Latest YouTube Video
Saturday, June 6, 2015
Orioles Video: Manny Machado hits solo HR in 3rd inning of 2-1 loss to Indians (ESPN)
via IFTTT
Associated Press Champions League final player rankings
from FOX Sports Digital http://ift.tt/1F1Oa9h
via IFTTT
Luis Suarez scores decisive goal, still annoys
from FOX Sports Digital http://ift.tt/1ASM3d7
via IFTTT
Slick Barca cruise past Juventus to win Champions League
from FOX Sports Digital http://ift.tt/1dUXTcg
via IFTTT
Barcelona beats Juventus 3-1 in Champions League final
from FOX Sports Digital http://ift.tt/1KMDb8M
via IFTTT
Barcelona wins Champions League final with 3-1 victory over Juventus
from FOX Sports Digital http://ift.tt/1KhccnH
via IFTTT
Conte calls up 6 Juve players for Croatia, Portugal games
from FOX Sports Digital http://ift.tt/1FB6KGX
via IFTTT
Barca deploys Messi, Suarez, Neymar vs Juventus in final
from FOX Sports Digital http://ift.tt/1MdVELL
via IFTTT
The Latest: Barcelona, Juventus lineups for CL final
from FOX Sports Digital http://ift.tt/1Gge0f8
via IFTTT
The Latest: Soccer, not sordid politics, shine at CL final
from FOX Sports Digital http://ift.tt/1Gg7y7T
via IFTTT
Barca's fearsome front 3 firing the side to success
from FOX Sports Digital http://ift.tt/1Mw4aGO
via IFTTT
UK's David Cameron urges global fight against corruption
from FOX Sports Digital http://ift.tt/1T3hV4q
via IFTTT
Man who led IOC scandal probe: 'It may be too late for FIFA'
from FOX Sports Digital http://ift.tt/1QziK0K
via IFTTT
J-League side Cerezo opts not to extend Forlan's contract
from FOX Sports Digital http://ift.tt/1ARuoma
via IFTTT
Is China Behind the Massive Data Theft of 4 Million U.S. Officials?
from The Hacker News http://ift.tt/1Judwo9
via IFTTT
Eight-month-old BC girl denied anonymous liver transplant in Alberta
from Google Alert - anonymous http://ift.tt/1ARhNPI
via IFTTT
Benfica coach stuns fans by moving to rival Sporting
from FOX Sports Digital http://ift.tt/1IrGTam
via IFTTT
Beware! Facebook UnfriendAlert Software Steals Your Account Password
from The Hacker News http://ift.tt/1Ju0HKx
via IFTTT
Former South American soccer boss mired in FIFA scandal
from FOX Sports Digital http://ift.tt/1KT6vhb
via IFTTT
Sepp Blatter has a sanctuary in hometown of Visp
from FOX Sports Digital http://ift.tt/1QywLfe
via IFTTT
Portugal sets the pace at Under-20 World Cup
from FOX Sports Digital http://ift.tt/1RROVLm
via IFTTT
Green Flash at Moonrise
Friday, June 5, 2015
Orioles Highlight: Matt Wieters 2 H, 2 RBI in his 1st game since May 2014, Adam Jones tiebreaking HR in win over Indians (ESPN)
via IFTTT
MLB: Orioles 3-time All-Star C Matt Wieters activated from 60-day DL; batting 5th in lineup Friday vs. Indians (ESPN)
via IFTTT
Irish unveil terms of secret FIFA cash deal over handball
from FOX Sports Digital http://ift.tt/1F0rd6k
via IFTTT
Report: Neymar under investigation by Brazil tax authorities
from FOX Sports Digital http://ift.tt/1Mcdqiv
via IFTTT
Anonymous & Anonymous
from Google Alert - anonymous http://ift.tt/1H9Vp58
via IFTTT
Orioles: Brian Matusz's 8-game suspension for having a foreign substance on his arm has been upheld - CSNBaltimore.com (ESPN)
via IFTTT
MLB: Mike Trout, Bryce Harper and Giancarlo Stanton first 3 picks in ESPN's MLB Franchise Draft; live in ESPN NOW (ESPN)
via IFTTT
Brad Guzan returns to US lineup for 1st time since November
from FOX Sports Digital http://ift.tt/1Js7a8N
via IFTTT
Berlusconi near to selling 48 percent of AC Milan
from FOX Sports Digital http://ift.tt/1cCh1u9
via IFTTT
Install OpenCV 3.0 and Python 2.7+ on OSX
Step 1:
Install Homebrew and update
$ cd ~ $ ruby -e "$(curl -fsSL http://ift.tt/YQTuQh)"
$ brew update
Step 2:
Install python
$ brew install python
Update
PATHin
~/.bash_profile
# Homebrew export PATH=/usr/local/bin:$PATH
Reload
~/.bash_profile
$ source ~/.bash_profile
Confirm version of Python:
$ which python /usr/bin/local/python
Step 3:
Install
virtualenvand
virtualenvwrapper
$ pip install virtualenv virtualenvwrapper
Update
~/.bash_profileagain
# Virtualenv/VirtualenvWrapper source /usr/local/bin/virtualenvwrapper.sh
Reload
~/.bash_profile
Create
cvvirtual environment
$ mkvirtualenv cv
Step 4:
Install NumPy
$ pip install numpy
Step 5:
Use brew to install required developers tools and packages
$ brew install cmake pkg-config
Install the necessary image I/O packages. These packages allow you to load various image file formats such as JPEG, PNG, TIFF, etc.
