2,576 results on '"Edwards, Matthew"'
Search Results
2. Chapter 14: Beauty Is the Only Thing: Sex and Fantasy in American Giallo Cinema
3. Index
4. Chapter 13: Warped Nests: Domestic Architecture, Transgressive Female Bodies, and the Dissolution of the Patriarchal Domain in 1970s American Gialli
5. About the Contributors
6. Chapter 12: Almodóvar Meets Gay Porn Meets Giallo: Rewriting Argento’s L’uccello dale piume di cristallo in Un couteau dans le Coeur
7. Chapter 10: But Illusions Don't Kill: An Examination of Giallo Tropes and Gender in Satoshi Kon's Perfect Blue
8. Chapter 11: This Is No Longer a Metaphor But a Demonstration: The Red of Blood in The Strange Color of Your Body's Tears
9. Part I: New Readings on Classic Gialli
10. Acknowledgments
11. Chapter 9: A Kinder Capitalism: Elements of the Giallo in Hong Kong New Wave Cinema
12. Chapter 1: The Killer's Eye: Giallo and the Zoom Lens
13. Chapter 3: Death Laid an Egg: A Giallo Out of Far-Left Field
14. Contents
15. Title Page, Copyright
16. Chapter 5: The Analog of Self-Authenticity within The Forbidden Photos of a Lady above Suspicion
17. Chapter 8: Watch Me When I Kill and The Bloodstained Shadow: An Interview with Director Antonio Bido
18. Introduction: Argentina, the Onetti Brothers, and the Resurgence of Giallo
19. Chapter 2: Argento's Evil Eye: Movements, Containments, and the Giallo's Possessive Gaze
20. Chapter 4: The Transnational Giallo: Jess Franco's Paroxismus and the Postmodern Crisis of Temporality
21. Chapter 7: A White Dress for Marialé: An Interview with Director Romano Scavolini
22. Part II: The Giallo Abroad. A Transnational Phenomenon
23. Chapter 6: Beyond Interesting: The Affective Complexity of Barbara Bouchet in Don't Torture a Duckling
24. Argentine Intimacies: Queer Kinship in an Age of Splendor, 1890–1910 by Joseph M. Pierce (review)
25. High-energy transient gas pinholes via saturated absorption
26. Time-to-Lie: Identifying Industrial Control System Honeypots Using the Internet Control Message Protocol
27. A novel stacked hybrid autoencoder for imputing LISA data gaps
28. Evaluating Machine Learning Models for Supernova Gravitational Wave Signal Classification
29. Generative adversarial network for stellar core-collapse gravitational waves
30. Pittsburgh's Freedom House Ambulance Service: The Origins of Emergency Medical Services and the Politics of Race and Health
31. Bimodal spore release heights in the water column enhance local retention and population connectivity of bull kelp, Nereocystis luetkeana
32. Laser wakefield acceleration of ions with a transverse flying focus
33. Navigating from cellular phenotypic screen to clinical candidate: selective targeting of the NLRP3 inflammasome
34. Fraudsters target the elderly: Behavioural evidence from randomised controlled scam-baiting experiments
35. Greater than five-order-of-magnitude post-compression temporal contrast improvement with an ionization plasma grating
36. Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention
37. Photochemically-induced acousto-optics in gases
38. Combined approaches, including long-read sequencing, address the diagnostic challenge of HYDIN in primary ciliary dyskinesia
39. Author Correction: NERD-seq: a novel approach of Nanopore direct RNA sequencing that expands representation of non-coding RNAs
40. NERD-seq: a novel approach of Nanopore direct RNA sequencing that expands representation of non-coding RNAs
41. Text generation for dataset augmentation in security classification tasks
42. Calibrating approximate Bayesian credible intervals of gravitational-wave parameters
43. Pump, Dump, and then What? The Long-Term Impact of Cryptocurrency Pump-and-Dump Schemes
44. Automatic Scam-Baiting Using ChatGPT
45. CAGI, the Critical Assessment of Genome Interpretation, establishes progress and prospects for computational genetic variant interpretation methods
46. How to Read Copi: A Historiography of the Margins
47. A Survey of Relevant Text Mining Technology
48. Abstract 4141269: Prescriber Implementation of Guideline-Directed Medical Therapy Remains Poor in the Peripheral Artery Disease Population
49. Active Countermeasures for Email Fraud
50. Open Access: “I Have Only Checked after the Event”: Consumer Approaches to Safe Online Shopping
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.