Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This book provides an in-depth introduction and overview of current research in computational music analysis. Its seventeen chapters, written by leading researchers, collectively represent the diversity as well as the technical and philosophical sophistication of the work being done today in this intensely interdisciplinary field. A broad range of approaches are presented, employing techniques originating in disciplines such as linguistics, information theory, information retrieval, pattern recognition, machine learning, topology, algebra and signal processing. Many of the methods described draw on well-established theories in music theory and analysis, such as Forte's pitch-class set theory, Schenkerian analysis, the methods of semiotic analysis developed by Ruwet and Nattiez, and Lerdahl and Jackendoff's Generative Theory of Tonal Music .
The book is divided into six parts, covering methodological issues, harmonic and pitch-class set analysis, form and voice-separation, grammars and hierarchical reduction, motivic analysis and pattern discovery and, finally, classification and the discovery of distinctive patterns.
"A surprisingly large number of people in the computing field are also skilled musicians; this book will certainly appeal to them. . This volume is a collection of current papers that gives a good introduction to the current state of the field, popular techniques, and key challenges. . This book is well organized, deep, sound in methodology, challenging, and fascinating. It should be accessible for those with knowledge in both areas: computational methods and music." (Creed Jones, Computing Reviews, computingreviews.com, June, 2016)
"The book has 17 chapters contributed by some of the leading music researchers, who have collectively done a terrific job in addressing as many topics as possible in this interdisciplinary area. . I would strongly recommend this lucidly edited volume to all music researchers, as well as to students of music theory and analysis. It will also be useful to those interested in music technology." (Soubhik Chakraborty, Computing Reviews, computingreviews.com, June, 2016)
Music Analysis by Computer Ontology and Epistemology.- The Harmonic Musical Surface and Two Novel Chord Representation Schemes.- Topological Structures in Computer-Aided Music Analysis.- Contextual Set-Class Analysis.- Computational Analysis of Musical Form.- Chord- and Note-Based Approaches to Voice Separation.- Analysing Symbolic Music with Probabilistic Grammars.- Interactive Melodic Analysis.- Implementing Methods for Analysing Music Based on Lerdahl and Jackendoff's Generative Theory of Tonal Music.- An Algebraic Approach to Time-Span Reduction.- Automated Motivic Analysis An Exhaustive Approach Based on Closed and Cyclic Pattern Mining in Multidimensional Parametric Spaces.- A Wavelet-Based Approach to Pattern Discovery in Melodies.- Analysing Music with Point-Set Compression Algorithms.- Composer Classification Models for Music-Theory Building.- Contrast Pattern Mining in Folk Music Analysis.- Pattern and Antipattern Discovery in Ethiopian Bagana Songs.- Using Geometric Symbolic Fingerprinting to Discover Distinctive Patterns in Polyphonic Music Corpora.- Index.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.