$ brew install jpeg libpng libtiff openexr
Install libraries that are used to optimize various operations within OpenCV:
$ brew install eigen tbb
Step 6:
Grab OpenCV from GitHub and checkout the 3.0.0 version:
$ cd ~ $ git clone http://ift.tt/1jCrzMq $ cd opencv $ git checkout 3.0.0
Pull down the
opencv_contribrepo which contains extra modules for OpenCV, such as feature detection and local invariant descriptors (SIFT, SURF, etc.), text detection in natural images, line descriptors, and more:
$ cd ~ $ git clone http://ift.tt/1sDkzzf $ cd opencv_contrib $ git checkout 3.0.0
Step 7:
Setup the OpenCV build:
$ cd ~/opencv $ mkdir build $ cd build $ cmake -D CMAKE_BUILD_TYPE=RELEASE -D CMAKE_INSTALL_PREFIX=/usr/local -D INSTALL_C_EXAMPLES=ON -D INSTALL_PYTHON_EXAMPLES=ON -D BUILD_EXAMPLES=ON -D OPENCV_EXTRA_MODULES_PATH=~/opencv_contrib/modules ..
***I THINK ffmpeg MIGHT BE USEFUL HERE FOR VIDEO SUPPORT***
Compile OpenCV:
$ make
And assuming that OpenCV compiled without error, you can now install it on your OSX system:
$ make install
If you get an error message related to permissions, you’ll need to run the install command as sudo:
$ sudo make install
The post Install OpenCV 3.0 and Python 2.7+ on OSX appeared first on PyImageSearch.
from PyImageSearch http://ift.tt/1MbC2rQ
via IFTTT
Blatter's long goodbye fuels critics urging quick FIFA exit
from FOX Sports Digital http://ift.tt/1Gp72qb
via IFTTT
Former South American soccer boss mired in FIFA scandal
from FOX Sports Digital http://ift.tt/1ASiDvs
via IFTTT
US loses 3-0 to Ukraine at Under-20 World Cup
from FOX Sports Digital http://ift.tt/1Gp498G
via IFTTT
Ninis recalled by Greece for Euro qualifier vs Faeroes
from FOX Sports Digital http://ift.tt/1Qx1k4M
via IFTTT
Barca's fearsome front 3 firing the side to success
from FOX Sports Digital http://ift.tt/1H9dpfV
via IFTTT
Ireland's players knew nothing about FIFA payment
from FOX Sports Digital http://ift.tt/1FZWhHg
via IFTTT
In letter, South African official asks FIFA to channel funds
from FOX Sports Digital http://ift.tt/1HQcOvH
via IFTTT
ISS Daily Summary Report – 6/04/2015
from ISS On-Orbit Status Report http://ift.tt/1MsYQ6Y
via IFTTT
OBCrack on Twitter: "Anonymous: Cosima thinks Scott is too uptight. She introduces him to pot and ...
from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/OBcrack/status/606617800921116672&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNFyykpGOI4VrZqvXKx2txMlOUqBJw
via IFTTT
Argentina out and NZ through to playoffs at U20 World Cup
from FOX Sports Digital http://ift.tt/1BOCUwY
via IFTTT
How Apple Pay Can Be Hacked to Steal Your Credit Card Details
from The Hacker News http://ift.tt/1cBS7e1
via IFTTT
OBCrack on Twitter: "Anonymous: Delphine sings Spice Girls songs in the shower, often gets the ...
from Google Alert - anonymous https://www.google.com/url?rct=j&sa=t&url=https://twitter.com/OBcrack/status/606582987291914240&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNE4HxaQSCayoRaLQ7kVkfRKgRL5LA
via IFTTT
Juventus comeback complete after fixing downfall
from FOX Sports Digital http://ift.tt/1FZqqqo
via IFTTT
I have a new follower on Twitter
Kyle
Big Data Analytics & Algorithmics guru. I also dabble with Business Intelligence. Will make you Famous & Tell you Why!
