley, approached me with a request: Would I inaugurate the Lllarn Lectures? The series was to be an annual event, honoring the renowned twentieth-century polymath Stanislaw tJlam. The lectures were to be aimed at a general, science-interested audience, and they were to be expanded into a book so that there would be a permanent record-Although I am quite active in institute affairs, the request came as a complete surprise. At first I was apprehensive because the time was short-the lectures were to be given sometime in the first half of 1994 and a publishable manuscript was due at the end of that summer. But there were several incentives. At the top of the list was my long admiration of Stan l.Jlam's work-'When I was a student, there were a few contemporary scientists whose work and abilities I particularly admired: John von Neumann, Ronald Fisher, and Robert Oppenheimer. In pursuing the many facets of von Neumann's work, I repeatedly came across the name Stanislaw LJlam in contexts close to my main interests. So I began to look into his work-That was the beginnirg of an increasirg affintty for Ulamt approach to science , tn affinity considerably enhanced when I read his 1 97 6 book, XVII
Il presente file può essere usato esclusivamente per finalità di carattere personale. Tutti i con... more Il presente file può essere usato esclusivamente per finalità di carattere personale. Tutti i contenuti sono protetti dalla Legge sul diritto d'autore. Nomi e marchi citati nel testo sono generalmente depositati o registrati dalle rispettive case produttrici. Typeset with ConT E Xt and SuperCollider by Andrea Valle Sintesi, I: fondamenti di elaborazione del segnale 4.1 Poche centinaia di parole d'acustica 4.2 Analogico vs. digitale 4.3 Algoritmi di sintesi 4.4 Metodi di Signal 4.5 Altri segnali e altri algoritmi 4.6 Ancora sull'elaborazione di segnali 4.7 Segnali di controllo 4.8 Conclusioni 5 L'architettura e il server 5.1 Client vs. server 5.2 Ontologia del server audio come impianto di sintesi 5.3 Il server 5.4 SynthDef 5.5 UGen e UGen-Graph 5.6 Synth e Group 5.7 Un theremin 5.8 Un esempio di sintesi e controllo in tempo reale 5.9 Espressività del linguaggio: algoritmi 5.10 Espressività del linguaggio: abbreviazioni 5
Dello stesso autore nel catalogo Einaudi Brevi interviste con uomini schifosi Oblio Considera l'a... more Dello stesso autore nel catalogo Einaudi Brevi interviste con uomini schifosi Oblio Considera l'aragosta Infinite Jest Questa è l'acqua Titolo originale The Broom of the System
institutions who assisted me during the decade and a half I spent researching and writing this bo... more institutions who assisted me during the decade and a half I spent researching and writing this book. I especially want to thank Terry Fine and Christina Dunbar-Hester for their advice, assistance, and support over the years. Terry, a professor emeritus in the School of Electrical and Computer Engineering (ECE) at Cornell University, a friend and colleague whose office was down the hall from mine for many years (in my joint appointment between ECE and the Science and Technology Studies Department in the Arts College), helped me understand the basic principles of information theory, discussed the often testy relationships between that field and cybernetics during his career, and critiqued my account of the field he loves. As a Ph.D. student in science and technology studies, Christina, now an assistant professor at Rutgers University, served as a sounding board and friendly critic of the ideas in this book when she was at Cornell, particularly when she took my seminar on cybernetics and helped me teach an undergraduate course on the history of information technology. In combing through the massive Warren McCulloch Papers at the American Philosophical Society as a research assistant, Christina deepened the research for the book at a critical time. Her comments on several chapters were insightful. I would also like to thank other former students for their research assistance: Alec Shuldiner, for finding material on the development of information theory in the extensive AT&T archives; Albert Tu, for copying newspaper and magazine articles on cybernetics and information theory; Lav Varshney, for researching the acceptance of information theory in American electrical engineering journals and for alerting me to obscure published sources on Claude Shannon; and Daniel Kreiss at Stanford University, for gathering material on NASA's cyborg project at the Ames Research Center. Thanks also to Glen Bugos at NASA, for helping navigate the Ames Research Center archives, and to Rachel Prentice at Cornell and David Hounshell at Carnegiex Acknowledgments Mellon University, for providing copies of archival material from their own research. Rick Johnson at Cornell and Julian Reitman, a former officer of the IEEE Society on Systems, Man, and Cybernetics, shared their recollections of that society in the 1960s and 1970s. The late Dick Neisser, a founder of cognitive psychology, painted a vivid picture for me of information studies in the 1950s. In addition to Terry and Christina, I wish to thank Bill Aspray,
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported ... more This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. You are free to: Share-copy and redistribute the material in any medium or format Adapt-remix, transform, and build upon the material The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution-You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. NonCommercial-You may not use the material for commercial purposes. ShareAlike-If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original. This publication was made possible by a SUNY Innovative Instruction Technology Grant (IITG). IITG is a competitive grants program open to SUNY faculty and support staff across all disciplines. IITG encourages development of innovations that meet the Power of SUNY's transformative vision.
Contents 3. Contesting for the Body ofInformation: The Macy Conferences on Cybernetics / 50 4. Li... more Contents 3. Contesting for the Body ofInformation: The Macy Conferences on Cybernetics / 50 4. Liberal Subjectivity Imperiled: Norbert Wiener and Cybernetic Anxiety / 84 5. From Hyphen to Splice: Cybernetic Syntax in Limho / 113 6. The Second Wave of Cybernetics: From Reflexivity to Self-Organization / 131 7. Turning Reality Inside Out and Right Side Out: Boundary Work in the Mid-Sixties Novels of Philip K. Dick / 160 8. The MaterialityofInformatics / 192 9. Narratives of Artificial Life / 222 10. The Semiotics of Virtuality: Mapping the Posthuman / 247 11. Conclusion: What Does It Mean to Be Posthuman? / 283 Notes / 293 Index /325 The notion of distributed cognition, central to the posthuman as it is defined in this book, makes acknowledging intellectual and practical contributions to this project an inevitability as well as a pleasure. The arguments have benefited from conversations and correspondence with many friends and colleagues, among them Evelyn