Computer Algorithms As Persuasive Agents: the Rhetoricity of Algorithmic Surveillance Within the Built Ecological Network

Total Page:16

File Type:pdf, Size:1020Kb

Computer Algorithms As Persuasive Agents: the Rhetoricity of Algorithmic Surveillance Within the Built Ecological Network COMPUTER ALGORITHMS AS PERSUASIVE AGENTS: THE RHETORICITY OF ALGORITHMIC SURVEILLANCE WITHIN THE BUILT ECOLOGICAL NETWORK Estee N. Beck A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2015 Committee: Kristine Blair, Advisor Patrick Pauken, Graduate Faculty Representative Sue Carter Wood Lee Nickoson © 2015 Estee N. Beck All Rights Reserved iii ABSTRACT Kristine Blair, Advisor Each time our students and colleagues participate online, they face invisible tracking technologies that harvest metadata for web customization, targeted advertising, and even state surveillance activities. This practice may be of concern for computers and writing and digital humanities specialists, who examine the ideological forces in computer-mediated writing spaces to address power inequality, as well as the role ideology plays in shaping human consciousness. However, the materiality of technology—the non-human objects that surrounds us—is of concern to those within rhetoric and composition as well. This project shifts attention to the materiality of non-human objects, specifically computer algorithms and computer code. I argue that these technologies are powerful non-human objects that have rhetorical agency and persuasive abilities, and as a result shape the everyday practices and behaviors of writers/composers on the web as well as other non-human objects. Through rhetorical inquiry, I examine literature from rhetoric and composition, surveillance studies, media and software studies, sociology, anthropology, and philosophy. I offer a “built ecological network” theory that is the manufactured and natural rhetorical rhizomatic network full of spatial, material, social, linguistic, and dynamic energy layers that enter into reflexive and reciprocal relations to support my claim that computer algorithms have agency and persuasive abilities. I also address how computer code figures in digital surveillance environments on the web, as well as how to refigure digital rhetoric and literate practices through the built ecological network. My results help shift attention to the role rhetoric plays in materiality, and further implicates rhetoric as both under the realm of human and material activity. iv For the path taken. v ACKNOWLEDGMENTS This project was supported by both a non-service fellowship and graduate student assistantship within the Department of English at Bowling Green State University. I gratefully acknowledge the financial and administrative support offered by the Rhetoric & Writing Program, the Department of English, Graduate College, and university. My role as a graduate assistant and fellow allowed me to thrive during the period of researching and writing this project. More importantly, my dissertation advisor, Dr. Kristine Blair, generously provided time, support, and advice during this process. Kris helped me to hone my argument and writing voice through chapter drafts with her extraordinary ability to provide timely and supportive direction, feedback, and insight. I am deeply indebted to Kris for mentorship during my graduate studies and through this project. Her examples of kindness, feminist ethic of care, and strong work ethic are ones that I will strive to model in my career. Committee members Dr. Sue Carter Wood and Dr. Lee Nickoson were generous with their time and feedback on this project as well. Sue helped me think through intersections of algorithmic surveillance with historical discussions of rhetoric, and Lee (as always) offered engaged commentary to help encourage me throughout the writing of this work. Outside committee member, Dr. Patrick Pauken additionally offered commentary that helped shape the direction of this project. My peer colleagues in the Rhetoric & Writing program supported me during the research and writing process, and I am especially indebted to the following people: Laural Adams, Megan Adams, Nicholaus Baca, Matthew Bridgewater, Shirley Faulkner-Springfield, Mariana Grohowski, Aimee Taylor, and Heather Trahan—all of whom provided either (or both) sustained vi collegiality, friendship or a pivotal relation which led to productive changes of my beliefs or values professionally and personally. I am grateful for my Grammish, Betty Thompson, for her unconditional love, support, saucy and sage advice, and financial and emotional support over my lifetime. I am also grateful for the support and encouragement from John Thompson, Renee and Eddie Miller, Tonya Thompson, Janice and Phil McNelis, Jean and Bill Spoeri, and Kay Alderson—all of whom have, at some point or another, encouraged me to continue with my education, and