Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Just-in-time (JIT) compiler.

Artykuły w czasopismach na temat „Just-in-time (JIT) compiler”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 24 najlepszych artykułów w czasopismach naukowych na temat „Just-in-time (JIT) compiler”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Телегин, В. А. "AHEAD-OF-TIME and JUST-IN-TIME technologies". Vestnik of Russian New University. Series «Complex systems: models, analysis, management», nr 4 (29.12.2023): 171–75. http://dx.doi.org/10.18137/rnu.v9187.23.04.p.171.

Pełny tekst źródła
Streszczenie:
Статья посвящена исследованию AOT- и JIT-технологий. Обосновывается актуальность и значимость темы исследования. Существует два способа компиляции приложения: своевременная компиляция ( JIT) или компиляция с опережением времени (AOT). Первый вид – это режим по умолчанию, который используется виртуальной машиной Java Hotspot для преобразования байт-кода в машинный код во время выполнения. Второй вид поддерживается новым компилятором GraalVM и позволяет статически компилировать байт-код непосредственно в машинный код во время сборки. Рассматриваются основные различия между этими двумя стратегиями компиляции. The article focuses on the study of Ahead-of-Time and Just-in-Time technologies. The author substantiates the relevance and significance of the research topic. There are two ways to compile an application using JIT or AOT compilation. The first is the default mode and is used by the Java Hotspot virtual machine to convert bytecode to machine code at runtime. The latter is supported by the new GraalVM compiler and allows bytecode to be statically compiled directly into machine code at build time. In this article, the author discusses the main differences between these two compilation strategies.
Style APA, Harvard, Vancouver, ISO itp.
2

Știrb, Iulia, i Gilbert-Rainer Gillich. "A Low-Level Virtual Machine Just-In-Time Prototype for Running an Energy-Saving Hardware-Aware Mapping Algorithm on C/C++ Applications That Use Pthreads". Energies 16, nr 19 (23.09.2023): 6781. http://dx.doi.org/10.3390/en16196781.

Pełny tekst źródła
Streszczenie:
Low-Level Virtual Machine (LLVM) compiler infrastructure is a useful tool for building just-in-time (JIT) compilers, besides its reliable front end represented by a clang compiler and its elaborated middle end containing different optimizations that improve the runtime performance. This paper specifically addresses the part of building a JIT compiler using an LLVM with the scope of obtaining the hardware architecture details of the underlying machine such as the number of cores and the number of logical cores per processing unit and providing them to the NUMA-BTLP static thread classification algorithm and to the NUMA-BTDM static thread mapping algorithm. Afterwards, the hardware-aware algorithms are run using the JIT compiler within an optimization pass. The JIT compiler in this paper is designed to run on a parallel C/C++ application (which creates threads using Pthreads), before the first time the application is executed on a machine. To achieve this, the JIT compiler takes the native code of the application, obtains the corresponding LLVM IR (Intermediate Representation) for the native code and executes the hardware-aware thread classification and the thread mapping algorithms on the IR. The NUMA-Balanced Task and Loop Parallelism (NUMA-BTLP) and NUMA-Balanced Thread and Data Mapping (NUMA-BTDM) are expected to optimize the energy consumption by up to 15% on the NUMA systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Agosta, Giovanni, Stefano Crespi Reghizzi, Gerlando Falauto i Martino Sykora. "JIST: Just-In-Time Scheduling Translation for Parallel Processors". Scientific Programming 13, nr 3 (2005): 239–53. http://dx.doi.org/10.1155/2005/127158.

Pełny tekst źródła
Streszczenie:
The application fields of bytecode virtual machines and VLIW processors overlap in the area of embedded and mobile systems, where the two technologies offer different benefits, namely high code portability, low power consumption and reduced hardware cost. Dynamic compilation makes it possible to bridge the gap between the two technologies, but special attention must be paid to software instruction scheduling, a must for the VLIW architectures. We have implemented JIST, a Virtual Machine and JIT compiler for Java Bytecode targeted to a VLIW processor. We show the impact of various optimizations on the performance of code compiled with JIST through the experimental study on a set of benchmark programs. We report significant speedups, and increments in the number of instructions issued per cycle up to 50% with respect to the non-scheduling version of the JITcompiler. Further optimizations are discussed.
Style APA, Harvard, Vancouver, ISO itp.
4

Serrano, Manuel. "Of JavaScript AOT compilation performance". Proceedings of the ACM on Programming Languages 5, ICFP (22.08.2021): 1–30. http://dx.doi.org/10.1145/3473575.

Pełny tekst źródła
Streszczenie:
The fastest JavaScript production implementations use just-in-time (JIT) compilation and the vast majority of academic publications about implementations of dynamic languages published during the last two decades focus on JIT compilation. This does not imply that static compilers (AoT) cannot be competitive; as comparatively little effort has been spent creating fast AoT JavaScript compilers, a scientific comparison is lacking. This paper presents the design and implementation of an AoT JavaScript compiler, focusing on a performance analysis. The paper reports on two experiments, one based on standard JavaScript benchmark suites and one based on new benchmarks chosen for their diversity of styles, authors, sizes, provenance, and coverage of the language. The first experiment shows an advantage to JIT compilers, which is expected after the decades of effort that these compilers have paid to these very tests. The second shows more balanced results, as the AoT compiler generates programs that reach competitive speeds and that consume significantly less memory. The paper presents and evaluates techniques that we have either invented or adapted from other systems, to improve AoT JavaScript compilation.
Style APA, Harvard, Vancouver, ISO itp.
5

Shelke, Rahul, Aditya Kuwar i M. Ramachandran. "A Study on Just in Time Application in Flexible Manufacturing System". 1 7, nr 1 (1.03.2021): 1–5. http://dx.doi.org/10.46632/jemm/7/1/1.

Pełny tekst źródła
Streszczenie:
Just-in-time 'management philosophy not process. Originally it referred to the production of goods to meet customer demand exactly, over time, quality and quantity, whether the 'customer' was the final consumer of the product or other ongoing process in the production line. A just-in-time (JIT) innovation management system that aligns green orders from direct providers with production schedules. JIT’s innovation program is opposed to intervention strategies, in which manufacturers hold sufficient lists to have sufficient product to meet the growing market demand. It is necessary to create a JIT production plan that monitors the total capacity of your equipment and secures the appropriate dates for your production products for sale. A just-in-time (JIT) innovation management system that aligns green orders from direct providers with production schedules. Companies use this innovative strategy to increase efficiency and reduce waste by acquiring goods only as they need them through the production process, which reduces the cost of goods. This approach requires that producers accurately predict demand. just-in-time integration (JIT) (also a dynamic integration or dynamic integration) [1] is a computer-generated method that involves integration during programming - during operation - rather than pre-execution. Usually, this contains the source code or the most common bytecode translation in the machine code, and is done directly. A system that uses the JIT compiler continuously analyzes the code used and identifies parts of the code where the speed achieved in merging or resizing will exceed the integration of that code. This study aims to compare existing perceptions of the Just-in-Time (JIT) issue with the practice reported by companies in existing art courses. This study aims to contribute to the knowledge of the key features of JIT used in performance reported in powerful studies, and to identify the major benefits of using JIT mentioned by companies applying this philosophy. A just-in-time (JIT) innovation management system that aligns green orders from direct providers with production schedules. JIT’s innovative program opposes intervention strategies, in which manufacturers hold sufficient lists to have enough product to get the most demanding in the market. In manufacturing, marketing speed and production costs can make or break a company. Short-term production (JIT) is a workflow approach that aims to reduce flow times within production systems, as well as response times from suppliers and customers.
Style APA, Harvard, Vancouver, ISO itp.
6

Zang, Zhiqiang, Fu-Yao Yu, Aditya Thimmaiah, August Shi i Milos Gligoric. "Java JIT Testing with Template Extraction". Proceedings of the ACM on Software Engineering 1, FSE (12.07.2024): 1129–51. http://dx.doi.org/10.1145/3643777.

Pełny tekst źródła
Streszczenie:
We present LeJit, a template-based framework for testing Java just-in-time (JIT) compilers. Like recent template-based frameworks, LeJit executes a template---a program with holes to be filled---to generate concrete programs given as inputs to Java JIT compilers. LeJit automatically generates template programs from existing Java code by converting expressions to holes, as well as generating necessary glue code (i.e., code that generates instances of non-primitive types) to make generated templates executable. We have successfully used LeJit to test a range of popular Java JIT compilers, revealing five bugs in HotSpot, nine bugs in OpenJ9, and one bug in GraalVM. All of these bugs have been confirmed by Oracle and IBM developers, and 11 of these bugs were previously unknown, including two CVEs (Common Vulnerabilities and Exposures). Our comparison with several existing approaches shows that LeJit is complementary to them and is a powerful technique for ensuring Java JIT compiler correctness.
Style APA, Harvard, Vancouver, ISO itp.
7

D'Souza, Matt, James You, Ondřej Lhoták i Aleksandar Prokopec. "TASTyTruffle: Just-in-Time Specialization of Parametric Polymorphism". Proceedings of the ACM on Programming Languages 7, OOPSLA2 (16.10.2023): 1561–88. http://dx.doi.org/10.1145/3622853.

Pełny tekst źródła
Streszczenie:
Parametric polymorphism enables programmers to express algorithms independently of the types of values that they operate on. The approach used to implement parametric polymorphism can have important performance implications. One popular approach, erasure, uses a uniform representation for generic data, which entails primitive boxing and other indirections that harm performance. Erasure destroys type information that could be used by language implementations to optimize generic code. We present TASTyTruffle, an implementation for a subset of the Scala programming language. Instead of JVM bytecode, TASTyTruffle interprets Scala's TASTy intermediate representation, a typed representation wherein generic types are not erased. TASTy's precise type information empowers TASTyTruffle to implement generic code more effectively. In particular, it allows TASTyTruffle to reify types as run-time objects that can be passed around. Using reified types, TASTyTruffle supports heterogeneous box-free representations for generic values. TASTyTruffle also uses reified types to specialize generic code, producing monomorphic copies of generic code that can be easily and reliably optimized by its just-in-time (JIT) compiler. Empirically, TASTyTruffle is competitive with standard JVM implementations on a small set of benchmark programs; when generic code is used with multiple types, TASTyTruffle consistently outperforms the JVM. The precise type information in TASTy enables TASTyTruffle to find additional optimization opportunities that could not be uncovered with erased JVM bytecode.
Style APA, Harvard, Vancouver, ISO itp.
8

Barrière, Aurèle, Sandrine Blazy i David Pichardie. "Formally Verified Native Code Generation in an Effectful JIT: Turning the CompCert Backend into a Formally Verified JIT Compiler". Proceedings of the ACM on Programming Languages 7, POPL (9.01.2023): 249–77. http://dx.doi.org/10.1145/3571202.