United States
http://t.co/mNLxjD3xe6
Following: 8376 - Followers: 9498
June 05, 2015 at 09:02AM via Twitter http://twitter.com/KyleTheQuant
[FD] 1 Click Extract Audio v2.3.6 - Activex Buffer Overflow
1 Click Extract Audio Activex Buffer Overflow
Affected version=2.3.6
Vendor Homepage:http://ift.tt/1Jr8ed3
Software Link:http://ift.tt/1ROZ9MA
The vulnerability lies in the COM component used by the product SkinCrafter.dll
SkinCrafter.dll version.1.9.2.0
Vulnerability tested on Windows Xp Sp3 (EN),with IE6
Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
Source: Gmail -> IFTTT-> Blogger
[FD] 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow
Affected version=2.3.6
Vendor Homepage:http://ift.tt/1Jr8ed3
Software Link:http://ift.tt/1ROW0MT
The vulnerability lies in the COM component used by the product SkinCrafter.dll
SkinCrafter.dll version.1.9.2.0
Vulnerability tested on Windows Xp Sp3 (EN),with IE6
Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
Source: Gmail -> IFTTT-> Blogger
[FD] 1 Click Audio Converter v2.3.6 - Activex Buffer Overflow
Affected version=2.3.6
Vendor Homepage:http://ift.tt/1Jr8ed3
Software Link:http://ift.tt/1ROW0MT
The vulnerability lies in the COM component used by the product SkinCrafter.dll
SkinCrafter.dll version.1.9.2.0
Vulnerability tested on Windows Xp Sp3 (EN),with IE6
Author: metacom
Security Risk: ============== The security risk of the activex buffer overflow vulnerability is estimated as high. (CVSS 6.1) Credits & Authors: ================== metacom (PwC New Zealand) - [http://ift.tt/1ROW2Et] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any vendor licenses, policies, deface websites, hack into databases or trade with fraud/stolen material. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-db.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: http://twitter.com/#!/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1kouSqp Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list (feed), modify, use or edit our material contact (admin@vulnerability-lab.com or research@vulnerability-lab.com) to get a permission. Copyright © 2015 | Vulnerability Laboratory - [Evolution Security GmbH]™
Source: Gmail -> IFTTT-> Blogger
Benfica coach departs amid reports of shock switch to rival
from FOX Sports Digital http://ift.tt/1IonpU7
via IFTTT
Hijacking WhatsApp Account in Seconds Using This Simple Trick
from The Hacker News http://ift.tt/1KeeCDu
via IFTTT
Ghana through but Argentina in anxious wait at U20 WCup
from FOX Sports Digital http://ift.tt/1ARloNx
via IFTTT
UCSF Medical Center Announces Anonymous $50 Million Gift
from Google Alert - anonymous http://ift.tt/1AR9enV
via IFTTT
NGC 2419: Intergalactic Wanderer
Thursday, June 4, 2015
Encoding Markov Logic Networks in Possibilistic Logic. (arXiv:1506.01432v1 [cs.AI])
Markov logic uses weighted formulas to compactly encode a probability distribution over possible worlds. Despite the use of logical formulas, Markov logic networks (MLNs) can be difficult to interpret, due to the often counter-intuitive meaning of their weights. To address this issue, we propose a method to construct a possibilistic logic theory that exactly captures what can be derived from a given MLN using maximum a posteriori (MAP) inference. Unfortunately, the size of this theory is exponential in general. We therefore also propose two methods which can derive compact theories that still capture MAP inference, but only for specific types of evidence. These theories can be used, among others, to make explicit the hidden assumptions underlying an MLN or to explain the predictions it makes.
from cs.AI updates on arXiv.org http://ift.tt/1RNDAMh
via IFTTT
Abstractive Multi-Document Summarization via Phrase Selection and. (arXiv:1506.01597v1 [cs.CL])
We propose an abstraction-based multi-document summarization framework that can construct new sentences by exploring more fine-grained syntactic units than sentences, namely, noun/verb phrases. Different from existing abstraction-based approaches, our method first constructs a pool of concepts and facts represented by phrases from the input documents. Then new sentences are generated by selecting and merging informative phrases to maximize the salience of phrases and meanwhile satisfy the sentence construction constraints. We employ integer linear optimization for conducting phrase selection and merging simultaneously in order to achieve the global optimal solution for a summary. Experimental results on the benchmark data set TAC 2011 show that our framework outperforms the state-of-the-art models under automated pyramid evaluation metric, and achieves reasonably well results on manual linguistic quality evaluation.