I thank you for such support. To my spiritual and life friend, Revered Dr. Trevor Gates-Crandall, I have been (and remain so) deeply indebted to your practical wisdom and constant encouragement to continue with my studies, especially during times while I lived in Virginia and Illinois. Your example and support has helped sustain my intellectual pursuits over the years. * Manuscript notation: The BGSU Graduate College (“Graduate College”) “Thesis and Dissertation Handbook” (“Handbook”) (n.d.) recommends students to select a style manual for the style of the thesis or dissertation. Additionally, the Graduate College Handbook explicitly states: The thesis or dissertation must conform strictly to the specifications of this Handbook and the style manual selected. In instances where the Handbook and the style manual differ, follow the Handbook regarding matters of form (required preliminary pages, margins, etc.) and the style manual regarding matters of style (grammar, table formatting, bibliography/notes, etc.) (n.d., p. 5) vii As this dissertation emerges from a set of political, social, and cultural practices and historical decisions made within the sub-discipline of Computers & Writing, this dissertation conforms to matters of style from two style manuals. First, for all matters of grammar, table formatting, and notes this dissertation follows APA (American Psychological Association) guidelines. Second, for matters of bibliographic reference, this dissertation follows the Computers & Composition: An International Journal Style Manual (“C&C Style Manual”). Since APA guidelines represent author’s first names as first initials, the C&C Style Manual espouses a feminist positionality and practice of representing the full author’s first name in bibliographic entries to illustrate the intellectual contributions women, men, trans-identified, and gender-neutral people make in research. This dissertation honors this political stance in the bibliographic entries. viii TABLE OF CONTENTS CHAPTER ONE: CONTEMPORARY HISTORIES OF TECHNOLOGICAL RHETORICS, ALGORITHMS, AND SURVEILLANCE ....................................................... 1 Rhetoric & Writing | Computers & Writing ....................................................................... 7 Tracking Technologies ...................................................................................................... 11 Surveillance Culture in the Internet of Things .................................................................. 14 Edward Snowden and the NSA......................................................................................... 16 Algorithmic Ideology ........................................................................................................ 18 Algorithmic processes. .......................................................................................... 20 Algorithmic inclusion/exclusion. .......................................................................... 22 Algorithmic ideology. ........................................................................................... 23 Surveillance Studies .......................................................................................................... 25 A Note on Rhetorical Theory and Inquiry ........................................................................ 30 CHAPTER TWO: THE BUILT ECOLOGICAL NETWORK: WHAT MATERIALITY AND ECOLOGY MEANS FOR RHETORIC AND WRITING STUDIES ......................... 34 Theories Circulating within Writing Studies .................................................................... 36 Built Ecological Network ................................................................................................. 41 Shaping people’s morals with the City Beautiful movement. .............................. 41 A Primer to Network(s) Theory: An Object-Oriented Strand .......................................... 44 ix Reciprocal and Reflexive Relations in the Network ......................................................... 50 Rhetorical rhizome. ............................................................................................... 53 Ecology. ................................................................................................................ 55 Energy Layers ................................................................................................................... 59 CHAPTER THREE: PERSUASIVE COMPUTER ALGORITHMS: A CASE STUDY OF GOOGLE’S PAGERANK ALGORITHM AND THE DYNAMIC WEIGHTED ALGORITHM ............................................................................................................................. 64 Persuasive Computer Algorithms ..................................................................................... 66 The Broader Picture of Algorithms and Data Analytics ..................................................