Pełny tekst źródła
Streszczenie:
Modern Just-in-Time compilers (or JITs) typically interleave several mechanisms to execute a program. For faster startup times and to observe the initial behavior of an execution, interpretation can be initially used. But after a while, JITs dynamically produce native code for parts of the program they execute often. Although some time is spent compiling dynamically, this mechanism makes for much faster times for the remaining of the program execution. Such compilers are complex pieces of software with various components, and greatly rely on a precise interplay between the different languages being executed, including on-stack-replacement. Traditional static compilers like CompCert have been mechanized in proof assistants, but JITs have been scarcely formalized so far, partly due to their impure nature and their numerous components. This work presents a model JIT with dynamic generation of native code, implemented and formally verified in Coq. Although some parts of a JIT cannot be written in Coq, we propose a proof methodology to delimit, specify and reason on the impure effects of a JIT. We argue that the daunting task of formally verifying a complete JIT should draw on existing proofs of native code generation. To this end, our work successfully reuses CompCert and its correctness proofs during dynamic compilation. Finally, our prototype can be extracted and executed.
Style APA, Harvard, Vancouver, ISO itp.
9

Clemente-López, Daniel, Esteban Tlelo-Cuautle, Luis-Gerardo de la Fraga, José de Jesús Rangel-Magdaleno i Jesus Manuel Munoz-Pacheco. "Poincaré maps for detecting chaos in fractional-order systems with hidden attractors for its Kaplan-Yorke dimension optimization". AIMS Mathematics 7, nr 4 (2022): 5871–94. http://dx.doi.org/10.3934/math.2022326.

Pełny tekst źródła
Streszczenie:
<abstract><p>The optimization of fractional-order (FO) chaotic systems is challenging when simulating a considerable number of cases for long times, where the primary problem is verifying if the given parameter values will generate chaotic behavior. In this manner, we introduce a methodology for detecting chaotic behavior in FO systems through the analysis of Poincaré maps. The optimization process is performed applying differential evolution (DE) and accelerated particle swarm optimization (APSO) algorithms for maximizing the Kaplan-Yorke dimension ($ D_{KY} $) of two case studies: a 3D and a 4D FO chaotic systems with hidden attractors. These FO chaotic systems are solved applying the Grünwald-Letnikov method, and the Numba just-in-time (jit) compiler is used to improve the optimization process's time execution in Python programming language. The optimization results show that the proposed method efficiently optimizes FO chaotic systems with hidden attractors while saving execution time.</p></abstract>
Style APA, Harvard, Vancouver, ISO itp.
10

Alam, Marzia, Mehreen Saleem Gul i Tariq Muneer. "Radiation View Factor for Building Applications: Comparison of Computation Environments". Energies 12, nr 20 (10.10.2019): 3826. http://dx.doi.org/10.3390/en12203826.

Pełny tekst źródła
Streszczenie:
Computation of view factors is required in several building engineering applications where radiative exchange takes place between surfaces such as ground and vertical walls or ground and sloping thermal or photovoltaics collectors. In this paper, view factor computations are performed for bifacial solar photovoltaic (PV) collectors based on the finite element method (FEM) using two programming languages known as Microsoft Excel-Visual Basic for Applications (VBA) and Python. The aim is to determine the computer response time as well as the performance of the two languages in terms of accuracy and convergence of the numerical solution. To run the simulations in Python, an open source just-in-time (JIT) compiler called Numba was used and the same program was also run as a macro in VBA. It was observed that the simulation response time significantly decreased in Python when compared to VBA. This decrease in time was due to the increase in the total number of iterations from 400 million to 250 billion for a given case. Results demonstrated that Python was 71–180 times faster than VBA and, therefore, offers a better programming platform for the view factor analysis and modelling of bifacial solar PV where computation time is a significant modelling challenge.
Style APA, Harvard, Vancouver, ISO itp.
11

Osborne, Ianna, Jim Pivarski, Ioana Ifrim, Angus Hollands i Henry Schreiner. "Awkward Just-In-Time (JIT) Compilation: A Developer’s Experience". EPJ Web of Conferences 295 (2024): 06003. http://dx.doi.org/10.1051/epjconf/202429506003.

Pełny tekst źródła
Streszczenie:
Awkward Array is a library for performing NumPy-like computations on nested, variable-sized data, enabling array-oriented programming on arbitrary data structures in Python. However, imperative (procedural) solutions can sometimes be easier to write or faster to run. Performant imperative programming requires compilation; JIT-compilation makes it convenient to compile in an interactive Python environment. Various functions in Awkward Arrays JIT-compile a user’s code into executable machine code. They use several different techniques, but reuse parts of each others’ implementations. We discuss the techniques used to achieve the Awkward Arrays acceleration with JITcompilation, focusing on RDataFrame, cppyy, and Numba, particularly Numba on GPUs: conversions of Awkward Arrays to and from RDataFrame; standalone cppyy; passing Awkward Arrays to and from Python functions compiled by Numba; passing Awkward Arrays to Python functions compiled for GPUs by Numba; and header-only libraries for populating Awkward Arrays from C++ without any Python dependencies
Style APA, Harvard, Vancouver, ISO itp.
12

LEE, BU-SUNG, YAN GU, WENTONG CAI i ALFRED HENG. "PERFORMANCE EVALUATION OF JPVM". Parallel Processing Letters 09, nr 03 (wrzesień 1999): 401–10. http://dx.doi.org/10.1142/s0129626499000372.

Pełny tekst źródła
Streszczenie:
PVM for Java (JPVM) is a parallel programming environment that provides a set of Parallel Virtual Machine (PVM)-like class libraries developed using Java. JPVM inherits the attributes of Java, especially Java support of heterogeneous system. However, it also has the disadvantage of poor performance when compared to native codes. Java performance has been considerably improved with the recent introduction of Just in Time (JIT) compilers. This paper evaluates JPVM, with and without JIT compilation, using some well-known parallel processing benchmarks. It will also highlight some of the areas that limit the use of Java in parallel processing on distributed systems. The objective of the paper is to provide some performance indications of using Java in network-based parallel computing environments.
Style APA, Harvard, Vancouver, ISO itp.
13

Ling, Jerry, i Tamás Gál. "High-performance end-user analysis in pure Julia programming language". EPJ Web of Conferences 295 (2024): 06012. http://dx.doi.org/10.1051/epjconf/202429506012.

Pełny tekst źródła
Streszczenie:
We present tools for high-performance analysis written in pure Julia, a just-in-time (JIT) compiled dynamic programming language with a high-level syntax and performance. The packages we present center around UnROOT.jl, a pure Julia ROOT file I/O package that is optimized for speed, lazy reading, flexibility and thread safety. We discuss what affects performance in Julia, the challenges, and their solutions during the development of UnROOT.jl. We highlight type stability as a challenge and discuss its implication whenever any “compilation” happens (incl. Numba, Jax, C++) as well as Julia’s specific ones. We demonstrate the performance and “easy to use” claim by comparing UnROOT.jl against popular alternatives (RDataFrame, Uproot, etc.) in medium-size realistic benchmarks, comparing both performance and code complexity. Finally, we also showcase real ATLAS analysis workflows both locally and on an HPC system, highlighting the composability of UnROOT.jl with multithread/process and out-of-core distributed computing libraries.
Style APA, Harvard, Vancouver, ISO itp.
14

Anand, Aditya, Solai Adithya, Swapnil Rustagi, Priyam Seth, Vijay Sundaresan, Daryl Maier, V. Krishna Nandivada i Manas Thakur. "Optimistic Stack Allocation and Dynamic Heapification for Managed Runtimes". Proceedings of the ACM on Programming Languages 8, PLDI (20.06.2024): 296–319. http://dx.doi.org/10.1145/3656389.

Pełny tekst źródła
Streszczenie:
The runtimes of managed object-oriented languages such as Java allocate objects on the heap, and rely on automatic garbage collection (GC) techniques for freeing up unused objects. Most such runtimes also consist of just-in-time (JIT) compilers that optimize memory access and GC times by employing escape analysis: an object that does not escape (outlive) its allocating method can be allocated on (and freed up with) the stack frame of the corresponding method. However, in order to minimize the time spent in JIT compilation, the scope of such useful analyses is quite limited, thereby restricting their precision significantly. On the contrary, even though it is feasible to perform precise program analyses statically, it is not possible to use their results in a managed runtime without a closed-world assumption. In this paper, we propose a static+dynamic scheme that allows one to harness the results of a precise static escape analysis for allocating objects on stack, while taking care of both soundness and efficiency concerns in the runtime. Our scheme comprises of three key ideas. First, using the results of a statically performed escape analysis, it performs optimistic stack allocation during JIT compilation. Second, it handles the challenges associated with features that may invalidate the optimism, using a novel idea of dynamic heapification. Third, it uses another novel notion of stack ordering, again supported by a static analysis, to reduce the overheads associated with the checks that determine the need for heapification. The static and the runtime components of our approach are implemented in the Soot optimization framework and in the tiered infrastructure of the Eclipse OpenJ9 VM, respectively. To evaluate the benefits, we compare our scheme with the existing escape analysis and find that it succeeds in allocating a much larger number of objects on the stack. Furthermore, the enhanced stack allocation leads to a significant reduction in the number of GC cycles and brings decent performance improvements, especially suited for constrained-memory environments.
Style APA, Harvard, Vancouver, ISO itp.
15

Zhang, Qiang, Lei Xu i Baowen Xu. "Python meets JIT compilers: A simple implementation and a comparative evaluation". Software: Practice and Experience, 5.09.2023. http://dx.doi.org/10.1002/spe.3267.

Pełny tekst źródła
Streszczenie:
AbstractDeveloping a just‐in‐time (JIT) compiler can be a daunting task, especially for a language as flexible as Python. While PyPy, powered with JIT compilation, can often outperform the official pure interpreter, CPython, by a noteworthy margin, its popularity remains far from comparable to that of CPython due to some issues. Given that an easier‐to‐deploy and better‐compatible JIT compiler would benefit more Python users, we have developed comPyler, a simple JIT compiler functioning as a CPython extension and intended to convert frequently interpreted CPython bytecode into equivalent machine code. Designed with good compatibility in mind, it does not alter CPython's internal data structures or external interfaces. Based on LLVM's mature infrastructure, it can be readily ported to almost all platforms. Compared with CPython, it achieved the highest speedup of 2.205, with an average of 1.093. Despite its relatively limited effect, comPyler incurs low development costs. As a baseline compiler, it also sheds light on the improvement attainable by optimizing solely the overhead of bytecode interpretation. Furthermore, as there is still a dearth of empirical research covering the multitude of JIT compilers available for Python, we have conducted a performance study that examines Jython, IronPython, PyPy, GraalPy, Pyston, Pyjion, and our comPyler. Our research takes into account not only the benchmark speed for various time windows but also the boot latency and memory footprint. Through this comprehensive study, our objective is to assist developers in gaining a better understanding of the effects of distinct JIT compilation techniques and to aid users in making informed decisions when choosing among different Python implementations.
Style APA, Harvard, Vancouver, ISO itp.
16

Welsh, Ciaran, Jin Xu, Lucian Smith, Matthias König, Kiri Choi i Herbert M. Sauro. "libRoadRunner 2.0: A High Performance SBML Simulation and Analysis Library". Bioinformatics, 8.12.2022. http://dx.doi.org/10.1093/bioinformatics/btac770.