from cs.AI updates on arXiv.org http://ift.tt/1GnIBcy
via IFTTT
Verification of Generalized Inconsistency-Aware Knowledge and Action Bases (Extended Version). (arXiv:1504.08108v2 [cs.AI] UPDATED)
Knowledge and Action Bases (KABs) have been put forward as a semantically rich representation of a domain, using a DL KB to account for its static aspects, and actions to evolve its extensional part over time, possibly introducing new objects. Recently, KABs have been extended to manage inconsistency, with ad-hoc verification techniques geared towards specific semantics. This work provides a twofold contribution along this line of research. On the one hand, we enrich KABs with a high-level, compact action language inspired by Golog, obtaining so called Golog-KABs (GKABs). On the other hand, we introduce a parametric execution semantics for GKABs, so as to elegantly accomodate a plethora of inconsistency-aware semantics based on the notion of repair. We then provide several reductions for the verification of sophisticated first-order temporal properties over inconsistency-aware GKABs, and show that it can be addressed using known techniques, developed for standard KABs.
from cs.AI updates on arXiv.org http://ift.tt/1QR3lf8
via IFTTT
I have a new follower on Twitter
Gloria Aguilar
Habil y proactiva. Cheff profesional e internacional. Trabajando en España.
Girona España
Following: 274 - Followers: 55
June 04, 2015 at 07:15PM via Twitter http://twitter.com/GAguuiiii
Orioles Highlight: Adam Jones hits tiebreaking solo HR in 8th inning in 3-2 win over Astros, halts 5-game losing streak (ESPN)
via IFTTT
[FD] Broken, Abandoned, and Forgotten Code, Part 7
Source: Gmail -> IFTTT-> Blogger
[FD] [CVE-2015-4051]: Beckhoff IPC diagnostics < 1.8 : Authentication bypass
Source: Gmail -> IFTTT-> Blogger
[FD] [CVE-2015-1234] Tanium all versions arbitrary file overwrite
Source: Gmail -> IFTTT-> Blogger
While heads roll, a FIFA-backed movie opens in the US
from FOX Sports Digital http://ift.tt/1Mqp1ew
via IFTTT
In Trinidad, former FIFA executive seen as 'our Robin Hood'
from FOX Sports Digital http://ift.tt/1dPJDlj
via IFTTT
Juventus acquires Dybala from Palermo for 32 million euros
from FOX Sports Digital http://ift.tt/1cA7Vy5
via IFTTT
Bob’s Tips & Tricks (June 2015)
Bob’s Tips & Tricks (June 2015)
Click inside the box below to enlarge.
from The 'hotspot' for all things Bob Ross. http://ift.tt/1H57okx
via IFTTT
Take the Bob Ross Quiz (June 2015)
Test your knowledge of the Bob Ross TV show, painting techniques and general Bob Ross trivia!
from The 'hotspot' for all things Bob Ross. http://ift.tt/1dhyJUg
via IFTTT
Why World Cup sponsors aren't bailing out
from FOX Sports Digital http://ift.tt/1JoCANd
via IFTTT
Barca, Juve can show game's good side amid FIFA bribes shame
from FOX Sports Digital http://ift.tt/1RMueAo
via IFTTT
Walter Zenga replaces Mihajlovic as Sampdoria coach
from FOX Sports Digital http://ift.tt/1KOI44n
via IFTTT
New Pics Added to the Blog Gallery (June 4, 2015)
New Pics Added to the Blog Gallery! (June 4, 2015)
Click link below to visit gallery now!
http://ift.tt/1HAGoHC
from The 'hotspot' for all things Bob Ross. http://ift.tt/1FW6tk2
via IFTTT
ISS Daily Summary Report – 06/03/2015
from ISS On-Orbit Status Report http://ift.tt/1czA34u
via IFTTT
PHOTO GALLERY: Great finals in European Cup history
from FOX Sports Digital http://ift.tt/1Gmyuog
via IFTTT
Advocaat has change of heart, signs new deal with Sunderland
from FOX Sports Digital http://ift.tt/1Kc8mMB
via IFTTT
Chiellini out of Champions League final, no Suarez reunion
from FOX Sports Digital http://ift.tt/1GmvhoS
via IFTTT
Barcelona names full squad for Champions League final
from FOX Sports Digital http://ift.tt/1Q9lWFy
via IFTTT
Barcelona extends Pedro's contract through 2019
from FOX Sports Digital http://ift.tt/1eR1gkI
via IFTTT
South African police investigating World Cup bribes
from FOX Sports Digital http://ift.tt/1KbETCq
via IFTTT
Belgium rises to No. 2 in FIFA rankings led by Germany
from FOX Sports Digital http://ift.tt/1GmaxgR
via IFTTT
Fiji surprises Honduras at Under-20 World Cup
from FOX Sports Digital http://ift.tt/1HM49u6
via IFTTT
Liverpool to sign James Milner on free transfer
from FOX Sports Digital http://ift.tt/1IfwDz3
via IFTTT
Fiji shocks Honduras at Under-20 World Cup
from FOX Sports Digital http://ift.tt/1ALHWQ6
via IFTTT
Reports: Mihajlovic to replace Inzaghi at AC Milan
from FOX Sports Digital http://ift.tt/1FVrPOv
via IFTTT
FIFA: Blatter resignation won't lead many to quit
from FOX Sports Digital http://ift.tt/1IffiGA
via IFTTT
I have a new follower on Twitter
Sigrun Paulissen
Typical zombie nerd
stillwater, ny
Following: 1481 - Followers: 1302
June 04, 2015 at 02:17AM via Twitter http://twitter.com/sigrunpaulissen
Former FIFA VP Warner makes televised address in Trinidad
from FOX Sports Digital http://ift.tt/1Jna6Ub
via IFTTT
Flyby Image of Saturns Sponge Moon Hyperion
I have a new follower on Twitter
Princess Bayside
Discover the ultimate in fun and relaxation at the Princess Bayside Beach Hotel.