Recommended publications
  • Artificial Consciousness and the Consciousness-Attention Dissociation
    Consciousness and Cognition 45 (2016) 210–225 Contents lists available at ScienceDirect Consciousness and Cognition journal homepage: www.elsevier.com/locate/concog Review article Artificial consciousness and the consciousness-attention dissociation ⇑ Harry Haroutioun Haladjian a, , Carlos Montemayor b a Laboratoire Psychologie de la Perception, CNRS (UMR 8242), Université Paris Descartes, Centre Biomédical des Saints-Pères, 45 rue des Saints-Pères, 75006 Paris, France b San Francisco State University, Philosophy Department, 1600 Holloway Avenue, San Francisco, CA 94132 USA article info abstract Article history: Artificial Intelligence is at a turning point, with a substantial increase in projects aiming to Received 6 July 2016 implement sophisticated forms of human intelligence in machines. This research attempts Accepted 12 August 2016 to model specific forms of intelligence through brute-force search heuristics and also reproduce features of human perception and cognition, including emotions. Such goals have implications for artificial consciousness, with some arguing that it will be achievable Keywords: once we overcome short-term engineering challenges. We believe, however, that phenom- Artificial intelligence enal consciousness cannot be implemented in machines. This becomes clear when consid- Artificial consciousness ering emotions and examining the dissociation between consciousness and attention in Consciousness Visual attention humans. While we may be able to program ethical behavior based on rules and machine Phenomenology learning, we will never be able to reproduce emotions or empathy by programming such Emotions control systems—these will be merely simulations. Arguments in favor of this claim include Empathy considerations about evolution, the neuropsychological aspects of emotions, and the disso- ciation between attention and consciousness found in humans.
    [Show full text]
  • Computability and Complexity
    Computability and Complexity Lecture Notes Herbert Jaeger, Jacobs University Bremen Version history Jan 30, 2018: created as copy of CC lecture notes of Spring 2017 Feb 16, 2018: cleaned up font conversion hickups up to Section 5 Feb 23, 2018: cleaned up font conversion hickups up to Section 6 Mar 15, 2018: cleaned up font conversion hickups up to Section 7 Apr 5, 2018: cleaned up font conversion hickups up to the end of these lecture notes 1 1 Introduction 1.1 Motivation This lecture will introduce you to the theory of computation and the theory of computational complexity. The theory of computation offers full answers to the questions, • what problems can in principle be solved by computer programs? • what functions can in principle be computed by computer programs? • what formal languages can in principle be decided by computer programs? Full answers to these questions have been found in the last 70 years or so, and we will learn about them. (And it turns out that these questions are all the same question). The theory of computation is well-established, transparent, and basically simple (you might disagree at first). The theory of complexity offers many insights to questions like • for a given problem / function / language that has to be solved / computed / decided by a computer program, how long does the fastest program actually run? • how much memory space has to be used at least? • can you speed up computations by using different computer architectures or different programming approaches? The theory of complexity is historically younger than the theory of computation – the first surge of results came in the 60ties of last century.
    [Show full text]
  • Motion Picture Posters, 1924-1996 (Bulk 1952-1996)
    http://oac.cdlib.org/findaid/ark:/13030/kt187034n6 No online items Finding Aid for the Collection of Motion picture posters, 1924-1996 (bulk 1952-1996) Processed Arts Special Collections staff; machine-readable finding aid created by Elizabeth Graney and Julie Graham. UCLA Library Special Collections Performing Arts Special Collections Room A1713, Charles E. Young Research Library Box 951575 Los Angeles, CA 90095-1575 [email protected] URL: http://www2.library.ucla.edu/specialcollections/performingarts/index.cfm The Regents of the University of California. All rights reserved. Finding Aid for the Collection of 200 1 Motion picture posters, 1924-1996 (bulk 1952-1996) Descriptive Summary Title: Motion picture posters, Date (inclusive): 1924-1996 Date (bulk): (bulk 1952-1996) Collection number: 200 Extent: 58 map folders Abstract: Motion picture posters have been used to publicize movies almost since the beginning of the film industry. The collection consists of primarily American film posters for films produced by various studios including Columbia Pictures, 20th Century Fox, MGM, Paramount, Universal, United Artists, and Warner Brothers, among others. Language: Finding aid is written in English. Repository: University of California, Los Angeles. Library. Performing Arts Special Collections. Los Angeles, California 90095-1575 Physical location: Stored off-site at SRLF. Advance notice is required for access to the collection. Please contact the UCLA Library, Performing Arts Special Collections Reference Desk for paging information. Restrictions on Access COLLECTION STORED OFF-SITE AT SRLF: Open for research. Advance notice required for access. Contact the UCLA Library, Performing Arts Special Collections Reference Desk for paging information. Restrictions on Use and Reproduction Property rights to the physical object belong to the UCLA Library, Performing Arts Special Collections.
