{"id":519,"date":"2011-04-13T03:54:26","date_gmt":"2011-04-13T03:54:26","guid":{"rendered":"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=519"},"modified":"2011-05-29T10:27:56","modified_gmt":"2011-05-29T10:27:56","slug":"performances","status":"publish","type":"page","link":"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=519","title":{"rendered":"Performances"},"content":{"rendered":"<p>This year, as in many previous years, the organizers encourage proposals for performances, which will typically be up to 15 minutes long and likely be held in the evening hours of the conference around or in parallel to paper presentations.<\/p>\n<p><div id=\"attachment_528\" class=\"wp-caption aligncenter\" style=\"width: 436px\"><a href=\"http:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/04\/vectors_performance.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/04\/vectors_performance.jpg\" alt=\"&#039;Vectors Come with Strings Attached&#039; composed by K. Qilo Matzen for 1 mover and 4 typewriters, performed at the 2008 ASC Conference in Champaign-Urbana (Photo: Lorene Anderson).\" title=\"&#039;Vectors Come with Strings Attached&#039; composed by K. Qilo Matzen for 1 mover and 4 typewriters, performed at the 2008 ASC Conference in Champaign-Urbana (Photo: Lorene Anderson).\" width=\"426\" height=\"273\" class=\"size-full wp-image-528\" srcset=\"https:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/04\/vectors_performance.jpg 426w, https:\/\/www.asc-cybernetics.org\/2011\/wp-content\/uploads\/2011\/04\/vectors_performance-300x192.jpg 300w\" sizes=\"auto, (max-width: 426px) 100vw, 426px\" \/><\/a><p class=\"wp-caption-text\">'Vectors Come with Strings Attached' composed by K. Qilo Matzen for 1 mover and 4 typewriters, performed at the 2008 ASC Conference in Champaign-Urbana (Photo: Lorene Anderson).<\/p><\/div><br \/>\n&nbsp;<\/p>\n<p>We invited proposals for performances which specifically involve or address acts of <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=17\">Listening<\/a> (metaphorically, more than the literally). <font color=\"black\"><b>The deadline for performance proposal submission has passed.<\/b><\/font>. Proposals for performances will be reviewed by the <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=34\">organizing committee<\/a>. Acceptance will take into account the degree to which the proposal relates to the <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=17\">conference theme Listening<\/a>, resource requirements as well as <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=9\">scheduling<\/a> constraints.<\/p>\n<p>Please refer to the <a href=\"http:\/\/www.asc-cybernetics.org\/2011\/?page_id=65\">important dates page<\/a> for deadlines and submit your proposal for a workshop to the <a href=\"mailto:secretary@asc-cybernetics.org?SUBJECT=Workshop Proposal\">ASC Secretary (secretary@asc-cybernetics.org)<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year, as in many previous years, the organizers encourage proposals for performances, which will typically be up to 15 minutes long and likely be held in the evening hours of the conference around or in parallel to paper presentations. &hellip; <a href=\"https:\/\/www.asc-cybernetics.org\/2011\/?page_id=519\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":505,"menu_order":58,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-519","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/519","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=519"}],"version-history":[{"count":20,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/519\/revisions"}],"predecessor-version":[{"id":739,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/519\/revisions\/739"}],"up":[{"embeddable":true,"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=\/wp\/v2\/pages\/505"}],"wp:attachment":[{"href":"https:\/\/www.asc-cybernetics.org\/2011\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=519"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}