Bayfront, Ocean City, MD
http://t.co/SuLFMbwU7U
Following: 1506 - Followers: 369
June 04, 2015 at 12:48AM via Twitter http://twitter.com/PrincessBayside
Wednesday, June 3, 2015
Jordan Morris added to US roster vs Netherlands, Germany
from FOX Sports Digital http://ift.tt/1SXlXex
via IFTTT
Orioles Video: Miguel Gonzalez 6.2 IP, allows 3 ER, Adam Jones 2-for-4 in 3-1 loss to Astros (ESPN)
via IFTTT
Former FIFA VP Warner makes televised address in Trinidad
from FOX Sports Digital http://ift.tt/1FvbTAn
via IFTTT
Performing Bayesian Risk Aggregation using Discrete Approximation Algorithms with Graph Factorization. (arXiv:1506.01056v1 [cs.AI])
Risk aggregation is a popular method used to estimate the sum of a collection of financial assets or events, where each asset or event is modelled as a random variable. Applications, in the financial services industry, include insurance, operational risk, stress testing, and sensitivity analysis, but the problem is widely encountered in many other application domains. This thesis has contributed two algorithms to perform Bayesian risk aggregation when model exhibit hybrid dependency and high dimensional inter-dependency. The first algorithm operates on a subset of the general problem, with an emphasis on convolution problems, in the presence of continuous and discrete variables (so called hybrid models) and the second algorithm offer a universal method for general purpose inference over much wider classes of Bayesian Network models.
from cs.AI updates on arXiv.org http://ift.tt/1Glsyfk
via IFTTT
Quizz: Targeted crowdsourcing with a billion (potential) users. (arXiv:1506.01062v1 [cs.AI])
We describe Quizz, a gamified crowdsourcing system that simultaneously assesses the knowledge of users and acquires new knowledge from them. Quizz operates by asking users to complete short quizzes on specific topics; as a user answers the quiz questions, Quizz estimates the user's competence. To acquire new knowledge, Quizz also incorporates questions for which we do not have a known answer; the answers given by competent users provide useful signals for selecting the correct answers for these questions. Quizz actively tries to identify knowledgeable users on the Internet by running advertising campaigns, effectively leveraging the targeting capabilities of existing, publicly available, ad placement services. Quizz quantifies the contributions of the users using information theory and sends feedback to the advertisingsystem about each user. The feedback allows the ad targeting mechanism to further optimize ad placement.
Our experiments, which involve over ten thousand users, confirm that we can crowdsource knowledge curation for niche and specialized topics, as the advertising network can automatically identify users with the desired expertise and interest in the given topic. We present controlled experiments that examine the effect of various incentive mechanisms, highlighting the need for having short-term rewards as goals, which incentivize the users to contribute. Finally, our cost-quality analysis indicates that the cost of our approach is below that of hiring workers through paid-crowdsourcing platforms, while offering the additional advantage of giving access to billions of potential users all over the planet, and being able to reach users with specialized expertise that is not typically available through existing labor marketplaces.
from cs.AI updates on arXiv.org http://ift.tt/1BL5mQq
via IFTTT
Fast Generation of Best Interval Patterns for Nonmonotonic Constraints. (arXiv:1506.01071v1 [cs.AI])
In pattern mining, the main challenge is the exponential explosion of the set of patterns. Typically, to solve this problem, a constraint for pattern selection is introduced. One of the first constraints proposed in pattern mining is support (frequency) of a pattern in a dataset. Frequency is an anti-monotonic function, i.e., given an infrequent pattern, all its superpatterns are not frequent. However, many other constraints for pattern selection are neither monotonic nor anti-monotonic, which makes it difficult to generate patterns satisfying these constraints. In this paper we introduce the notion of "generalized monotonicity" and Sofia algorithm that allow generating best patterns in polynomial time for some nonmonotonic constraints modulo constraint computation and pattern extension operations. In particular, this algorithm is polynomial for data on itemsets and interval tuples. In this paper we consider stability and delta-measure which are nonmonotonic constraints and apply them to interval tuple datasets. In the experiments, we compute best interval tuple patterns w.r.t. these measures and show the advantage of our approach over postfiltering approaches.