    [Show full text]
  • The Demolished Man Free
    FREE THE DEMOLISHED MAN PDF Alfred Bester | 256 pages | 08 Jul 1999 | Orion Publishing Co | 9781857988222 | English | London, United Kingdom Demolition Man (film) - Wikipedia Demolition Man is a American science fiction action film directed by Marco Brambilla in his directorial debut. Stallone is John Spartan, a risk- taking police officer, who has a reputation The Demolished Man causing destruction The Demolished Man carrying out his work. After a failed attempt to rescue hostages from evil crime lord Simon Phoenix, The Demolished Man are both sentenced to be cryogenically frozen in Phoenix is thawed for a parole hearing inbut escapes. Society has changed and all crime has seemingly been eliminated. Unable to deal with a criminal as dangerous as Phoenix, The Demolished Man authorities awaken Spartan to help capture him again. The story makes allusions to many other works including Aldous Huxley 's dystopian novel Brave New World[6] and H. Wells 's The Sleeper Awakes. The film was released in the United States on October 8, Inpsychopathic career criminal The Demolished Man Phoenix kidnaps a busload of hostages and takes refuge in an abandoned building. LAPD Sergeant John Spartan runs a thermal scan of the building; finding no trace of the hostages, he leads an The Demolished Man assault to capture Phoenix. Phoenix sets off explosives to destroy the building; the hostages' corpses are later found in the rubble, and Phoenix claims Spartan knew about them and attacked anyway. Both men are sentenced to lengthy terms in the city's new "California Cryo-Penitentiary", a prison in which The Demolished Man are cryogenically frozen and exposed to subliminal rehabilitation techniques.
    [Show full text]
  • Inventing Computational Rhetoric
    INVENTING COMPUTATIONAL RHETORIC By Michael W. Wojcik A THESIS Submitted to Michigan State University in partial fulfillment of the requirements for the degree of Digital Rhetoric and Professional Writing — Master of Arts 2013 ABSTRACT INVENTING COMPUTATIONAL RHETORIC by Michael W. Wojcik Many disciplines in the humanities are developing “computational” branches which make use of information technology to process large amounts of data algorithmically. The field of computational rhetoric is in its infancy, but we are already seeing interesting results from applying the ideas and goals of rhetoric to text processing and related areas. After considering what computational rhetoric might be, three approaches to inventing computational rhetorics are presented: a structural schema, a review of extant work, and a theoretical exploration. Copyright by MICHAEL W. WOJCIK 2013 For Malea iv ACKNOWLEDGEMENTS Above all else I must thank my beloved wife, Malea Powell, without whose prompting this thesis would have remained forever incomplete. I am also grateful for the presence in my life of my terrific stepdaughter, Audrey Swartz, and wonderful granddaughter Lucille. My thesis committee, Dean Rehberger, Bill Hart-Davidson, and John Monberg, pro- vided me with generous guidance and inspiration. Other faculty members at Michigan State who helped me explore relevant ideas include Rochelle Harris, Mike McLeod, Joyce Chai, Danielle Devoss, and Bump Halbritter. My previous academic program at Miami University did not result in a degree, but faculty there also contributed greatly to my the- oretical understanding, particularly Susan Morgan, Mary-Jean Corbett, Brit Harwood, J. Edgar Tidwell, Lori Merish, Vicki Smith, Alice Adams, Fran Dolan, and Keith Tuma.