Pełny tekst źródła
Streszczenie:
Abstract Motivation This paper presents libRoadRunner 2.0, an extensible, high-performance, cross-platform, open-source software library for the simulation and analysis of models expressed using the Systems Biology Markup Language (SBML). Results libRoadRunner is a self-contained library, able to run either as a component inside other tools via its C ++, C and Python APIs, or interactively through its Python or Julia interface. libRoadRunner uses a custom Just-In-Time (JIT) compiler built on the widely-used LLVM JIT compiler framework. It compiles SBML-specified models directly into native machine code for a large variety of processors, making it fast enough to simulate extremely large models or repeated runs in reasonable timeframes. libRoadRunner is flexible, supporting the bulk of the SBML specification (except for delay and nonlinear algebraic equations) as well as several SBML extensions such as hierarchical composition and probability distributions. It offers multiple deterministic and stochastic integrators, as well as tools for steady-state, sensitivity, stability and structural analyses. Availability libRoadRunner binary distributions for Windows, Mac OS, and Linux, Julia and Python bindings, source code, and documentation are all available at https://github.com/sys-bio/roadrunner, and Python bindings are also available via pip. The source code can be compiled for the supported systems as well as in principle any system supported by LLVM-13, such as ARM-based computers like the Raspberry Pi. The library is licensed under the Apache License Version 2.0.
Style APA, Harvard, Vancouver, ISO itp.
17

Basso, Matteo, Aleksandar Prokopec, Andrea Rosà i Walter Binder. "Optimization-Aware Compiler-Level Event Profiling". ACM Transactions on Programming Languages and Systems, 10.04.2023. http://dx.doi.org/10.1145/3591473.

Pełny tekst źródła
Streszczenie:
Tracking specific events in a program’s execution, such as object allocation or lock acquisition, is at the heart of dynamic analysis. Despite the apparent simplicity of this task, quantifying these events is challenging due to the presence of compiler optimizations. Profiling perturbs the optimizations that the compiler would normally do—a profiled program usually behaves differently than the original one. In this article, we propose a novel technique for quantifying compiler-internal events in the optimized code, reducing the profiling perturbation on compiler optimizations. Our technique achieves this by instrumenting the program from within the compiler, and by delaying the instrumentation until the point in the compilation pipeline after which no subsequent optimizations can remove the events. We propose two different implementation strategies of our technique based on path-profiling, and a modification to the standard path-profiling algorithm that facilitates the use of the proposed strategies in a modern just-in-time (JIT) compiler. We use our technique to analyze the behaviour of the optimizations in Graal, a state-of-the-art compiler for the Java Virtual Machine, identifying the reasons behind a performance improvement of a specific optimization, and the causes behind an unexpected slowdown of another. Finally, our evaluation results show that the two proposed implementations result in a significantly lower execution-time overhead w.r.t. a naive implementation.
Style APA, Harvard, Vancouver, ISO itp.
18

Vukasovic, Maja, i Aleksandar Prokopec. "Exploiting Partially Context-Sensitive Profiles to Improve Performance of Hot Code". ACM Transactions on Programming Languages and Systems, 13.09.2023. http://dx.doi.org/10.1145/3612937.

Pełny tekst źródła
Streszczenie:
Availability of profiling information is a major advantage of just-in-time (JIT) compilation. Profiles guide the compilation order and optimizations, thus substantially improving program performance. Ahead-of-time (AOT) compilation can also utilize profiles, obtained during separate profiling runs of the programs. Profiles can be context-sensitive, i.e., each profile entry is associated with a call-stack. To ease profile collection and reduce overheads, many systems collect partially context-sensitive profiles, which record only a call-stack suffix. Despite prior related work, partially context-sensitive profiles have the potential to further improve compiler optimizations. In this paper, we describe a novel technique that exploits partially context-sensitive profiles to determine which portions of code are hot, and compile them with additional compilation budget. This technique is applicable to most AOT compilers that can access partially context-sensitive profiles, and its goal is to improve program performance without significantly increasing code size. The technique relies on a new hot-code-detection algorithm to reconstruct hot regions based on the partial profiles. The compilation ordering and the inlining of the compiler are modified to exploit the information about the hot code. We formally describe the proposed algorithm and its heuristics, and then describe our implementation inside GraalVM Native Image, a state-of-the-art AOT compiler for Java. Evaluation of the proposed technique on 16 benchmarks from DaCapo, Scalabench and Renaissance suites shows a performance improvement between \(22\% \) and \(40\% \) on 4 benchmarks, and between \(2.5\% \) and \(10\% \) on 5 benchmarks. Code-size increase ranges from \(0.8-9\% \) , where 10 benchmarks exhibit an increase of less than \(2.5\% \) .
Style APA, Harvard, Vancouver, ISO itp.
19

Hartley, Tim. "Just In Time Compilation on ARM – A Closer Look at Call Site Code Consistency". ACM Transactions on Architecture and Code Optimization, 6.07.2022. http://dx.doi.org/10.1145/3546568.

Pełny tekst źródła
Streszczenie:
The increase in computational capability of low-power Arm architectures has seen them diversify from their more traditional domain of portable battery powered devices into data center servers, personal computers, and even Supercomputers. Thus, managed languages (Java, Javascript, etc.) that require a managed runtime environment (MRE) need to be ported to the Arm architecture, requiring an understanding of different design trade-offs. This paper studies how the lack of strong hardware support for Self Modifying Code (SMC) in low-power architectures (e.g. absence of cache coherence between instruction cache and data caches), affects Just-In-Time (JIT) compilation and runtime behavior in MREs. Specifically, we focus on the implementation and treatment of call-sites, that must maintain code consistency in the face of concurrent execution and modification to redirect control (patching) by the MRE. The lack of coherence, is compounded with the maximum distance (reach of) a call-site can jump to as the reach is more constrained (smaller distance) in Arm when compared with Intel/AMD. We present four different robust implementations for call-sites and discuss their advantages and disadvantages in the absence of strong hardware support for SMC. Finally, we evaluate each approach using a microbenchmark, further evaluating the best three techniques using three JVM benchmark suites and the open source MaxineVM showcasing performance differences up to 12%. Based on these observations, we propose extending code-cache partitioning strategies for JIT compiled code to encourage more efficient local branching for architectures with limited direct branch ranges.
Style APA, Harvard, Vancouver, ISO itp.
20

Wang, Chaoming, Tianqiu Zhang, Xiaoyu Chen, Sichao He, Shangyang Li i Si Wu. "BrainPy, a flexible, integrative, efficient, and extensible framework for general-purpose brain dynamics programming". eLife 12 (22.12.2023). http://dx.doi.org/10.7554/elife.86365.

Pełny tekst źródła
Streszczenie:
Elucidating the intricate neural mechanisms underlying brain functions requires integrative brain dynamics modeling. To facilitate this process, it is crucial to develop a general-purpose programming framework that allows users to freely define neural models across multiple scales, efficiently simulate, train, and analyze model dynamics, and conveniently incorporate new modeling approaches. In response to this need, we present BrainPy. BrainPy leverages the advanced just-in-time (JIT) compilation capabilities of JAX and XLA to provide a powerful infrastructure tailored for brain dynamics programming. It offers an integrated platform for building, simulating, training, and analyzing brain dynamics models. Models defined in BrainPy can be JIT compiled into binary instructions for various devices, including Central Processing Unit (CPU), Graphics Processing Unit (GPU), and Tensor Processing Unit (TPU), which ensures high running performance comparable to native C or CUDA. Additionally, BrainPy features an extensible architecture that allows for easy expansion of new infrastructure, utilities, and machine-learning approaches. This flexibility enables researchers to incorporate cutting-edge techniques and adapt the framework to their specific needs
Style APA, Harvard, Vancouver, ISO itp.
21

Silberberg, Mauro, Henning Hermjakob, Rahuman S. Malik-Sheriff i Hernán E. Grecco. "Poincaré and SimBio: a versatile and extensible Python ecosystem for modeling systems". Bioinformatics, 30.07.2024. http://dx.doi.org/10.1093/bioinformatics/btae465.

Pełny tekst źródła
Streszczenie:
Abstract Motivation Chemical reaction networks (CRNs) play a pivotal role in diverse fields such as systems biology, biochemistry, chemical engineering, and epidemiology. High-level definitions of CRNs enables to use various simulation approaches, including deterministic and stochastic methods, from the same model. However, existing Python tools for simulation of CRN typically wrap external C/C ++ libraries for model definition, translation into equations and/or numerically solving them, limiting their extensibility and integration with the broader Python ecosystem. Results In response, we developed Poincaré and SimBio, two novel Python packages for simulation of dynamical systems and CRNs. Poincaré serves as a foundation for dynamical systems modelling, while SimBio extends this functionality to CRNs, including support for the Systems Biology Markup Language (SBML). Poincaré and SimBio are developed as pure Python packages enabling users to easily extend their simulation capabilities by writing new or leveraging other Python packages. Moreover, this does not compromise the performance, as code can be just-in-time (JIT) compiled with Numba. Our benchmark tests using curated models from the BioModels repository demonstrate that these tools may provide a potentially superior performance advantage compared to other existing tools. Additionally, to ensure a user-friendly experience, our packages use standard typed modern Python syntax that provides a seamless integration with integrated development environments (IDEs). Our Python-centric approach significantly enhances code analysis, error detection, and refactoring capabilities, positioning Poincaré and SimBio as valuable tools for the modelling community. Availability Poincaré and SimBio are released under the MIT license. their source code is available on GitHub (https://github.com/maurosilber/poincare and https://github.com/hgrecco/simbio). and can be installed from PyPI or conda-forge.
Style APA, Harvard, Vancouver, ISO itp.
22

Hope, Cathy, i Bethaney Turner. "The Right Stuff? The Original Double Jay as Site for Youth Counterculture". M/C Journal 17, nr 6 (18.09.2014). http://dx.doi.org/10.5204/mcj.898.