KEYWORDS: Pattern mining, nonmonotonic constraints, interval tuple data
from cs.AI updates on arXiv.org http://ift.tt/1Glsyfi
via IFTTT
Homogeneous Spiking Neuromorphic System for Real-World Pattern Recognition. (arXiv:1506.01072v1 [cs.NE])
A neuromorphic chip that combines CMOS analog spiking neurons and memristive synapses offers a promising solution to brain-inspired computing, as it can provide massive neural network parallelism and density. Previous hybrid analog CMOS-memristor approaches required extensive CMOS circuitry for training, and thus eliminated most of the density advantages gained by the adoption of memristor synapses. Further, they used different waveforms for pre and post-synaptic spikes that added undesirable circuit overhead. Here we describe a hardware architecture that can feature a large number of memristor synapses to learn real-world patterns. We present a versatile CMOS neuron that combines integrate-and-fire behavior, drives passive memristors and implements competitive learning in a compact circuit module, and enables in-situ plasticity in the memristor synapses. We demonstrate handwritten-digits recognition using the proposed architecture using transistor-level circuit simulations. As the described neuromorphic architecture is homogeneous, it realizes a fundamental building block for large-scale energy-efficient brain-inspired silicon chips that could lead to next-generation cognitive computing.
from cs.AI updates on arXiv.org http://ift.tt/1BL5mQn
via IFTTT
Traversing Knowledge Graphs in Vector Space. (arXiv:1506.01094v1 [cs.CL])
Path queries on a knowledge graph can be used to answer compositional questions such as "What languages are spoken by people living in Lisbon?". However, knowledge graphs often have missing facts (edges) which disrupts path queries. Recent models for knowledge base completion impute missing facts by embedding knowledge graphs in vector spaces. We show that these models can be recursively applied to answer path queries, but that they suffer from cascading errors. This motivates a new "compositional" training objective, which dramatically improves all models' ability to answer path queries, in some cases more than doubling accuracy. On a standard knowledge base completion task, we also demonstrate that compositional training acts as a novel form of structural regularization, reliably improving performance across all base models (reducing errors by up to 43%) and achieving new state-of-the-art results.
from cs.AI updates on arXiv.org http://ift.tt/1IeAxZ5
via IFTTT
A Game-Theoretic Model and Best-Response Learning Method for Ad Hoc Coordination in Multiagent Systems. (arXiv:1506.01170v1 [cs.GT])
The ad hoc coordination problem is to design an autonomous agent which is able to achieve optimal flexibility and efficiency in a multiagent system with no mechanisms for prior coordination. We conceptualise this problem formally using a game-theoretic model, called the stochastic Bayesian game, in which the behaviour of a player is determined by its private information, or type. Based on this model, we derive a solution, called Harsanyi-Bellman Ad Hoc Coordination (HBA), which utilises the concept of Bayesian Nash equilibrium in a planning procedure to find optimal actions in the sense of Bellman optimal control. We evaluate HBA in a multiagent logistics domain called level-based foraging, showing that it achieves higher flexibility and efficiency than several alternative algorithms. We also report on a human-machine experiment at a public science exhibition in which the human participants played repeated Prisoner's Dilemma and Rock-Paper-Scissors against HBA and alternative algorithms, showing that HBA achieves equal efficiency and a significantly higher welfare and winning rate.
from cs.AI updates on arXiv.org http://ift.tt/1BL5mQd
via IFTTT
A density compensation-based path computing model for measuring semantic similarity. (arXiv:1506.01245v1 [cs.AI])
The shortest path between two concepts in a taxonomic ontology is commonly used to represent the semantic distance between concepts in the edge-based semantic similarity measures. In the past, the edge counting is considered to be the default method for the path computation, which is simple, intuitive and has low computational complexity. However, a large lexical taxonomy of such as WordNet has the irregular densities of links between concepts due to its broad domain but. The edge counting-based path computation is powerless for this non-uniformity problem. In this paper, we advocate that the path computation is able to be separated from the edge-based similarity measures and form various general computing models. Therefore, in order to solve the problem of non-uniformity of concept density in a large taxonomic ontology, we propose a new path computing model based on the compensation of local area density of concepts, which is equal to the number of direct hyponyms of the subsumers of concepts in their shortest path. This path model considers the local area density of concepts as an extension of the edge-based path and converts the local area density divided by their depth into the compensation for edge-based path with an adjustable parameter, which idea has been proven to be consistent with the information theory. This model is a general path computing model and can be applied in various edge-based similarity algorithms. The experiment results show that the proposed path model improves the average correlation between edge-based measures with human judgments on Miller and Charles benchmark from less than 0.8 to more than 0.85, and has a big advantage in efficiency than information content (IC) computation in a dynamic ontology, thereby successfully solving the non-uniformity problem of taxonomic ontology.