    [Show full text]
  • AUTHOR Braddlee TITLE Intertextuality and Television Discourse: the Max Headroom Story
    DOCUMENT RESUME ED 310 462 CS 506 795 AUTHOR Braddlee TITLE Intertextuality and Television Discourse: The Max Headroom Story. PUB DATE May 89 NOTE 27p.; Paper presented at the Annual Meeting of the International Communication Association (38th, New Orleans, LA, May 29-June 2, 1988). PUB TYPE Speeches/Conference Papers (150) -- Viewpoints (120) -- Reports - Evaluative/Feasibility (142) EDRS PRICE MF01/PCO2 Plus Postage. DESCRIPTORS *Advertising; Discourse Analysis; Higher Education; Mass Media; Mass Media Effects; *Mass Media Role; *Mass Media Use; *Programing (Broadcast); *Reader Text Relationship; Television Research; *Television Viewing; Text Structure IDENTIFIERS Intertextuality; *Max Headroom ABSTRACT Max Headroom, the computer-generated media personality, presents a good opportunity for an investigation of the degree of intertextuality in television. Max combines narrative genres (science fiction and film noir), television program types (prime-time episodic narrative, made-for-TV movie, talkshows), advertising and programming, and electronic and print media. Analysis of one channel of discourse, commercials and advertising, shows that neither advertisers nor textual theorists can rest safely on their assumptions. The text involved here is complex in the very sense that culture itself is complex, and readings of media that reduce complexity to a simplistic ideological positioning of readers are reductive and based on an overprivileging of dominance over the intelligence of viewers, and their power to expose and exploit contradictory textual elements. By over-emphasizing the hegemonic and deemphasizing the emancipatory or oppositional, injustice is done to both the complexity of texts, and their potential for encouraging critical positionings among readers. Only through empirical investigation of individuals' readings in a consistent and systematic fashion will it be possible to determine the relationships between viewers and texts.
    [Show full text]
  • Cartoon and the Cult of Reduction
    Forced Perspectives: Cartoon and The Cult Of Reduction MARTINE LISA COROMPT Submitted in partial fulfillment of the requirements of the degree of Doctor of Philosophy (by creative work and dissertation) August 2016 School of Art Faculty Of The Victorian College Of The Arts The University of Melbourne 2 FIG 1 Corompt, Martine Torrent – the endless storm 2015 still from the digital animation 3 4 ABSTRACT Summary Commencing with caricature and reductive imaging techniques, this research explores parallel tendencies evident within broader culture. The thesis argues this reductive predisposition became broader and more prominent during Modernism, the digital revolution of the 1990s, and is strongly manifest within various aspects of contemporary art and culture. Theorized as the ‘Cult of Reduction’ this tendency is both a cultural condition, and a studio methodology employed to create two dimensional projected animation and digital prints. Abstract Beginning with pictorial caricature as a historical predecessor to animation, the research attempted to find in caricature a meaningful methodology to provide a framework for two-dimensional animation. Incorporating digital processes with drawing and installation, reduction was understood and examined pictorially, temporally and materially. The thesis project considered caricature as a means of exploring pictorial representation as reduction, but soon recognized reduction had more broad implications, and parallel examples were discovered in areas such as economics, ecology lifestyle ideologies, as well as Fine art and design. While pictorial reduction was most obvious within Modernism, it also was resonant in less obvious ways within the digital art revolution of the 1990’s. It has been prevalent again in contemporary art as a ‘reductivist practice’ recognized by Mike Kelley’s essay ‘Foul Perfection: Thoughts on Caricature’ (1989).