Pełny tekst źródła
Streszczenie:
On 19 January 1975, Australia’s first youth station 2JJ (Double Jay) launched itself onto the nation’s airwaves with a NASA-style countdown and You Only Like Me ‘Cause I’m Good in Bed by Australian band Skyhooks. Refused airtime by the commercial stations because of its explicit sexual content, this song was a clear signifier of the new station’s intent—to occupy a more radical territory on Australian radio. Indeed, Double Jay’s musical entrée into the highly restrictive local broadcasting environment of the time has gone on to symbolise both the station’s role in its early days as an enfant terrible of radio (Inglis 376), and its near 40 years as a voice for youth culture in Australia (Milesago, Double Jay). In this paper we explore the proposition that Double Jay functioned as an outlet for youth counterculture in Australia, and that it achieved this even with (and arguably because of) its credentials as a state-generated entity. This proposition is considered via brief analysis of the political and musical context leading to the establishment of Double Jay. We intend to demonstrate that although the station was deeply embedded in “the system” in material and cultural terms, it simultaneously existed in an “uneasy symbiosis” (Martin and Siehl 54) with this system because it consciously railed against the mainstream cultures from which it drew, providing a public and active vehicle for youth counterculture in Australia. The origins of Double Jay thus provide one example of the complicated relationship between culture and counterculture, and the multiple ways in which the two are inextricably linked. As a publicly-funded broadcasting station Double Jay was liberated from the industrial imperatives of Australia’s commercial stations which arguably drove their predisposition for formula. The absence of profit motive gave Double Jay’s organisers greater room to experiment with format and content, and thus the potential to create a genuine alternative in Australia broadcasting. As a youth station Double Jay was created to provide a minority with its own outlet. The Labor government committed to wrenching airspace from the very restrictive Australian broadcasting “system” (Wiltshire and Stokes 2) to provide minority voices with room to speak and to be heard. Youth was identified by the government as one such minority. The Australian Broadcasting Commission (ABC) contributed to this process by enabling young staffers to establish the semi-independent Contemporary Radio Unit (CRU) (Webb) and within this a youth station. Not only did this provide a focal point around which a youth collective could coalesce, but the distinct place and identity of Double Jay within the ABC offered its organisers the opportunity to ignore or indeed subvert some of the perceived strictures of the “mothership” that was the ABC, whether in organisational, content and/or stylistic terms. For these and other reasons Double Jay was arguably well positioned to counter the broadcasting cultures that existed alongside this station. It did so stylistically, and also in more fundamental ways, At the same time, however, it “pillaged the host body at random” (Webb) co-opting certain aspects of these cultures (people, scheduling, content, administration) which in turn implicated Double Jay in the material and cultural practices of those mainstream cultures against which it railed. Counterculture on the Airwaves: Space for Youth to Play? Before exploring these themes further, we should make clear that Double Jay’s legitimacy as a “counterculture” organisation is observably tenuous against the more extreme renderings of the concept. Theodore Roszak, for example, requires of counterculture something “so radically disaffiliated from the mainstream assumptions of our society that it scarcely looks to many as a culture at all” (5). Double Jay was a brainchild of the state: an outcome of the Whitlam Government’s efforts to open up the nation’s airwaves (Davis, Government; McClelland). Further, the supervision of this station was given to the publicly funded Australian national broadcaster, the ABC (Inglis). Any claim Double Jay has to counterculture status then is arguably located in less radical invocations of the term. Some definitions, for example, hold that counterculture contains value systems that run counter to culture, but these values are relational rather than divorced from each other. Kenneth Leech, for example, states that counterculture is "a way of life and philosophy which at central points is in conflict with the mainstream society” (Desmond et al. 245, our emphasis); E.D. Batzell defines counterculture as "a minority culture marked by a set of values, norms and behaviour patterns which contradict those of the dominant society" (116, our emphasis). Both definitions imply that counterculture requires the mainstream to make sense of what it is doing and why. In simple terms then, counterculture as the ‘other’ does not exist without its mainstream counterpoint. The particular values with which counterculture is in conflict are generated by “the system” (Heath and Potter 6)—a system that imbues “manufactured needs and mass-produced desires” (Frank 15) in the masses to encourage order, conformity and consumption. Counterculture seeks to challenge this “system” via individualist, expression-oriented values such as difference, diversity, change, egalitarianism, and spontaneity (Davis On Youth; Leary; Thompson and Coskuner‐Balli). It is these kinds of counterculture values that we demonstrate were embedded in the content, style and management practices within Double Jay. The Whitlam Years and the Birth of Double Jay Double Jay was borne of the Whitlam government’s brief but impactful period in office from 1972 to 1975, after 23 years of conservative government in Australia. Key to the Labor Party’s election platform was the principle of participatory democracy, the purpose of which was “breaking down apathy and maximising active citizen engagement” (Cunningham 123). Within this framework, the Labor Party committed to opening the airwaves, and reconfiguring the rhetoric of communication and media as a space of and for the people (Department of the Media 3). Labor planned to honour this commitment via sweeping reforms that would counter the heavily concentrated Australian media landscape through “the encouragement of diversification of ownership of commercial radio and television”—and in doing so enable “the expression of a plurality of viewpoints and cultures throughout the media” (Department of the Media 3). Minority groups in particular were to be privileged, while some in the Party even argued for voices that would actively agitate. Senator Jim McClelland, for one, declared, “We say that somewhere in the system there must be broadcasting which not only must not be afraid to be controversial but has a duty to be controversial” (Senate Standing Committee 4). One clear voice of controversy to emerge in the 1960s and resonate throughout the 1970s was the voice of youth (Gerster and Bassett; Langley). Indeed, counterculture is considered by some as synonymous with a particular strain of youth culture during this time (Roszak; Leech). The Labor Government acknowledged this hitherto unrecognised voice in its 1972 platform, with Minister for the Media Senator Doug McClelland claiming that his party would encourage the “whetting of the appetite” for “life and experimentation” of Australia’s youth – in particular through support for the arts (160). McClelland secured licenses for two “experimental-type” stations under the auspices of the ABC, with the youth station destined for Sydney via the ABC’s standby transmitter in Gore Hill (ABCB, 2). Just as the political context in early 1970s Australia provided the necessary conditions for the appearance of Double Jay, so too did the cultural context. Counterculture emerged in the UK, USA and Europe as a clear and potent force in the late 1960s (Roszak; Leech; Frank; Braunstein and Doyle). In Australia this manifested in the 1960s and 1970s in various ways, including political protest (Langley; Horne); battles for the liberalisation of censorship (Hope and Dickerson, Liberalisation; Chipp and Larkin); sex and drugs (Dawson); and the art film scene (Hope and Dickerson, Happiness; Thoms). Of particular interest here is the “lifestyle” aspect of counterculture, within which the value-expressions against the dominant culture manifest in cultural products and practices (Bloodworth 304; Leary ix), and more specifically, music. Many authors have suggested that music was pivotal to counterculture (Bloodworth 309; Leech 8), a key “social force” through which the values of counterculture were articulated (Whiteley 1). The youth music broadcasting scene in Australia was extremely narrow prior to Double Jay, monopolised by a handful of media proprietors who maintained a stranglehold over the youth music scene from the mid-50s. This dominance was in part fuelled by the rising profitability of pop music, driven by “the dreamy teenage market”, whose spending was purely discretionary (Doherty 52) and whose underdeveloped tastes made them “immune to any sophisticated disdain of run-of-the-mill” cultural products (Doherty 230-231). Over the course of the 1950s the commercial stations pursued this market by “skewing” their programs toward the youth demographic (Griffen-Foley 264). The growing popularity of pop music saw radio shift from a “multidimensional” to “mono-dimensional” medium according to rock journalist Bruce Elder, in which the “lowest-common-denominator formula of pop song-chat-commercial-pop-song” dominated the commercial music stations (12). Emblematic of this mono-dimensionalism was the appearance of the Top 40 Playlist in 1958 (Griffin-Foley 265), which might see as few as 10–15 songs in rotation in peak shifts. Elder claims that this trend became more pronounced over the course of the 1960s and peaked in 1970, with playlists that were controlled with almost mechanical precision [and] compiled according to American-devised market research methods which tended to reinforce repetition and familiarity at the expense of novelty and diversity. (12) Colin Vercoe, whose job was to sell the music catalogues of Festival Records to stations like 2UE, 2SER and SUW, says it was “an incredibly frustrating affair” to market new releases because of the rigid attachment by commercials to the “Top 40 of endless repeats” (Vercoe). While some air time was given to youth music beyond the Top 40, this happened mostly in non-peak shifts and on weekends. Bill Drake at 2SM (who was poached by Double Jay and allowed to reclaim his real name, Holger Brockmann) played non-Top 40 music in his Sunday afternoon programme The Album Show (Brockmann). A more notable exception was Chris Winter’s Room to Move on the ABC, considered by many as the predecessor of Double Jay. Introduced in 1971, Room to Move played all forms of contemporary music not represented by the commercial broadcasters, including whole albums and B sides. Rock music’s isolation to the fringes was exacerbated by the lack of musical sales outlets for rock and other forms of non-pop music, with much music sourced through catalogues, music magazines and word of mouth (Winter; Walker). In this context a small number of independent record stores, like Anthem Records in Sydney and Archie and Jugheads in Melbourne, appear in the early 1970s. Vercoe claims that the commercial record companies relentlessly pursued the closure of these independents on the grounds they were illegal entities: The record companies hated them and they did everything they could do close them down. When (the companies) bought the catalogue to overseas music, they bought the rights. And they thought these record stores were impinging on their rights. It was clear that a niche market existed for rock and alternative forms of music. Keith Glass and David Pepperell from Archie and Jugheads realised this when stock sold out in the first week of trade. Pepperell notes, “We had some feeling we were doing something new relating to people our own age but little idea of the forces we were about to unleash”. Challenging the “System” from the Inside At the same time as interested individuals clamoured to buy from independent record stores, the nation’s first youth radio station was being instituted within the ABC. In October 1974, three young staffers—Marius Webb, Ron Moss and Chris Winter— with the requisite youth credentials were briefed by ABC executives to build a youth-style station for launch in January 1975. According to Winter “All they said was 'We want you to set up a station for young people' and that was it!”, leaving