from cs.AI updates on arXiv.org http://ift.tt/1GlsA6X
via IFTTT
Summarization of Films and Documentaries Based on Subtitles and Scripts. (arXiv:1506.01273v1 [cs.CL])
We assess the performance of generic text summarization algorithms applied to films and documentaries, using the well-known behavior of summarization of news articles as reference. We use three datasets: (i) news articles, (ii) film scripts and subtitles, and (iii) documentary subtitles. Standard ROUGE metrics are used for comparing generated summaries against news abstracts, plot summaries, and synopses. We show that the best performing algorithms are LSA, for news articles and documentaries, and LexRank and Support Sets, for films. Despite the different nature of films and documentaries, their relative behavior is in accordance with that obtained for news articles.
from cs.AI updates on arXiv.org http://ift.tt/1BL5nnn
via IFTTT
Probabilistic Numerics and Uncertainty in Computations. (arXiv:1506.01326v1 [math.NA])
We deliver a call to arms for probabilistic numerical methods: algorithms for numerical tasks, including linear algebra, integration, optimization and solving differential equations, that return uncertainties in their calculations. Such uncertainties, arising from the loss of precision induced by numerical calculation with limited time or hardware, are important for much contemporary science and industry. Within applications such as climate science and astrophysics, the need to make decisions on the basis of computations with large and complex data has led to a renewed focus on the management of numerical uncertainty. We describe how several seminal classic numerical methods can be interpreted naturally as probabilistic inference. We then show that the probabilistic view suggests new algorithms that can flexibly be adapted to suit application specifics, while delivering improved empirical performance. We provide concrete illustrations of the benefits of probabilistic numeric algorithms on real scientific problems from astrometry and astronomical imaging, while highlighting open problems with these new algorithms. Finally, we describe how probabilistic numerical methods provide a coherent framework for identifying the uncertainty in calculations performed with a combination of numerical algorithms (e.g. both numerical optimisers and differential equation solvers), potentially allowing the diagnosis (and control) of error sources in computations.
from cs.AI updates on arXiv.org http://ift.tt/1G78viP
via IFTTT
A Distance-based Paraconsistent Semantics for DL-Lite. (arXiv:1301.2005v3 [cs.AI] UPDATED)
DL-Lite is an important family of description logics. Recently, there is an increasing interest in handling inconsistency in DL-Lite as the constraint imposed by a TBox can be easily violated by assertions in ABox in DL-Lite. In this paper, we present a distance-based paraconsistent semantics based on the notion of feature in DL-Lite, which provides a novel way to rationally draw meaningful conclusions even from an inconsistent knowledge base. Finally, we investigate several important logical properties of this entailment relation based on the new semantics and show its promising advantages in non-monotonic reasoning for DL-Lite.
from cs.AI updates on arXiv.org http://ift.tt/11kXUwJ
via IFTTT
A generalized back-door criterion. (arXiv:1307.5636v3 [stat.ME] UPDATED)
We generalize Pearl's back-door criterion for directed acyclic graphs (DAGs) to more general types of graphs that describe Markov equivalence classes of DAGs and/or allow for arbitrarily many hidden variables. We also give easily checkable necessary and sufficient graphical criteria for the existence of a set of variables that satisfies our generalized back-door criterion, when considering a single intervention and a single outcome variable. Moreover, if such a set exists, we provide an explicit set that fulfills the criterion. We illustrate the results in several examples. R-code is available in the R-package pcalg.
from cs.AI updates on arXiv.org http://ift.tt/1bHp3ze
via IFTTT
Optimal high-level descriptions of dynamical systems. (arXiv:1409.7403v2 [cs.IT] UPDATED)
To analyze high-dimensional systems, many fields in science and engineering rely on high-level descriptions, sometimes called "macrostates," "coarse-grainings," or "effective theories". Examples of such descriptions include the thermodynamic properties of a large collection of point particles undergoing reversible dynamics, the variables in a macroeconomic model describing the individuals that participate in an economy, and the summary state of a cell composed of a large set of biochemical networks.
Often these high-level descriptions are constructed without considering the ultimate reason for needing them in the first place. Here, we formalize and quantify one such purpose: the need to predict observables of interest concerning the high-dimensional system with as high accuracy as possible, while minimizing the computational cost of doing so. The resulting State Space Compression (SSC) framework provides a guide for how to solve for the {optimal} high-level description of a given dynamical system, rather than constructing it based on human intuition alone.
In this preliminary report, we introduce SSC, and illustrate it with several information-theoretic quantifications of "accuracy", all with different implications for the optimal compression. We also discuss some other possible applications of SSC beyond the goal of accurate prediction. These include SSC as a measure of the complexity of a dynamical system, and as a way to quantify information flow between the scales of a system.
from cs.AI updates on arXiv.org http://ift.tt/1vmpNlX
via IFTTT
Problem Theory. (arXiv:1412.1044v4 [cs.AI] UPDATED)
The Turing machine, as it was presented by Turing himself, models the calculations done by a person. This means that we can compute whatever any Turing machine can compute provided we have enough time and memory, and therefore we are Turing complete. The question addressed here is why, Why are we Turing complete? Being Turing complete also means that somehow our brain implements the function that a universal Turing machine implements. The point is that evolution achieved Turing completeness, and then the explanation should be evolutionary. Nevertheless, our explanation is mathematical. The trick is to introduce a mathematical theory of problems, under the basic assumption that solving more problems provides more survival opportunities. Then we construct a series of resolvers, where each resolver is defined by its computing capacity, that exhibits the following property: all problems solved by a resolver are also solved by the next resolver in the series if certain condition is satisfied. The last of the conditions is to be Turing complete. This series defines a resolvers hierarchy that could be seen as a first and broad description of the evolution of cognition, where achieving Turing completeness is the final step. Then the answer to our question would be: to solve most problems. By the way, the problem theory defines adaptation and learning, and it shows that there are just three ways to resolve any problem. And, most importantly, this theory demonstrates how problems can be used to found mathematics and computing on biology.
from cs.AI updates on arXiv.org http://ift.tt/1yhG7X1
via IFTTT
Towards AI-Complete Question Answering: A Set of Prerequisite Toy Tasks. (arXiv:1502.05698v6 [cs.AI] UPDATED)
One long-term goal of machine learning research is to produce methods that are applicable to reasoning and natural language, in particular building an intelligent dialogue agent. To measure progress towards that goal, we argue for the usefulness of a set of proxy tasks that evaluate reading comprehension via question answering. Our tasks measure understanding in several ways: whether a system is able to answer questions via chaining facts, simple induction, deduction and many more. The tasks are designed to be prerequisites for any system that aims to be capable of conversing with a human. We believe many existing learning systems can currently not solve them, and hence our aim is to classify these tasks into skill sets, so that researchers can identify (and then rectify) the failings of their systems. We also extend and improve the recently introduced Memory Networks model, and show it is able to solve some, but not all, of the tasks.
from cs.AI updates on arXiv.org http://ift.tt/1ApWocn
via IFTTT
Kannel and FreeBSD
Source: Gmail -> IFTTT-> Blogger
[FD] [Multiple CVE's]: various critical vulnerabilities in SysAid Help Desk (RCE, file download, DoS, etc)
Source: Gmail -> IFTTT-> Blogger
Registration module: an Anonymous user added an event - how did this happen
from Google Alert - anonymous http://ift.tt/1EXAQCJ
via IFTTT
Judge in Blazer case unsure how to pronounce FIFA
from FOX Sports Digital http://ift.tt/1H1uNDh
via IFTTT
Orioles: OF Alejandro De Aza traded to Red Sox for cash; .214 BA in 30 games before being DFA'd last week (ESPN)
via IFTTT
Dealing with Anonymous Posting Sites
from Google Alert - anonymous http://ift.tt/1Jm8v0Z
via IFTTT
FIFA executive committee member Blazer admitted bribes
from FOX Sports Digital http://ift.tt/1Ii4zhi
via IFTTT
I have a new follower on Twitter
Adam Greenberg
I do climate justice, human rights/soc justice, Olympics. SustainUS, @350Mass, @HuffingtonPost blogger. Youth delegate to UN climate negotiations
Globetrotter
Following: 5194 - Followers: 4789
June 03, 2015 at 03:58PM via Twitter http://twitter.com/Pragmactivist99
The Pirate Bay Co-Founder Released From Swedish Prison
from The Hacker News http://ift.tt/1cxSE0H
via IFTTT
Display duplicated separator divs as empty panes for anonymous users
from Google Alert - anonymous http://ift.tt/1JqOdSe
via IFTTT
ISS Daily Summary Report – 06/02/2015
from ISS On-Orbit Status Report http://ift.tt/1AKBp88
via IFTTT