    [Show full text]
  • Computability Theory
    CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2019 Computability Theory This section is partly inspired by the material in \A Course in Mathematical Logic" by Bell and Machover, Chap 6, sections 1-10. Other references: \Introduction to the theory of computation" by Michael Sipser, and \Com- putability, Complexity, and Languages" by M. Davis and E. Weyuker. Our first goal is to give a formal definition for what it means for a function on N to be com- putable by an algorithm. Historically the first convincing such definition was given by Alan Turing in 1936, in his paper which introduced what we now call Turing machines. Slightly before Turing, Alonzo Church gave a definition based on his lambda calculus. About the same time G¨odel,Herbrand, and Kleene developed definitions based on recursion schemes. Fortunately all of these definitions are equivalent, and each of many other definitions pro- posed later are also equivalent to Turing's definition. This has lead to the general belief that these definitions have got it right, and this assertion is roughly what we now call \Church's Thesis". A natural definition of computable function f on N allows for the possibility that f(x) may not be defined for all x 2 N, because algorithms do not always halt. Thus we will use the symbol 1 to mean “undefined". Definition: A partial function is a function n f :(N [ f1g) ! N [ f1g; n ≥ 0 such that f(c1; :::; cn) = 1 if some ci = 1. In the context of computability theory, whenever we refer to a function on N, we mean a partial function in the above sense.
    [Show full text]
  • Film Soleil 28/9/05 3:35 Pm Page 2 Film Soleil 28/9/05 3:35 Pm Page 3
    Film Soleil 28/9/05 3:35 pm Page 2 Film Soleil 28/9/05 3:35 pm Page 3 Film Soleil D.K. Holm www.pocketessentials.com This edition published in Great Britain 2005 by Pocket Essentials P.O.Box 394, Harpenden, Herts, AL5 1XJ, UK Distributed in the USA by Trafalgar Square Publishing P.O.Box 257, Howe Hill Road, North Pomfret, Vermont 05053 © D.K.Holm 2005 The right of D.K.Holm to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form, or by any means (electronic, mechanical, photocopying, recording or otherwise) without the written permission of the publisher. Any person who does any unauthorised act in relation to this publication may beliable to criminal prosecution and civil claims for damages. The book is sold subject tothe condition that it shall not, by way of trade or otherwise, be lent, re-sold, hired out or otherwise circulated, without the publisher’s prior consent, in anyform, binding or cover other than in which it is published, and without similar condi-tions, including this condition being imposed on the subsequent publication. A CIP catalogue record for this book is available from the British Library. ISBN 1–904048–50–1 2 4 6 8 10 9 7 5 3 1 Book typeset by Avocet Typeset, Chilton, Aylesbury, Bucks Printed and bound by Cox & Wyman, Reading, Berkshire Film Soleil 28/9/05 3:35 pm Page 5 Acknowledgements There is nothing
    [Show full text]
  • Introduction to the Theory of Computation Computability, Complexity, and the Lambda Calculus Some Notes for CIS262
    Introduction to the Theory of Computation Computability, Complexity, And the Lambda Calculus Some Notes for CIS262 Jean Gallier and Jocelyn Quaintance Department of Computer and Information Science University of Pennsylvania Philadelphia, PA 19104, USA e-mail: [email protected] c Jean Gallier Please, do not reproduce without permission of the author April 28, 2020 2 Contents Contents 3 1 RAM Programs, Turing Machines 7 1.1 Partial Functions and RAM Programs . 10 1.2 Definition of a Turing Machine . 15 1.3 Computations of Turing Machines . 17 1.4 Equivalence of RAM programs And Turing Machines . 20 1.5 Listable Languages and Computable Languages . 21 1.6 A Simple Function Not Known to be Computable . 22 1.7 The Primitive Recursive Functions . 25 1.8 Primitive Recursive Predicates . 33 1.9 The Partial Computable Functions . 35 2 Universal RAM Programs and the Halting Problem 41 2.1 Pairing Functions . 41 2.2 Equivalence of Alphabets . 48 2.3 Coding of RAM Programs; The Halting Problem . 50 2.4 Universal RAM Programs . 54 2.5 Indexing of RAM Programs . 59 2.6 Kleene's T -Predicate . 60 2.7 A Non-Computable Function; Busy Beavers . 62 3 Elementary Recursive Function Theory 67 3.1 Acceptable Indexings . 67 3.2 Undecidable Problems . 70 3.3 Reducibility and Rice's Theorem . 73 3.4 Listable (Recursively Enumerable) Sets . 76 3.5 Reducibility and Complete Sets . 82 4 The Lambda-Calculus 87 4.1 Syntax of the Lambda-Calculus . 89 4.2 β-Reduction and β-Conversion; the Church{Rosser Theorem . 94 4.3 Some Useful Combinators .
    [Show full text]
  • Programming with Recursion
    Purdue University Purdue e-Pubs Department of Computer Science Technical Reports Department of Computer Science 1980 Programming With Recursion Dirk Siefkes Report Number: 80-331 Siefkes, Dirk, "Programming With Recursion" (1980). Department of Computer Science Technical Reports. Paper 260. https://docs.lib.purdue.edu/cstech/260 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. '. \ PI~Q(:[V\!'<lMTNr. 11'1'1'11 nr:CUI~SrON l1irk Siefke$* Tcchnische UniveTsit~t Berlin Inst. Soft\~are Theor. Informatik 1 Berlin 10, West Germany February, 1980 Purdue University Tech. Report CSD-TR 331 Abstract: Data structures defined as term algebras and programs built from recursive definitions complement each other. Computing in such surroundings guides us into Nriting simple programs Nith a clear semantics and performing a rigorous cost analysis on appropriate data structures. In this paper, we present a programming language so perceived, investigate some basic principles of cost analysis through it, and reflect on the meaning of programs and computing. -;;----- - -~~ Visiting at. the Computer Science Department of Purdue University with the help of a grant of the Stiftung Volksl.... agem.... erk. I am grateful for the support of both, ViV-Stiftung and Purdue. '1 1 CONTENTS O. Introduction I. 'llle formnlislIl REe Syntax and semantics of REC-programs; the formalisms REC(B) and RECS; recursive functions. REC l~ith VLI-r-t'iblcs. -2. Extensions and variations Abstract languages and compilers. REC over words as data structure; the formalisms REC\\'(q). REe for functions with variable I/O-dimension; the forma l:i sms VREC (B) .
    [Show full text]
  • Stallone Fights Studio's Accounting Methods
    Business Valuations: Stallone Fights Studio’s Accounting Methods Accounting issues take center stage in a recent dispute involving Sylvester Stallone's production company, Rogue Marble, and Warner Bros. Entertainment. The lawsuit charges Warner Bros. with breach of contract, unfair business practices and accounting fraud in connection with the revenues from the 1993 movie Demolition Man. Stallone seeks "full accounting" of revenues from the film, plus interest and damages. The suit doesn't yet specify damages, because Rogue Marble isn't "presently aware of the exact amounts of damages resulting" from the studio's alleged wrongdoing. However, the Oscar-nominated actor, writer and director — who's famous for his roles as Rocky Balboa and John Rambo — has a bigger fight in mind: His lawsuit alleges that "motion picture studios are notoriously greedy." And he wants them to account in a timely and open manner for amounts owed to actors, writers and filmmakers that are contingent on a film's performance. Here are the details of this high-profile case, along with an explanation of how its lessons about contingent consideration extend beyond Hollywood. Case Facts In 1992, Warner Bros. entered into an artist loan-out agreement with Rogue Marble for the services of Sylvester Stallone in Demolition Man, a sci-fi action film that also starred Wesley Snipes and Sandra Bullock. The loan-out agreement granted Rogue Marble certain percentages of the film's total defined gross after the amount exceed certain levels. Specifically, the contract granted: 15% of the gross when it exceeded $125 million, 17.5% when it exceeded $200 million, and 20% when it exceeded $250 million.
    [Show full text]