the three with a conceptual carte blanche–although assumedly within the working parameters of the ABC (Webb). A Contemporary Radio Unit (CRU) was formed in order to meet the requirements of the ABC while also creating a clear distinction between the youth station and the ABC. According to Webb “the CRU gave us a lot of latitude […] we didn’t have to go to other ABC Departments to do things”. The CRU was conscious from the outset of positioning itself against the mainstream practices of both the commercial stations and the ABC. The publicly funded status of Double Jay freed it from the shackles of profit motive that enslaved the commercial stations, in turn liberating its turntables from baser capitalist imperatives. The two coordinators Ron Moss and Marius Webb also bypassed the conventions of typecasting the announcer line-up (as was practice in both commercial and ABC radio), seeking instead people with charisma, individual style and youth appeal. Webb told the Sydney Morning Herald that Double Jay’s announcers were “not required to have a frontal lobotomy before they go on air.” In line with the individual- and expression-oriented character of the counterculture lifestyle, it was made clear that “real people” with “individuality and personality” would fill the airwaves of Double Jay (Nicklin 9). The only formula to which the station held was to avoid (almost) all formula – a mantra enhanced by the purchase in the station’s early days of thousands of albums and singles from 10 or so years of back catalogues (Robinson). This library provided presenters with the capacity to circumvent any need for repetition. According to Winter the DJs “just played whatever we wanted”, from B sides to whole albums of music, most of which had never made it onto Australian radio. The station also adapted the ABC tradition of recording live classical music, but instead recorded open-air rock concerts and pub gigs. A recording van built from second-hand ABC equipment captured the grit of Sydney’s live music scene for Double Jay, and in so doing undercut the polished sounds of its commercial counterparts (Walker). Double Jay’s counterculture tendencies further extended to its management style. The station’s more political agitators, led by Webb, sought to subvert the traditional top-down organisational model in favour of a more egalitarian one, including a battle with the ABC to remove the bureaucratic distinction between technical staff and presenters and replace this with the single category “producer/presenter” (Cheney, Webb, Davis 41). The coordinators also actively subverted their own positions as coordinators by holding leaderless meetings open to all Double Jay employees – meetings that were infamously long and fraught, but also remembered as symbolic of the station’s vibe at that time (Frolows, Matchett). While Double Jay assumed the ABC’s focus on music, news and comedy, at times it politicised the content contra to the ABC’s non-partisan policy, ignored ABC policy and practice, and more frequently pushed its contents over the edges of what was considered propriety and taste. These trends were already present in pockets of the ABC prior to Double Jay: in current affairs programmes like This Day Tonight and Four Corners (Harding 49); and in overtly leftist figures like Alan Ashbolt (Bowman), who it should be noted had a profound influence over Webb and other Double Jay staff (Webb). However, such an approach to radio still remained on the edges of the ABC. As one example of Double Jay’s singularity, Webb made clear that the ABC’s “gentleman’s agreement” with the Federation of Australian Commercial Broadcasters to ban certain content from airplay would not apply to Double Jay because the station would not “impose any censorship on our people” – a fact demonstrated by the station’s launch song (Nicklin 9). The station’s “people” in turn made the most of this freedom with the production of programmes like Gayle Austin’s Horny Radio Porn Show, the Naked Vicar Show, the adventures of Colonel Chuck Chunder of the Space Patrol, and the Sunday afternoon comic improvisations of Nude Radio from the team that made Aunty Jack. This openness also made its way into the news team, most famously in its second month on air with the production of The Ins and Outs of Love, a candid documentary of the sexual proclivities and encounters of Sydney’s youth. Conservative ABC staffer Clement Semmler described the programme as containing such “disgustingly explicit accounts of the sexual behaviour of young teenagers” that it “aroused almost universal obloquy from listeners and the press” (35). The playlist, announcers, comedy sketches, news reporting and management style of Double Jay represented direct challenges to the entrenched media culture of Australia in the mid 1970s. The Australian National Commission for UNESCO noted at the time that Double Jay was “variously described as political, subversive, offensive, pornographic, radical, revolutionary and obscene” (7). While these terms were understandable given the station’s commitment to experiment and innovation, the “vital point” about Double Jay was that it “transmitted an electronic reflection of change”: What the station did was to zero in on the kind of questioning of traditional values now inherent in a significant section of the under 30s population. It played their music, talked in their jargon, pandered to their whims, tastes, prejudices and societal conflicts both intrinsic and extrinsic. (48) Conclusion From the outset, Double Jay was locked in an “uneasy symbiosis” with mainstream culture. On the one hand, the station was established by federal government and its infrastructure was provided by state funds. It also drew on elements of mainstream broadcasting in multiple ways. However, at the same time, it was a voice for and active agent of counterculture, representing through its content, form and style those values that were considered to challenge the ‘system,’ in turn creating an outlet for the expression of hitherto un-broadcast “ways of thinking and being” (Leary). As Henry Rosenbloom, press secretary to then Labor Minister Dr Moss Cass wrote, Double Jay had the potential to free its audience “from an automatic acceptance of the artificial rhythms of urban and suburban life. In a very real sense, JJ [was] a deconditioning agent” (Inglis 375-6). While Double Jay drew deeply from mainstream culture, its skilful and playful manipulation of this culture enabled it to both reflect and incite youth-based counterculture in Australia in the 1970s. References Australian Broadcasting Control Board. Development of National Broadcasting and Television Services. ABCB: Sydney, 1976. Batzell, E.D. “Counter-Culture.” Blackwell Dictionary of Twentieth-Century Social Thought. Eds. Williams Outhwaite and Tom Bottomore. Oxford: Blackwell, 1994. 116-119. Bloodworth, John David. “Communication in the Youth Counterculture: Music as Expression.” Central States Speech Journal 26.4 (1975): 304-309. Bowman, David. “Radical Giant of Australian Broadcasting: Allan Ashbolt, Lion of the ABC, 1921-2005.” Sydney Morning Herald 15 June 2005. 15 Sep. 2013 ‹http://www.smh.com.au/news/Obituaries/Radical-giant-of-Australian-broadcasting/2005/06/14/1118645805607.html›. Braunstein, Peter, and Michael William Doyle. Eds. Imagine Nation: The American Counterculture of the 1960s and '70s New York: Taylor and Francis, 2002. Brockman, Holger. Personal interview. 8 December 2013. Cheney, Roz. Personal interview. 10 July 2013. Chipp, Don, and John Larkin. Don Chipp: The Third Man. Adelaide: Rigby, 2008. Cunningham, Frank. Theories of Democracy: A Critical Introduction. London: Routledge, 2002. Davis, Fred. On Youth Subcultures: The Hippie Variant. New York: General Learning Press, 1971. Davis, Glyn. "Government Decision‐Making and the ABC: The 2JJ Case." Politics 19.2 (1984): 34-42. Dawson, Jonathan. "JJJ: Radical Radio?." Continuum: Journal of Media & Cultural Studies 6.1 (1992): 37-44. Department of the Media. Submission by the Department of the Media to the Independent Inquiry into Frequency Modulation Broadcasting. Sydney: Australian Government Publishers, 1974. Desmond, John, Pierre McDonagh, and Stephanie O'Donohoe. “Counter-Culture and Consumer Society.” Consumption Markets & Culture 4.3 (2000): 241-279. Doherty, Thomas. Teenagers and Teenpics: The Juvenilization of American Movies in the 1950s. Boston: Unwin Hyman, 1988. Elder, Bruce. Sound Experiment. Unpublished manuscript, 1988. Australian National Commission for UNESCO. Extract from Seminar on Entertainment and Society, Report on Research Project. 1976. Frolows, Arnold. Personal interview. 10 July 2013. Frank, Thomas. The Conquest of Cool: Business Culture, Counterculture, and the Rise of Hip Consumerism. Chicago: University of Chicago Press, 1997. Gerster, Robin, and Jan Bassett. Seizures of Youth: The Sixties and Australia. Melbourne: Hyland House, 1991. Griffen-Foley, Bridget. Changing Stations: The Story of Australian Commercial Radio, Sydney: UNSW Press, 2009. Harding, Richard. Outside Interference: The Politics of Australian Broadcasting. Melbourne: Sun Books, 1979. Heath, Joseph, and Andrew Potter. Nation of Rebels: Why Counterculture Became Consumer Culture. New York: Harper Collins, 2004. Hope, Cathy, and Adam Dickerson. “The Sydney and Melbourne Film Festivals, and the Liberalisation of Film Censorship in Australia”. Screening the Past 35 (2012). 12 Aug. 2014 ‹http://www.screeningthepast.com/2012/12/the-sydney-and-melbourne-film-festivals-and-the-liberalisation-of-film-censorship-in-australia/›. Hope, Cathy, and Adam Dickerson. “Is Happiness Festival-Shaped Any Longer? The Melbourne and Sydney Film Festivals and the Growth of Australian Film Culture 1973-1977”. Screening the Past 38 (2013). 12 Aug. 2014 ‹http://www.screeningthepast.com/2013/12/‘is-happiness-festival-shaped-any-longer’-the-melbourne-and-sydney-film-festivals-and-the-growth-of-australian-film-culture-1973-1977/›. Horne, Donald. Time of Hope: Australia 1966-72. Sydney: Angus and Robertson, 1980. Inglis, Ken. This Is the ABC: The Australian Broadcasting Commission, 1932-1983. Melbourne: Melbourne University Press, 1983. Langley, Greg. A Decade of Dissent: Vietnam and the Conflict on the Australian Homefront. Sydney: Allen and Unwin, 1992. Leary, Timothy. “Foreword.” Counterculture through the Ages: From Abraham to Acid House. Eds. Ken Goffman and Dan Joy. New York: Villard, 2007. ix-xiv. Leech, Kenneth. Youthquake: The Growth of a Counter-Culture through Two Decades. London: Sheldon Press, 1973. Martin, J., and C. Siehl. "Organizational Culture and Counterculture: An Uneasy Symbiosis. Organizational Dynamics, 12.2 (1983): 52-64. Martin, Peter. Personal interview. 10 July 2014. Matchett, Stuart. Personal interview. 10 July 2013. McClelland, Douglas. “The Arts and Media.” Towards a New Australia under a Labor Government. Ed. John McLaren. Victoria: Cheshire Publishing, 1972. McClelland, Douglas. Personal interview. 25 August 2010. Milesago. “Double Jay: The First Year”. n.d. 8 Oct. 2012 ‹http://www.milesago.com/radio/2jj.htm›. Milesago. “Part 5: 1971-72 - Sundown and 'Archie & Jughead's”. n.d. Keith Glass – A Life in Music. 12 Oct. 2012 ‹http://www.milesago.com/Features/keithglass5.htm›. Nicklin, Lenore. “Rock (without the Roll) around the Clock.” Sydney Morning Herald 18 Jan. 1975: 9. Robinson, Ted. Personal interview. 11 December 2013. Roszak, Theodore. The Making of a Counter Culture. New York: Anchor, 1969. Semmler, Clement. The ABC - Aunt Sally and Sacred Cow. Carlton: Melbourne University Press, 1981. Senate Standing Committee on Education, Science and the Arts and Jim McClelland. Second Progress Report on the Reference, All Aspects of Television and Broadcasting, Including Australian Content of Television Programmes. Canberra: Australian Senate, 1973. Thompson, Craig J., and Gokcen Coskuner‐Balli. "Countervailing Market Responses to Corporate Co‐optation and the Ideological Recruitment of Consumption Communities." Journal of Consumer Research 34.2 (2007): 135-152. Thoms, Albie. “The Australian Avant-garde.” An Australian Film Reader. Eds. Albert Moran and Tom O’Regan. Sydney: Currency Press, 1985. 279–280. Vercoe, Colin. Personal interview. 11 Feb. 2014. Walker, Keith. Personal interview. 11 July 2013. Webb, Marius. Personal interview. 5 Feb. 2013. Whiteley, Sheila. The Space between the Notes: Rock and the Counter-Culture. London: Routledge, 1992. Wiltshire, Kenneth, and Charles Stokes. Government Regulation and the Electronic Commercial Media. Monograph M43. Melbourne: Committee for Economic Development of Australia, 1976. Winter, Chris. Personal interview. 16 Mar. 2013.
Style APA, Harvard, Vancouver, ISO itp.
23

Highmore, Ben. "Listlessness in the Archive". M/C Journal 15, nr 5 (11.10.2012). http://dx.doi.org/10.5204/mcj.546.

Pełny tekst źródła
Streszczenie:
1. Make a list of things to do2. Copy list of things left undone from previous list3. Add items to list of new things needing to be done4. Add some of the things already done from previous list and immediately cross off so as to put off the feeling of an interminable list of never accomplishable tasks5. Finish writing list and sit back feeling an overwhelming sense of listlessnessIt started so well. Get up: make list: get on. But lists can breed listlessness. It can’t always be helped. The word “list” referring to a sequence of items comes from the Italian and French words for “strip”—as in a strip of material. The word “list” that you find in the compound “listlessness” comes from the old English word for pleasing (to list is to please and to desire). To be listless is to be without desire, without the desire to please. The etymologies of list and listless don’t correspond but they might seem to conspire in other ways. Oh, and by the way, ships can list when their balance is off.I list, like a ship, itemising my obligations to job, to work, to colleagues, to parenting, to family: write a reference for such and such; buy birthday present for eighty-year-old dad; finish article about lists – and so on. I forget to add to the list my necessary requirements for achieving any of this: keep breathing; eat and drink regularly; visit toilet when required. Lists make visible. Lists hide. I forget to add to my list all my worries that underscore my sense that these lists (or any list) might require an optimism that is always something of a leap of faith: I hope that electricity continues to exist; I hope my computer will still work; I hope that my sore toe isn’t the first sign of bodily paralysis; I hope that this heart will still keep beating.I was brought up on lists: the hit parade (the top one hundred “hit” singles); football leagues (not that I ever really got the hang of them); lists of kings and queens; lists of dates; lists of states; lists of elements (the periodic table). There are lists and there are lists. Some lists are really rankings. These are clearly the important lists. Where do you stand on the list? How near the bottom are you? Where is your university in the list of top universities? Have you gone down or up? To list, then, for some at least is to rank, to prioritise, to value. Is it this that produces listlessness? The sense that while you might want to rank your ten favourite films in a list, listing is something that is constantly happening to you, happening around you; you are always in amongst lists, never on top of them. To hang around the middle of lists might be all that you can hope for: no possibility of sudden lurching from the top spot; no urgent worries that you might be heading for demotion too quickly.But ranking is only one aspect of listing. Sometimes listing has a more flattening effect. I once worked as a cash-in-hand auditor (in this case a posh name for someone who counts things). A group of us (many of whom were seriously stoned) were bussed to factories and warehouses where we had to count the stock. We had to make lists of items and simply count what there was: for large items this was relatively easy, but for the myriad of miniscule parts this seemed a task for Sisyphus. In a power-tool factory in some unprepossessing town on the outskirts of London (was it Slough or Croydon or somewhere else?) we had to count bolts, nuts, washers, flex, rivets, and so on. Of course after a while we just made it up—guesstimates—as they say. A box of thousands of 6mm metal washers is a homogenous set in a list of heterogeneous parts that itself starts looking homogenous as it takes its part in the list. Listing dedifferentiates in the act of differentiating.The task of making lists, of filling-in lists, of having a list of tasks to complete encourages listlessness because to list lists towards exhaustiveness and exhaustion. Archives are lists and lists are often archives and archived. Those that work on lists and on archives constantly battle the fatigue of too many lists, of too much exhaustiveness. But could exhaustion be embraced as a necessary mood with which to deal with lists and archives? Might listlessness be something of a methodological orientation that has its own productivity in the face of so many lists?At my university there resides an archive that can appear to be a list of lists. It is the Mass-Observation archive, begun at the end of 1936 and, with a sizeable hiatus in the 1960s and 1970s, is still going today. (For a full account of Mass-Observation, see Highmore, Everyday Life chapter 6, and Hubble; for examples of Mass-Observation material, see Calder and Sheridan, and Highmore, Ordinary chapter 4; for analysis of Mass-Observation from the point of view of the observer, see Sheridan, Street, and Bloome. The flavour of the project as it emerges in the late 1930s is best conveyed by consulting Mass-Observation, Mass-Observation, First Year’s Work, and Britain.) It was begun by three men: the filmmaker Humphrey Jennings, the poet and sociologist Charles Madge, and the ornithologist and anthropologist-of-the-near Tom Harrisson. Both Jennings and Madge were heavily involved in promoting a form of social surrealism that might see buried forces in the coincidences of daily life as well as in the machinations and contingency of large political and social events (the abdication crisis, the burning of the Crystal Palace—both in late 1936). Harrisson brought a form of amateur anthropology with him that would scour football crowds, pub clientele, and cinema queues for ritualistic and symbolic forms. Mass-Observation quickly recruited a large group of voluntary observers (about a thousand) who would be “the meteorological stations from whose reports a weather-map of popular feeling can be compiled” (Mass-Observation, Mass-Observation 30). Mass-Observation combined the social survey with a relentless interest in the irrational and in what the world felt like to those who lived in it. As a consequence the file reports often seem banal and bizarre in equal measure (accounts of nightmares, housework routines, betting activities). When Mass-Observation restarted in the 1980s the surrealistic impetus became less pronounced, but it was still there, implicit in the methodology. Today, both as an on-going project and as an archive of previous observational reports, Mass-Observation lives in archival boxes. You can find a list of what topics are addressed in each box; you can also find lists of the contributors, the voluntary Mass-Observers whose observations are recorded in the boxes. What better way to give you a flavour of these boxes than to offer you a sample of their listing activities. Here are observers, observing in 1983 the objects that reside on their mantelpieces. Here’s one:champagne cork, rubber band, drawing pin, two hearing aid batteries, appointment card for chiropodist, piece of dog biscuit.Does this conjure up a world? Do we have a set of clues, of material evidence, a small cosmology of relics, a reduced Wunderkammer, out of which we can construct not the exotic but something else, something more ordinary? Do you smell camphor and imagine antimacassars? Do you hear conversations with lots of mishearing? Are the hearing aid batteries shared? Is this a single person living with a dog, or do we imagine an assembly of chiropodist-goers, dog-owners, hearing aid-users, rubber band-pingers, champagne-drinkers?But don’t get caught imagining a life out of these fragments. Don’t get stuck on this list: there are hundreds to get through. After all, what sort of an archive would it be if it included a single list? We need more lists.Here’s another mantelpiece: three penknives, a tube of cement [which I assume is the sort of rubber cement that you get in bicycle puncture repair kits], a pocket microscope, a clinical thermometer.Who is this? A hypochondriacal explorer? Or a grown-up boy-scout, botanising on the asphalt? Why so many penknives? But on, on... And another:1 letter awaiting postage stamp1 diet book1 pair of spare spectacles1 recipe for daughter’s home economics1 notepad1 pen1 bottle of indigestion tablets1 envelope containing 13 pence which is owed a friend1 pair of stick-on heels for home shoe repairing session3 letters in day’s post1 envelope containing money for week’s milk bill1 recipe cut from magazine2 out of date letters from schoolWhat is the connection between the daughter’s home economics recipe and the indigestion tablets? Is the homework gastronomy not quite going to plan? Or is the diet book causing side-effects? And what sort of financial stickler remembers that they owe 13p; even in 1983 this was hardly much money? Or is it the friend who is the stickler? Perhaps this is just prying...?But you need more. Here’s yet another:an ashtray, a pipe, pipe tamper and tobacco pouch, one decorated stone and one plain stone, a painted clay model of an alien, an enamelled metal egg from Hong Kong, a copper bracelet, a polished shell, a snowstorm of Father Christmas in his sleigh...Ah, a pipe smoker, this much is clear. But apart from this the display sounds ritualistic – one stone decorated the other not. What sort of religion is this? What sort of magic? An alien and Santa. An egg, a shell, a bracelet. A riddle.And another:Two 12 gauge shotgun cartridges live 0 spread Rubber plantBrass carriage clockInternational press clock1950s cigarette dispenser Model of Panzer MKIV tankWWI shell fuseWWI shell case ash tray containing an acorn, twelve .22 rounds of ammunition, a .455 Eley round and a drawing pinPhoto of Eric Liddell (Chariots of Fire)Souvenir of Algerian ash tray containing marbles and beach stonesThree 1930s plastic duck clothes brushesLetter holder containing postcards and invitations. Holder in shape of a cow1970s Whizzwheels toy carWooden box of jeweller’s rottenstone (Victorian)Incense holderWorld war one German fuse (used)Jim Beam bottle with candle thereinSol beer bottle with candle therein I’m getting worried now. Who are these people who write for Mass-Observation? Why so much military paraphernalia? Why such detail as to the calibrations? Should I concern myself that small militias are holding out behind the net curtains and aspidistra plants of suburban England?And another:1930s AA BadgeAvocado PlantWooden cat from MexicoKahlua bottle with candle there in1950s matchbook with “merry widow” cocktail printed thereonTwo Britain’s model cannonOne brass “Carronade” from the Carron Iron Works factory shopPhotography pass from Parkhead 12/11/88Grouse foot kilt pinBrass incense holderPheasant featherNovitake cupBlack ash tray with beach pebbles there inFull packet of Mary Long cigarettes from HollandPewter cocktail shaker made in ShanghaiI’m feeling distance. Who says “there in” and “there on?” What is a Novitake cup? Perhaps I wrote it down incorrectly? An avocado plant stirs memories of trying to grow one from an avocado stone skewered in a cup with one “point” dunked in a bit of water. Did it ever grow, or just rot? I’m getting distracted now, drifting off, feeling sleepy...Some more then – let’s feed the listlessness of the list:Wood sculpture (Tenerife)A Rubber bandBirdJunior aspirinToy dinosaur Small photo of daughterSmall paint brushAh yes the banal bizarreness of ordinary life: dinosaurs and aspirins, paint brushes and rubber bands.But then a list comes along and pierces you:Six inch piece of grey eyeliner1 pair of nail clippers1 large box of matches1 Rubber band2 large hair gripsHalf a piece of cough candy1 screwed up tissue1 small bottle with tranquillizers in1 dead (but still in good condition) butterfly (which I intended to draw but placed it now to rest in the garden) it was already dead when I found it.The dead butterfly, the tranquillizers, the insistence that the mantelpiece user didn’t actually kill the butterfly, the half piece of cough candy, the screwed up tissue. In amongst the rubber bands and matches, signs of something desperate. Or maybe not: a holding on (the truly desperate haven’t found their way to the giant tranquillizer cupboard), a keeping a lid on it, a desire (to draw, to place a dead butterfly at rest in the garden)...And here is the methodology emerging: the lists works on the reader, listing them, and making them listless. After a while the lists (and there are hundreds of these lists of mantle-shelf items) begin to merge. One giant mantle shelf filled with small stacks of foreign coins, rubber bands and dead insects. They invite you to be both magical ethnographer and deadpan sociologist at one and the same time (for example, see Hurdley). The “Martian” ethnographer imagines the mantelpiece as a shrine where this culture worships the lone rubber band and itinerant button. Clearly a place of reliquary—on this planet the residents set up altars where they place their sacred objects: clocks and clippers; ammunition and amulets; coins and pills; candles and cosmetics. Or else something more sober, more sombre: late twentieth century petite-bourgeois taste required the mantelpiece to hold the signs of aspirant propriety in the form of emblems of tradition (forget the coins and the dead insects and weaponry: focus on the carriage clocks). And yet, either way, it is the final shelf that gets me every time. But it only got me, I think, because the archive had worked its magic: ransacked my will, my need to please, my desire. It had, for a while at least, made me listless, and listless enough to be touched by something that was really a minor catalogue of remainders. This sense of listlessness is the way that the archive productively defeats the “desire for the archive.” It is hard to visit an archive without an expectation, without an “image repertoire,” already in mind. This could be thought of as the apperception-schema of archival searching: the desire to see patterns already imagined; the desire to find the evidence for the thought whose shape has already formed. Such apperception is hard to avoid (probably impossible), but the boredom of the archive, its ceaselessness, has a way of undoing it, of emptying it. It corresponds to two aesthetic positions and propositions. One is well-known: it is Barthes’s distinction between “studium” and “punctum.” For Barthes, studium refers to a sort of social interest that is always, to some degree, satisfied by a document (his concern, of course, is with photographs). The punctum, on the other hand, spills out from the photograph as a sort of metonymical excess, quite distinct from social interest (but for all that, not asocial). While Barthes is clearly offering a phenomenology of viewing photographs, he isn’t overly interested (here at any rate) with the sort of perceptional-state the viewer might need to be in to be pierced by the puntum of an image. My sense, though, is that boredom, listlessness, tiredness, a sort of aching indifference, a mood of inattentiveness, a sense of satiated interest (but not the sort of disinterest of Kantian aesthetics), could all be beneficial to a punctum-like experience. The second aesthetic position is not so well-known. The Austrian dye-technician, lawyer and art-educationalist Anton Ehrenzweig wrote, during the 1950s and 1960s, about a form of inattentive-attention, and a form of afocal-rendering (eye-repelling rather than eye-catching), that encouraged eye-wandering, scanning, and the “‘full’ emptiness of attention” (Ehrenzweig, The Hidden Order 39). His was an aesthetics attuned to the kind of art produced by Paul Klee, but it was also an aesthetic propensity useful for making wallpaper and for productively connecting to unconscious processes. Like Barthes, Ehrenzweig doesn’t pursue the sort of affective state of being that might enhance such inattentive-attention, but it is not hard to imagine that the sort of library-tiredness of the archive would be a fitting preparation for “full emptiness.” Ehrenzweig and Barthes can be useful for exploring this archival mood, this orientation and attunement, which is also a disorientation and mis-attunement. Trawling through lists encourages scanning: your sensibilities are prepared; your attention is being trained. After a while, though, the lists blur, concentration starts to loosen its grip. The lists are not innocent recipients here. Shrapnel shards pull at you. You start to notice the patterns but also the spaces in-between that don’t seem to fit sociological categorisations. The strangeness of the patterns hypnotises you and while the effect can generate a sense of sociological-anthropological homogeneity-with-difference, sometimes the singularity of an item leaps out catching you unawares. An archive is an orchestration of order and disorder: however contained and constrained it appears it is always spilling out beyond its organisational structures (amongst the many accounts of archives in terms of their orderings, see Sekula, and Stoler, Race and Along). Like “Probate Inventories,” the mantelpiece archive presents material objects that connect us (however indirectly) to embodied practices and living spaces (Evans). The Mass-Observation archive, especially in its mantelpiece collection, is an accretion of temporalities and spaces. More crucially, it is an accumulation of temporalities materialised in a mass of spaces. A thousand mantelpieces in a thousand rooms scattered across the United Kingdom. Each shelf is syncopated to the rhythms of diverse durations, while being synchronised to the perpetual now of the shelf: a carriage clock, for instance, inherited from a deceased parent, its brass detailing relating to a different age, its mechanism perpetually telling you that the time of this space is now. The archive carries you away to a thousand living rooms filled with the momentary (dead insects) and the eternal (pebbles) and everything in-between. Its centrifugal force propels you out to a vast accrual of things: ashtrays, rubber bands, military paraphernalia, toy dinosaurs; a thousand living museums of the incidental and the memorial. This vertiginous archive threatens to undo you; each shelf a montage of times held materially together in space. It is too much. It pushes me towards the mantelshelves I know, the ones I’ve had a hand in. Each one an archive in itself: my grandfather’s green glass paperweight holding a fragile silver foil flower in its eternal grasp; the potions and lotions that feed my hypochondria; used train tickets. Each item pushes outwards to other times, other spaces, other people, other things. It is hard to focus, hard to cling onto anything. Was it the dead butterfly, or the tranquillizers, or both, that finally nailed me? Or was it the half a cough-candy? I know what she means by leaving the remnants of this sweet. You remember the taste, you think you loved them as a child, they have such a distinctive candy twist and colour, but actually their taste is harsh, challenging, bitter. There is nothing as ephemeral and as “useless” as a sweet; and yet few things are similarly evocative of times past, of times lost. Yes, I think I’d leave half a cough-candy on a shelf, gathering dust.[All these lists of mantelpiece items are taken from the Mass-Observation archive at the University of Sussex. Mass-Observation is a registered charity. For more information about Mass-Observation go to http://www.massobs.org.uk/]ReferencesBarthes, Roland. Camera Lucida. Translated by Richard Howard. London: Fontana, 1984.Calder, Angus, and Dorothy Sheridan, eds. Speak for Yourself: A Mass-Observation Anthology 1937–1949. Oxford: Oxford UP, 1985.Ehrenzweig, Anton. The Psychoanalysis of Artistic Vision and Hearing: An Introduction to a Theory of Unconscious Perception. Third edition. London: Sheldon Press, 1965. [Originally published in 1953.]---. The Hidden Order of Art. London: Paladin, 1970.Evans, Adrian. “Enlivening the Archive: Glimpsing Embodied Consumption Practices in Probate Inventories of Household Possessions.” Historical Geography 36 (2008): 40-72.Highmore, Ben. Everyday Life and Cultural Theory. London: Routledge, 2002.---. Ordinary Lives: Studies in the Everyday. Abingdon: Routledge, 2011.Hubble, Nick. Mass-Observation and Everyday Life: Culture, History, Theory, Houndmills and New York: Palgrave, 2006.Hurdley, Rachel. “Dismantling Mantelpieces: Narrating Identities and Materializing Culture in the Home.” Sociology 40, 4 (2006): 717-733Mass-Observation. Mass-Observation. London: Fredrick Muller, 1937.---. First Year’s Work 1937-38. London: Lindsay Drummond, 1938.---. Britain. Harmondsworth: Penguin, 1939.Sekula, Allan. “The Body and the Archive.” October 39 (1986): 3-64.Sheridan, Dorothy, Brian Street, and David Bloome. Writing Ourselves: Mass-Observation and Literary Practices. Cresskill, New Jersey: Hampton Press, 2000.Stoler, Ann Laura. Race and the Education of Desire: Foucault’s History of Sexuality and the Colonial Order of Things. Durham and London: Duke UP, 1995. Stoler, Ann Laura. Along the Archival Grain: Epistemic Anxieties and Colonial Common Sense. Princeton: Princeton UP, 2009.
Style APA, Harvard, Vancouver, ISO itp.
24

Stalcup, Meg. "What If? Re-imagined Scenarios and the Re-Virtualisation of History". M/C Journal 18, nr 6 (7.03.2016). http://dx.doi.org/10.5204/mcj.1029.

Pełny tekst źródła
Streszczenie:
Image 1: “Oklahoma State Highway Re-imagined.” CC BY-SA 4.0 2015 by author, using Wikimedia image by Ks0stm (CC BY-SA 3 2013). Introduction This article is divided in three major parts. First a scenario, second its context, and third, an analysis. The text draws on ethnographic research on security practices in the United States among police and parts of the intelligence community from 2006 through to the beginning of 2014. Real names are used when the material is drawn from archival sources, while individuals who were interviewed during fieldwork are referred to by their position rank or title. For matters of fact not otherwise referenced, see the sources compiled on “The Complete 911 Timeline” at History Commons. First, a scenario. Oklahoma, 2001 It is 1 April 2001, in far western Oklahoma, warm beneath the late afternoon sun. Highway Patrol Trooper C.L. Parkins is about 80 kilometres from the border of Texas, watching trucks and cars speed along Interstate 40. The speed limit is around 110 kilometres per hour, and just then, his radar clocks a blue Toyota Corolla going 135 kph. The driver is not wearing a seatbelt. Trooper Parkins swung in behind the vehicle, and after a while signalled that the car should pull over. The driver was dark-haired and short; in Parkins’s memory, he spoke English without any problem. He asked the man to come sit in the patrol car while he did a series of routine checks—to see if the vehicle was stolen, if there were warrants out for his arrest, if his license was valid. Parkins said, “I visited with him a little bit but I just barely remember even having him in my car. You stop so many people that if […] you don't arrest them or anything […] you don't remember too much after a couple months” (Clay and Ellis). Nawaf Al Hazmi had a valid California driver’s license, with an address in San Diego, and the car’s registration had been legally transferred to him by his former roommate. Parkins’s inquiries to the National Crime Information Center returned no warnings, nor did anything seem odd in their interaction. So the officer wrote Al Hazmi two tickets totalling $138, one for speeding and one for failure to use a seat belt, and told him to be on his way. Al Hazmi, for his part, was crossing the country to a new apartment in a Virginia suburb of Washington, DC, and upon arrival he mailed the payment for his tickets to the county court clerk in Oklahoma. Over the next five months, he lived several places on the East Coast: going to the gym, making routine purchases, and taking a few trips that included Las Vegas and Florida. He had a couple more encounters with local law enforcement and these too were unremarkable. On 1 May 2001 he was mugged, and promptly notified the police, who documented the incident with his name and local address (Federal Bureau of Investigation, 139). At the end of June, having moved to New Jersey, he was involved in a minor traffic accident on the George Washington Bridge, and officers again recorded his real name and details of the incident. In July, Khalid Al Mihdhar, the previous owner of the car, returned from abroad, and joined Al Hazmi in New Jersey. The two were boyhood friends, and they went together to a library several times to look up travel information, and then, with Al Hazmi’s younger brother Selem, to book their final flight. On 11 September, the three boarded American Airlines flight 77 as part of the Al Qaeda team that flew the mid-sized jet into the west façade of the Pentagon. They died along with the piloting hijacker, all the passengers, and 125 people on the ground. Theirs was one of four airplanes hijacked that day, one of which was crashed by passengers, the others into significant sites of American power, by men who had been living for varying lengths of time all but unnoticed in the United States. No one thought that Trooper Parkins, or the other officers with whom the 9/11 hijackers crossed paths, should have acted differently. The Commissioner of the Oklahoma Department of Public Safety himself commented that the trooper “did the right thing” at that April traffic stop. And yet, interviewed by a local newspaper in January of 2002, Parkins mused to the reporter “it's difficult sometimes to think back and go: 'What if you had known something else?'" (Clay and Ellis). Missed Opportunities Image 2: “Hijackers Timeline (Redacted).” CC BY-SA 4.0 2015 by author, using the Federal Bureau of Investigation (FBI)’s “Working Draft Chronology of Events for Hijackers and Associates”. In fact, several of the men who would become the 9/11 hijackers were stopped for minor traffic violations. Mohamed Atta, usually pointed to as the ringleader, was given a citation in Florida that spring of 2001 for driving without a license. When he missed his court date, a bench warrant was issued (Wall Street Journal). Perhaps the warrant was not flagged properly, however, since nothing happened when he was pulled over again, for speeding. In the government inquiries that followed attack, and in the press, these brushes with the law were “missed opportunities” to thwart the 9/11 plot (Kean and Hamilton, Report 353). Among a certain set of career law enforcement personnel, particularly those active in management and police associations, these missed opportunities were fraught with a sense of personal failure. Yet, in short order, they were to become a source of professional revelation. The scenarios—Trooper Parkins and Al Hazmi, other encounters in other states, the general fact that there had been chance meetings between police officers and the hijackers—were re-imagined in the aftermath of 9/11. Those moments were returned to and reversed, so that multiple potentialities could be seen, beyond or in addition to what had taken place. The deputy director of an intelligence fusion centre told me in an interview, “it is always a local cop who saw something” and he replayed how the incidents of contact had unfolded with the men. These scenarios offered a way to recapture the past. In the uncertainty of every encounter, whether a traffic stop or questioning someone taking photos of a landmark (and potential terrorist target), was also potential. Through a process of re-imagining, police encounters with the public became part of the government’s “national intelligence” strategy. Previously a division had been marked between foreign and domestic intelligence. While the phrase “national intelligence” had long been used, notably in National Intelligence Estimates, after 9/11 it became more significant. The overall director of the US intelligence community became the Director National Intelligence, for instance, and the cohesive term marked the way that increasingly diverse institutional components, types of data and forms of action were evolving to address the collection of data and intelligence production (McConnell). In a series of working groups mobilised by members of major police professional organisations, and funded by the US Department of Justice, career officers and representatives from federal agencies produced detailed recommendations and plans for involving police in the new Information Sharing Environment. Among the plans drawn up during this period was what would eventually come to be the Nationwide Suspicious Activity Reporting Initiative, built principally around the idea of encounters such as the one between Parkins and Al Hazmi. Map 1: Map of pilot sites in the Nationwide Suspicious Activity Reporting Evaluation Environment in 2010 (courtesy of the author; no longer available online). Map 2: Map of participating sites in the Nationwide Suspicious Activity Reporting Initiative, as of 2014. In an interview, a fusion centre director who participated in this planning as well as its implementation, told me that his thought had been, “if we train state and local cops to understand pre-terrorism indicators, if we train them to be more curious, and to question more what they see,” this could feed into “a system where they could actually get that information to somebody where it matters.” In devising the reporting initiative, the working groups counter-actualised the scenarios of those encounters, and the kinds of larger plots to which they were understood to belong, in order to extract a set of concepts: categories of suspicious “activities” or “patterns of behaviour” corresponding to the phases of a terrorism event in the process of becoming (Deleuze, Negotiations). This conceptualisation of terrorism was standardised, so that it could be taught, and applied, in discerning and documenting the incidents comprising an event’s phases. In police officer training, the various suspicious behaviours were called “terrorism precursor activities” and were divided between criminal and non-criminal. “Functional Standards,” developed by the Los Angeles Police Department and then tested by the Department of Homeland Security (DHS), served to code the observed behaviours for sharing (via compatible communication protocols) up the federal hierarchy and also horizontally between states and regions. In the popular parlance of videos made for the public by local police departments and DHS, which would come to populate the internet within a few years, these categories were “signs of terrorism,” more specifically: surveillance, eliciting information, testing security, and so on. Image 3: “The Seven Signs of Terrorism (sometimes eight).” CC BY-SA 4.0 2015 by author, using materials in the public domain. If the problem of 9/11 had been that the men who would become hijackers had gone unnoticed, the basic idea of the Suspicious Activity Reporting Initiative was to create a mechanism through which the eyes and ears of everyone could contribute to their detection. In this vein, “If You See Something, Say Something™” was a campaign that originated with the New York City Metropolitan Transportation Authority, and was then licensed for use to DHS. The tips and leads such campaigns generated, together with the reports from officers on suspicious incidents that might have to do with terrorism, were coordinated in the Information Sharing Environment. Drawing on reports thus generated, the Federal Government would, in theory, communicate timely information on security threats to law enforcement so that they would be better able to discern the incidents to be reported. The cycle aimed to catch events in emergence, in a distinctively anticipatory strategy of counterterrorism (Stalcup). Re-imagination A curious fact emerges from this history, and it is key to understanding how this initiative developed. That is, there was nothing suspicious in the encounters. The soon-to-be terrorists’ licenses were up-to-date, the cars were legal, they were not nervous. Even Mohamed Atta’s warrant would have resulted in nothing more than a fine. It is not self-evident, given these facts, how a governmental technology came to be designed from these scenarios. How––if nothing seemed of immediate concern, if there had been nothing suspicious to discern––did an intelligence strategy come to be assembled around such encounters? Evidently, strident demands were made after the events of 9/11 to know, “what went wrong?” Policies were crafted and implemented according to the answers given: it was too easy to obtain identification, or to enter and stay in the country, or to buy airplane tickets and fly. But the trooper’s question, the reader will recall, was somewhat different. He had said, “It’s difficult sometimes to think back and go: ‘What if you had known something else?’” To ask “what if you had known something else?” is also to ask what else might have been. Janet Roitman shows that identifying a crisis tends to implicate precisely the question of what went wrong. Crisis, and its critique, take up history as a series of right and wrong turns, bad choices made between existing dichotomies (90): liberty-security, security-privacy, ordinary-suspicious. It is to say, what were the possibilities and how could we have selected the correct one? Such questions seek to retrospectively uncover latencies—systemic or structural, human error or a moral lapse (71)—but they ask of those latencies what false understanding of the enemy, of threat, of priorities, allowed a terrible thing to happen. “What if…?” instead turns to the virtuality hidden in history, through which missed opportunities can be re-imagined. Image 4: “The Cholmondeley Sisters and Their Swaddled Babies.” Anonymous, c. 1600-1610 (British School, 17th century); Deleuze and Parnet (150). CC BY-SA 4.0 2015 by author, using materials in the public domain. Gilles Deleuze, speaking with Claire Parnet, says, “memory is not an actual image which forms after the object has been perceived, but a virtual image coexisting with the actual perception of the object” (150). Re-imagined scenarios take up the potential of memory, so that as the trooper’s traffic stop was revisited, it also became a way of imagining what else might have been. As Immanuel Kant, among others, points out, “the productive power of imagination is […] not exactly creative, for it is not capable of producing a sense representation that was never given to our faculty of sense; one can always furnish evidence of the material of its ideas” (61). The “memory” of these encounters provided the material for re-imagining them, and thereby re-virtualising history. This was different than other governmental responses, such as examining past events in order to assess the probable risk of their repetition, or drawing on past events to imagine future scenarios, for use in exercises that identify vulnerabilities and remedy deficiencies (Anderson). Re-imagining scenarios of police-hijacker encounters through the question of “what if?” evoked what Erin Manning calls “a certain array of recognizable elastic points” (39), through which options for other movements were invented. The Suspicious Activity Reporting Initiative’s architects instrumentalised such moments as they designed new governmental entities and programs to anticipate terrorism. For each element of the encounter, an aspect of the initiative was developed: training, functional standards, a way to (hypothetically) get real-time information about threats. Suspicion was identified as a key affect, one which, if cultivated, could offer a way to effectively deal not with binary right or wrong possibilities, but with the potential which lies nestled in uncertainty. The “signs of terrorism” (that is, categories of “terrorism precursor activities”) served to maximise receptivity to encounters. Indeed, it can apparently create an oversensitivity, manifested, for example, in police surveillance of innocent people exercising their right to assemble (Madigan), or the confiscation of photographers’s equipment (Simon). “What went wrong?” and “what if?” were different interrogations of the same pre-9/11 incidents. The questions are of course intimately related. Moments where something went wrong are when one is likely to ask, what else might have been known? Moreover, what else might have been? The answers to each question informed and shaped the other, as re-imagined scenarios became the means of extracting categories of suspicious activities and patterns of behaviour that comprise the phases of an event in becoming. Conclusion The 9/11 Commission, after two years of investigation into the causes of the disastrous day, reported that “the most important failure was one of imagination” (Kean and Hamilton, Summary). The iconic images of 9/11––such as airplanes being flown into symbols of American power––already existed, in guises ranging from fictive thrillers to the infamous FBI field memo sent to headquarters on Arab men learning to fly, but not land. In 1974 there had already been an actual (failed) attempt to steal a plane and kill the president by crashing it into the White House (Kean and Hamilton, Report Ch11 n21). The threats had been imagined, as Pat O’Malley and Philip Bougen put it, but not how to govern them, and because the ways to address those threats had been not imagined, they were discounted as matters for intervention (29). O’Malley and Bougen argue that one effect of 9/11, and the general rise of incalculable insecurities, was to make it necessary for the “merely imaginable” to become governable. Images of threats from the mundane to the extreme had to be conjured, and then imagination applied again, to devise ways to render them amenable to calculation, minimisation or elimination. In the words of the 9/11 Commission, the Government must bureaucratise imagination. There is a sense in which this led to more of the same. Re-imagining the early encounters reinforced expectations for officers to do what they already do, that is, to be on the lookout for suspicious behaviours. Yet, the images of threat brought forth, in their mixing of memory and an elastic “almost,” generated their own momentum and distinctive demands. Existing capacities, such as suspicion, were re-shaped and elaborated into specific forms of security governance. The question of “what if?” and the scenarios of police-hijacker encounter were particularly potent equipment for this re-imagining of history and its re-virtualisation. References Anderson, Ben. “Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies.” Progress in Human Geography 34.6 (2010): 777-98. Clay, Nolan, and Randy Ellis. “Terrorist Ticketed Last Year on I-40.” NewsOK, 20 Jan. 2002. 25 Nov. 2014 ‹http://newsok.com/article/2779124›. Deleuze, Gilles. Negotiations. New York: Columbia UP, 1995. Deleuze, Gilles, and Claire Parnet. Dialogues II. New York: Columbia UP 2007 [1977]. Federal Bureau of Investigation. “Hijackers Timeline (Redacted) Part 01 of 02.” Working Draft Chronology of Events for Hijackers and Associates. 2003. 18 Apr. 2014 ‹https://vault.fbi.gov/9-11%20Commission%20Report/9-11-chronology-part-01-of-02›. Kant, Immanuel. Anthropology from a Pragmatic Point of View. Trans. Robert B. Louden. Cambridge: Cambridge UP, 2006. Kean, Thomas H., and Lee Hamilton. Executive Summary of the 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. 25 Oct. 2015 ‹http://www.9-11commission.gov/report/911Report_Exec.htm›. Kean, Thomas H., and Lee Hamilton. The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. New York: W.W. Norton, 2004. McConnell, Mike. “Overhauling Intelligence.” Foreign Affairs, July/Aug. 2007. Madigan, Nick. “Spying Uncovered.” Baltimore Sun 18 Jul. 2008. 25 Oct. 2015 ‹http://www.baltimoresun.com/news/maryland/bal-te.md.spy18jul18-story.html›. Manning, Erin. Relationscapes: Movement, Art, Philosophy. Cambridge, MA: MIT P, 2009. O’Malley, P., and P. Bougen. “Imaginable Insecurities: Imagination, Routinisation and the Government of Uncertainty post 9/11.” Imaginary Penalities. Ed. Pat Carlen. Cullompton, UK: Willan, 2008.Roitman, Janet. Anti-Crisis. Durham, NC: Duke UP, 2013. Simon, Stephanie. “Suspicious Encounters: Ordinary Preemption and the Securitization of Photography.” Security Dialogue 43.2 (2012): 157-73. Stalcup, Meg. “Policing Uncertainty: On Suspicious Activity Reporting.” Modes of Uncertainty: Anthropological Cases. Eds. Limor Saminian-Darash and Paul Rabinow. Chicago: U of Chicago P, 2015. 69-87. Wall Street Journal. “A Careful Sequence of Mundane Dealings Sows a Day of Bloody Terror for Hijackers.” 16 Oct. 2001.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii