Latest YouTube Video

Saturday, April 23, 2016

Orioles Video: Chris Davis crushes a solo shot to deep left field for his 6th homer of the season in 8-3 win vs. Royals (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

​DARPA Wants To Build Ultra Secure Messaging App for US Military

Just last month, DARPA launched a project dubbed "Improv," inviting hackers to transform simple household appliances into deadly weapons. Now, the Defense Advanced Research Projects Agency is finding someone in the private sector to develop a hacker-proof "secure messaging and transaction platform" for the U.S. military. Darpa wants researchers to create a secure messaging and transaction


from The Hacker News http://ift.tt/1YNOlkt
via IFTTT

Anonymous

Anonymous. The lady is 51 years old. She is a hardworking person and entrepreneur who has worked from an early age, which prevented her from ...

from Google Alert - anonymous http://ift.tt/22XgOoS
via IFTTT

Orioles: P Yovani Gallardo (right shoulder bicep tendonitis) placed on 15-day DL; P Brian Matusz activated from DL (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Bank with No Firewall. That's How Hackers Managed to Steal $80 Million

In Brief Investigators from the Forensic Training Institute of the Bangladesh investigated the $80 Million bank heist and discovered that the hackers managed to gain access to the network because the Bank was using second-hand $10 network switches without a Firewall to run its network. When it was reported last month that an unknown hacking group attempted to steal $1 Billion from


from The Hacker News http://ift.tt/1YMrTIk
via IFTTT

Luohan #2 =. anonymous artist - Picture of Royal Ontario Museum, Toronto

Royal Ontario Museum, Toronto Picture: Luohan #2 =. anonymous artist - Check out TripAdvisor members' 39372 candid photos and videos.

from Google Alert - anonymous http://ift.tt/1SAoECc
via IFTTT

NGC 7635: The Bubble Nebula


Blown by the wind from a massive star, this interstellar apparition has a surprisingly familiar shape. Cataloged as NGC 7635, it is also known simply as The Bubble Nebula. Although it looks delicate, the 7 light-year diameter bubble offers evidence of violent processes at work. Above and left of the Bubble's center is a hot, O-type star, several hundred thousand times more luminous and around 45 times more massive than the Sun. A fierce stellar wind and intense radiation from that star has blasted out the structure of glowing gas against denser material in a surrounding molecular cloud. The intriguing Bubble Nebula and associated cloud complex lie a mere 7,100 light-years away toward the boastful constellation Cassiopeia. This sharp, tantalizing view of the cosmic bubble is a composite of Hubble Space Telescope image data from 2016, released to celebrate the 26th anniversary of Hubble's launch. via NASA http://ift.tt/1WK50qB

Friday, April 22, 2016

I have a new follower on Twitter


Will Corry
Will Corry. Ex MD of Thomson Publications and Trade Fairs and Promotions, South Africa. Now his pride and joy - theMarketingblog in the UK
Englefield Green, UK
https://t.co/Swelrn2rVV
Following: 5924 - Followers: 8330

April 22, 2016 at 09:16PM via Twitter http://twitter.com/slievemore

I have a new follower on Twitter


3degreeZ Marketing
We fill up your Sales Funnel!
Fort Lauderdale, FL
https://t.co/5VR9RODfTJ
Following: 3330 - Followers: 3778

April 22, 2016 at 09:16PM via Twitter http://twitter.com/3degreezM

Lead Generation for Anonymous News/Secrets/Gossip app

We're launching an anonymous app that lets people break stories, secrets, etc. Right now it's not available in the app store, so we're looking for quality ...

from Google Alert - anonymous http://ift.tt/1U9br5K
via IFTTT

Hacker Installed a Secret Backdoor On Facebook Server to Steal Passwords

How to Hack Facebook? That’s the most commonly asked question during this decade. It’s a hacker dream to hack Facebook website for earning bug bounty or for any malicious purpose. Facebook security team recently found that someone, probably a blackhat hacker with malicious intent, has breached into its server and installed a backdoor that was stealing Facebook employee's login credentials


from The Hacker News http://ift.tt/1WL2Mad
via IFTTT

More than 1 million People now access Facebook Over Tor Network

In Brief Facebook has hit another Milestone: More than 1 MILLION people, or you can say privacy conscious, are accessing Facebook over TOR. Facebook proudly announced today that, this month, for the first time, the people connected to the anonymous version of Facebook that's accessible only through the TOR anonymity network exceeded 1 Million – an increase of almost 100% in the past ten


from The Hacker News http://ift.tt/1WKJz8R
via IFTTT

Unable to enable anonymous logins with Business Glossary Anywhere version 11.3

Provide the username and password of Anonymous user in the place of <user_name> and <password> respectively. If LDAP is configured, the user ...

from Google Alert - anonymous http://ift.tt/214GXmk
via IFTTT

This anonymous Twitter account keeps leaking the NFL's biggest news

... make as much hay as possible with the announcement of its 2016 regular season schedule. Then an anonymous Twitter user beat them to the punch.

from Google Alert - anonymous http://ift.tt/1YKQzRB
via IFTTT

Sony PlayStation Network to Get Two-Factor Authentication

In Brief: Sony is finally bolstering the security of the PlayStation Network by adding Two-Factor Authentication to the servers — almost five years after a massive hack that exposed data of over 77 Million users. Sony confirmed to Polygon today that it is planning to introduce two-factor verification to its PlayStation Network widely soon after a Twitter user saw a reference to it in the


from The Hacker News http://ift.tt/1XMtuxv
via IFTTT

ISS Daily Summary Report 04/21/16

Genes in Space: The crew completed the second of four planned sessions of the Genes in Space experiment by retrieving the miniPCR sample tubes from the Glacier and processing the samples in the miniPCR.  Data will be transferred to a Space Station Computer (SSC) for downlink to the ground. The Genes in Space investigation is a winning student-designed experiment to test whether the polymerase chain reaction (PCR) can be used to study deoxyribonucleic acid (DNA) alterations aboard the ISS.  Spaceflight causes many changes to the human body, including alterations in DNA and a weakened immune system. Understanding whether these two processes are linked is important for safeguarding crew health, but DNA technology that can track these changes is relatively untested in space. Energy: The crew set up the Pulmonary Function System (PFS) hardware and the Armband Activity Monitor to support the European Space Agency (ESA) Energy experiment. The PFS will be used to conduct 4 metabolic measurement sessions and the Armband Activity Monitor will be used during the 10-day experiment run to monitor activities and assess energy expenditures. The investigation assesses energy requirements of astronauts on long-duration missions. This is important for future planning of longer-duration missions to the Moon and Mars.  JAXA Small Satellite Orbital Deployer MICROSAT (JSSOD-M1) Installation: In preparation for upcoming JSSOD-M1 deployment currently planned for April 27, the crew installed the JSSOD-M1 onto Multi-Purpose Experiment Platform (MPEP) and the Japanese Experiment Module (JEM) Airlock (AL) slide table.  The slide table was then retracted and the inner hatch closed, making the airlock ready for deployment activities.  J-SSOD provides a safe, small satellite launching capability to the ISS as well as containment and deployment mechanisms for several individual small satellites. MAGVECTOR: Crewmembers configured the portable power supply and connected the universal serial bus (USB) jump drive to the MAGVECTOR in preparation for automatic data transfer that began immediately after activation. MAGVECTOR investigates how Earth’s magnetic field interacts with an electrical conductor. Using extremely sensitive magnetic sensors placed around and above a conductor, researchers can gain insight into ways that the magnetic field influences how conductors work. This research not only helps improve future ISS experiments and electrical experiments, but it could offer insights into how magnetic fields influence electrical conductors in general, the backbone of our technology.  Sprint Portable Pulmonary Function System (PFS) Setup: In preparation for tomorrow’s Sprint VO2 operations, the crew set up the Portable PFS power, data, front panel, and gas connections and configured the Portable PFS Mixing Bag System (MBS).  Sprint VO2 is a test that measures oxygen uptake, ventilatory threshold, and other physiological parameters for evaluation of Sprint exercise prescription. It evaluates the use of high intensity, low volume exercise training to minimize loss of muscle, bone, and cardiovascular function in ISS crew members during long-duration missions.  Fluid Shifts: Fluid Shifts operations continue today with the crew conducting body sample collections and stowing the samples in the Minus Eighty Laboratory Freezer for ISS (MELFI).  Fluid Shifts measures how much fluid shifts from the lower body to the upper body, in or out of cells and blood vessels, and determines the impact these shifts have on fluid pressure in the head, changes in vision and eye structures.  Lab Carbon Dioxide Removal Assembly (CDRA) Air Selector Valve (ASV) 104 Remove & Replace (R&R): From January 21 to February 4, 2016, the Lab CDRA valve 104 failed to reach its commanded position on numerous occasions. Data indicates that the valve stalled in the intermediate position and repeatedly had slow transition times as well as frequent position dropouts resulting in CDRA shutdowns. Today the crew R&Rd the valve with one of two spares available on orbit and ground teams successfully commanded to the valve. The CDRA has been activated for a 24-hour checkout period.  Robotics Operations: Yesterday Robotics ground controllers successfully performed a FMS (Force Moment Sensor) characterization on LEE B, then picked up the Special Purpose Dexterous Manipulator (SPDM) to prepare for the HTV-6 battery get-ahead tasks to break torque and retorque bolts on S4 batteries that are planned for replacement with Lithium Ion batteries.  When ORU Tool Changeout Mechanism 1 (OTCM #1) attempted to grasp the Robotic Offset Tool (ROST) to set up for the get-aheads, the OTCM stopped short of the expected gripper close range and was not able to perform the grasp.  A second attempt was unsuccessful.  The remainder of robotic operations for the day were postponed. Teams are meeting to discuss the anomaly and a forward plan. Nitrogen/Oxygen Recharge System (NORS) O2 Repress: Today the first O2 repress of the ISS cabin atmosphere was performed using O2 from the NORS tank. When the NORS tank is empty, it will be returned to ground for reflight. Today’s Planned Activities All activities were completed unless otherwise noted. FLUID SHIFTS. Saliva Test FLUID SHIFTS. MELFI Urine Sample Insertion FLUID SHIFTS. Urine Sample Collection FLUID SHIFTS. MELFI Urine Sample Insertion FLUID SHIFTS. Basic blood values Fluid Shifts Blood Collection, Operator FLUID SHIFTS Refrigerated Centrifuge Configuration FLUID SHIFTS. Water Collection from the Galley and taking radioisotope marker FLUID SHIFTS. Conclude spin FLUID SHIFTS. MELFI Urine Sample Insertion Genes in Space (GIS). Maintenance Work Area preparation for Payload use СОЖ Maintenance JEMAL Slide Table extension COSMOCARD. Closeout Ops / r/g 2013 ESA Weekly Crew Conference Genes in Space (GIS). Sample Retrieval XF305. Camcorder Setup Genes in Space (GIS). Sample Processing SSOD. Multi-Purpose Experiment Platform Installation Water transfer from Progress 432 (Aft) Rodnik H2O Tank 1 to EDV r/g 2027 KUBUK 5 Fan Status Check FLUID SHIFTS. Urine Sample Collection KUBUK 5 Fan Status Check, Calldown SPHEROIDS. Copy Temperature and Centrifuge Data UDOD. Experiment Ops with DYKNANIYE-1 and SPRUT-2 Sets r/g 2022 FLUID SHIFTS. MELFI Urine Sample Insertion FSL Optical Adapter Cable installation to O2 Second video line Portable Power Supply 1 (PPS1) Configuration for MagVector JEM System Laptop Terminal Reboot Connecting USB jump drive to MagVector DRAGON  Transfers FLUID SHIFTS. 3-hour blood collection Fluid Shifts Blood Collection, Operator FLUID SHIFTS. 3-hour saliva collection FLUID SHIFTS Refrigerated Centrifuge Configuration FLUID […]

from ISS On-Orbit Status Report http://ift.tt/1Wh5FPD
via IFTTT

I have a new follower on Twitter


Joy Lierman
Psychology and English student | Tree Hugger | Madridista


Following: 191 - Followers: 98

April 22, 2016 at 08:03AM via Twitter http://twitter.com/Joy207890

[FD] SEC Consult SA-20160422-1 :: Multiple vulnerabilities in Digitalstrom Konfigurator

SEC Consult Vulnerability Lab Security Advisory < publishing date 20160422-1 > ======================================================================= title: Multiple vulnerabilities in Digitalstrom Konfigurator product: Digitalstrom Konfigurator vulnerable version: 1.10.0 fixed version: 1.10.4 CVE number: - impact: High homepage: http://ift.tt/13oWa5O found: 2015-10-01 by: W. Schober (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Berlin - Frankfurt/Main - Montreal - Singapore Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

[FD] SEC Consult SA-20160422-0 :: Insecure credential storage in my devolo Android app

SEC Consult Vulnerability Lab Security Advisory < 20160422-0 > ======================================================================= title: Insecure data storage product: my devolo - android application - air.de.devolo.my.devolo vulnerable version: 1.2.8 fixed version: CVE number: impact: High homepage: http://www.devolo.com/ found: 2015-10-30 by: A. Nochvay (Office Moscow) SEC Consult Vulnerability Lab An integrated part of SEC Consult Berlin - Frankfurt/Main - Montreal - Moscow Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

FBI paid Hacker $1.3 Million to Unlock San Bernardino Shooter's iPhone

In Brief Guess how much the FBI has paid an unknown grey-hat hacker to break into San Bernardino Shooter's iPhone? FBI Director James Comey hinted during an interview that the FBI spent more than $1.3 Million for breaking into the iPhone of a suspected terrorist and found nothing useful on it. Apple's legal battle with the Federal Bureau of Investigation (FBI) ended following the bureau's


from The Hacker News http://ift.tt/26iTs1G
via IFTTT

Permission Setting for Anonymous User doesn't work

On the setting of DWQA, even if I turn off (disable) the Viewing Permission for Anonymous User, the setting is reset again. Therefore, anyone ...

from Google Alert - anonymous http://ift.tt/1r3lA8P
via IFTTT

The Anonymous De Rebus Bellicis and the Ethics of Empire in Late Antiquity

anonymous fourth-century treatise preserved under the title De Rebus. Bellicis (On Military Affairs).1 Not only the pamphlet's date and authorship.

from Google Alert - anonymous http://ift.tt/246s3hh
via IFTTT

The Comet the Owl and the Galaxy


Comet C/2014 S2 (PanSTARRS) poses for a Messier moment in this telescopic snapshot from April 18. In fact it shares the 1.5 degree wide field-of-view with two well-known entries in the 18th century comet-hunting astronomer's famous catalog. Outward bound and sweeping through northern skies just below the Big Dipper, the fading visitor to the inner Solar System was about 18 light-minutes from our fair planet. Dusty, edge-on spiral galaxy Messier 108 (upper right) is more like 45 million light-years away. A planetary nebula with an aging but intensely hot central star, the owlish Messier 97 is only about 12 thousand light-years distant though, still well within our own Milky Way galaxy. Astronomers expect the orbit of this comet PanSTARRS to return it to the inner Solar System around the year 4226. via NASA http://ift.tt/1pkHliR

Thursday, April 21, 2016

Task scheduling system for UAV operations in indoor environment. (arXiv:1604.06223v1 [cs.AI])

Application of UAV in indoor environment is emerging nowadays due to the advancements in technology. UAV brings more space-flexibility in an occupied or hardly-accessible indoor environment, e.g., shop floor of manufacturing industry, greenhouse, nuclear powerplant. UAV helps in creating an autonomous manufacturing system by executing tasks with less human intervention in time-efficient manner. Consequently, a scheduler is one essential component to be focused on; yet the number of reported studies on UAV scheduling has been minimal. This work proposes a methodology with a heuristic (based on Earliest Available Time algorithm) which assigns tasks to UAVs with an objective of minimizing the makespan. In addition, a quick response towards uncertain events and a quick creation of new high-quality feasible schedule are needed. Hence, the proposed heuristic is incorporated with Particle Swarm Optimization (PSO) algorithm to find a quick near optimal schedule. This proposed methodology is implemented into a scheduler and tested on a few scales of datasets generated based on a real flight demonstration. Performance evaluation of scheduler is discussed in detail and the best solution obtained from a selected set of parameters is reported.



from cs.AI updates on arXiv.org http://ift.tt/1U7QEPT
via IFTTT

A Deliberation Procedure for Judgment Aggregation Problems. (arXiv:1604.06356v1 [cs.AI])

Judgment aggregation problems are a class of collective decision-making problems represented in an abstract way, subsuming some well known collective decision-making problems such voting problems. A collective decision can be reached either by aggregation of individual decisions or by deliberation -- allowing each decision-maker to change their individual decision in response to the individual decisions the other decision-makers made in the previous step. Impossibility results exist for judgment aggregation operators, voting operators, and judgment deliberation operators. However, while specific aggregation operators were constructed for aggregation of judgments and votes, deliberation procedures have only been studied for voting problems. Here we propose a deliberation procedure for judgment aggregation, based on movements in an undirected graph, and we study for which instances it produces a consensus. We also compare the computational complexity of our deliberation procedure with that of related judgment aggregation operators.



from cs.AI updates on arXiv.org http://ift.tt/1YJEOuu
via IFTTT

Computing rational decisions in extensive games with limited foresight. (arXiv:1502.03683v5 [cs.AI] UPDATED)

We introduce a class of extensive form games where players might not be able to foresee the possible consequences of their decisions and form a model of their opponents which they exploit to achieve a more profitable outcome. We improve upon existing models of games with limited foresight, endowing players with the ability of higher-order reasoning and proposing a novel solution concept to address intuitions coming from real game play. We analyse the resulting equilibria, devising an effective procedure to compute them.



from cs.AI updates on arXiv.org http://ift.tt/1D1Dwnu
via IFTTT

Norm Monitoring under Partial Action Observability. (arXiv:1505.03996v2 [cs.MA] UPDATED)

In the context of using norms for controlling multi-agent systems, a vitally important question that has not yet been addressed in the literature is the development of mechanisms for monitoring norm compliance under partial action observability. This paper proposes the reconstruction of unobserved actions to tackle this problem. In particular, we formalise the problem of reconstructing unobserved actions, and propose an information model and algorithms for monitoring norms under partial action observability using two different processes for reconstructing unobserved actions. Our evaluation shows that reconstructing unobserved actions increases significantly the number of norm violations and fulfilments detected.



from cs.AI updates on arXiv.org http://ift.tt/1FscsjI
via IFTTT

Orioles: 3B Manny Machado should be in the conversation for best player in baseball with Mike Trout Bryce Harper - Matz (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Alcoholics Anonymous: Family

Alcoholics Anonymous: Work · Alcoholics Anonymous: The Crash Cooler. Alcoholics Anonymous: Jack Daniel&#039;s. Alcoholics Anonymous: Jack ...

from Google Alert - anonymous http://ift.tt/1SwXTP5
via IFTTT

Ravens: N.D. OT Ronnie Stanley goes 6th in Todd McShay's Mock Draft 5.0; Jamison Hensley says it \"comes as a surprise\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[FD] CVE-2016-3074: libgd: signedness vulnerability

Overview ======== libgd [1] is an open-source image library. It is perhaps primarily used by the PHP project. It has been bundled with the default installation of PHP since version 4.3 [2]. A signedness vulnerability (CVE-2016-3074) exist in libgd 2.1.1 which may result in a heap overflow when processing compressed gd2 data. Details ======= 4 bytes representing the chunk index size is stored in a signed integer, chunkIdx[i].size, by `gdGetInt()' during the parsing of GD2 headers: libgd-2.1.1/src/gd_gd2.c: ,-

Source: Gmail -> IFTTT-> Blogger

how to moderate topic for anonymous users

so what? the page is empty :/. i need to be able to set up a list of wp users to be the admin/moderators of the forum i need to be able to make them ...

from Google Alert - anonymous http://ift.tt/1YJfrsZ
via IFTTT

user.role.anonymous.yml

core/modules/user/config/install/user.role.anonymous.yml. 3 string references to 'user.role.anonymous'. AccessRoleTest::testAccessRole in ...

from Google Alert - anonymous http://ift.tt/1SyzaNu
via IFTTT

Encrypted Smartphone Network Seized by Dutch Police for Criminal Investigation

On Tuesday, the Dutch Police arrested a 36-year-old man, Danny Manupassa, on suspicion of money laundering and involvement in selling encrypted smartphones to criminals. Manupassa owns a company called Ennetcom, which provides customized Blackberry Phones with the secure PGP-encrypted network. Reportedly, Ennetcom sold nearly 19,000 encrypted cell phones at 1500 euros each in last few years.


from The Hacker News http://ift.tt/1MKPg4e
via IFTTT

[FD] Wordpress iThemes Security (Better WP Security) Insecure Backup/Logfile Generation (access rights)

Wordpress iThemes Security (Better WP Security) Insecure Backup/Logfile Generation (access rights) ================================================================================================== Description =========== A vulnerability has been found in iThemes Security backup function that may allow attackers to gain access to backup/log files. By default, when using the "database backup on filesystem" feature, iThemes Security saves the backup files in a world-readable directory : wp-content/uploads/ithemes-security/backups The .htaccess file is generated during the plugin initial setup/update, only if the wp-content/uploads/ithemes-security/backups exists (or wp-content/uploads/ithemes-security/logs). Note that it does *NOT* exists by default. When running a backup, the ITSEC_Backup class creates the directory but *without* any .htaccess file inside. The same thing happens with log saving. If the webserver has directory listing enabled, then anybody can download the complete database backup or view the log files. **Access Vector**: remote **Security Risk**: high **Vulnerability**: CWE-219 **CVSS Base Score**: 7.5

Source: Gmail -> IFTTT-> Blogger

[FD] Time-based SQL Injection in Admin panel ImpressCMS <= v1.3.9

============================================= MGC ALERT 2016-002 - Original release date: April 8, 2016 - Last revised: April 21, 2016 - Discovered by: Manuel García Cárdenas - Severity: 7,1/10 (CVSS Base Score) ============================================= I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

Alcoholics Anonymous: Friends

Alcoholics Anonymous: Family · Alcoholics Anonymous: The Crash Cooler. Alcoholics Anonymous: Jack Daniel&#039;s. Alcoholics Anonymous: Jack ...

from Google Alert - anonymous http://ift.tt/1SmSS9s
via IFTTT

moderation anonymous frontend

Topic Tag: moderation anonymous frontend. Topic; Voices; Replies; Last Post. how to moderate topic for anonymous users. Started by: MGDel in: ...

from Google Alert - anonymous http://ift.tt/1rpN5tz
via IFTTT

'Anonymous' Weeden Focuses on Blocks

Commission Management Program · Prime Brokerage. 'Anonymous' Weeden Focuses on Blocks. Home 'Anonymous' Weeden Focuses on Blocks ...

from Google Alert - anonymous http://ift.tt/1SmSRT7
via IFTTT

ISS Daily Summary Report 04/20/16

SPHEROIDS: The crew completed a data transfer from KUBIK 6 to the European Drawer Rack (EDR) laptop following an automated experiment run. This experiment investigates the effects of microgravity on endothelial cell function with respect to blood vessel formation, cellular proliferation, and programmed cell death. Results could help in the development of potential countermeasures to prevent cardiovascular deconditioning in astronauts and improve knowledge of endothelial functions on Earth. Plant Gravity Sensing-3 Preparation: In preparation for upcoming Plant Gravity Sensing-3 operations, the crew set up the experiment laptop at Cell Biology Experiment Facility (CBEF), prepared the Seed Paper in a culture dish and placed the kit in the Minus Eighty Laboratory Freezer for ISS (MELFI).  The investigation studies whether plants grown in microgravity conditions can sense the changes in the gravitational acceleration, and the concentrations of calcium in plant cells changes. Gravity is a critical environmental factor affecting the morphology and functions of organisms on Earth.  Fluid Shifts: With remote guidance from ground teams, the crew performed Fluid Shifts operations by configuring the Refrigerated Centrifuge for sample load operations, conducting body sample collections and stowing the samples in the MELFI. Fluid Shifts is a joint USOS Russian experiment that measures how much fluid shifts from the lower body to the upper body, in or out of cells and blood vessels, and determines the impact these shifts have on fluid pressure in the head, changes in vision and eye structures.  Rodent Research 3 (RR-3) CASIS Injections: Crewmembers transferred animals to and from the Rodent Habitat and the Micro-Gravity Science Glovebox (MSG) and completed the first day of RR-3 operations. RR-3 studies molecular and physical changes in the musculoskeletal system that happen in space. Results expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth. Dose Tracker: The crew configured the Dose Tracker application and completed entries for medication tracking. The investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions. Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the International Space Station. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.  Mobile Servicing System (MSS) Operations:  This evening the Special Purpose Dexterous Manipulator (SPDM) will be unstowed from Mobile Base System (MBS) 2. A Force Moment Sensor (FMS) coarse characterization is planned after which Robotics teams will maneuver the Space Station Remote Manipulator System (SSRMS) to the starting location for tomorrow’s HTV5 Battery get-ahead tasks.  Today’s Planned Activities All activities were completed unless otherwise noted. FLUID SHIFTS Saliva Sample Collection FLUID SHIFTS. MELFI Urine Sample Insertion FLUID SHIFTS Urine Sample Collection FLUID SHIFTS. MELFI Urine Sample Insertion Optical Coherence Tomography (OCT) Setup FLUID SHIFTS Blood Collection FLUID SHIFTS Blood Collection, Operator FLUID SHIFTS Refrigerated Centrifuge Configuration FLUID SHIFTS Operation with Samples  SPHEROIDS. Copy Temperature and Centrifuge Data FLUID SHIFTS. Conclude spin HABIT Video of the Experiment FLUID SHIFTS. MELFI Urine Sample Insertion COSMOCARD. Closeout Ops / r/g 1988 OTKLIK. Equipment Check / r/g 1588 DOSETRK Survey Questionnaire Completion ISS RS System Power Panels ППС-26 and ППС-31 Plug-in Audit / r/g 2007 COSMOCARD. Setup. Starting 24-hr ECG Recording / r/g 2013 SPHEROIDS. Setting temperature to 6°C and report Optical Coherence Tomography (OCT) Eye Scan (Operator) Optical Coherence Tomography (OCT) Eye Scan (Subject) Replacement of fuse plugs ПВ-12Р (2) in БСКУ5-12 and fuses in the dismantled plug ПР-12Р.r/g 1999 Optical Coherence Tomography (OCT) Equipment Stowage MRM2 comm config to support the P/L Ops / Communications System Kulonovskiy Kristall Experiment Run. r/g 2014 FLUID SHIFTS Urine Sample Collection Test activation of Progress 431 Backup Set Of Klest-M TV system in proximity link mode in mated flight r/g 2015 FLUID SHIFTS. MELFI Urine Sample Insertion FLUID SHIFTS Blood Collection FLUID SHIFTS Blood Collection, Operator FLUID SHIFTS  Blood sample collection operator FLUID SHIFTS Refrigerated Centrifuge Configuration MRM2 Comm Reconfig for Nominal Ops FLUID SHIFTS. MELFI Urine Sample Insertion PILOT-T. Experiment Ops. r/g 2008 FAGEN. Fixation of samples from MCK No.6 and setup in SM. r/g 2009 FAGEN. Photography during fixation of samples / r/g 2010 FLUID SHIFTS. Conclude spin PILOT-T. Photography of the Experiment Ops / r/g 2016 FLUID SHIFTS. MELFI Urine Sample Insertion KULONOVSKIY KRISTALL. Copy and Downlink Data / r/g 2014 ENERGY. Crew Conference WRS Recycle Tank Fill FS Saliva Sample Collection FLUID SHIFTS. MELFI Urine Sample Insertion Rodent Research (RR)  Camcorder Setup PAO Hardware Setup HABIT Data Recording to iPad Crew Prep for PAO PAO Event FLUID SHIFTS Urine Sample Collection СОЖ Maintenance Life On The Station Photo and Video / r/g 2000 DOSETRK-PI Crew conference FLUID SHIFTS. MELFI Urine Sample Insertion SPHEROIDS. Temperature Check Rodent Research (RR)  Animal transfer to MSG and back Rodent Research (RR)  Performing injection ISS RS System Power Panels ППС-26 and ППС-31 Plug-in Audit / r/g 2007 Rodent Research (RR)  Retrieval from MELFI PGS3. Laptop setup Rodent Research (RR)  Animal transfer to MSG and back Plant Gravity Sensing 3 (PGS3) Plant Gathering PGS3 MELFI Retrieval  Rodent Research (RR) Performing injections PGS3 Sample Preparation MOTOCARD. Experiment Ops r/g 2011 PGS3 MELFI Sample Insertion MOTOCARD. Operator Assistance with the Experiment / r/g 2012 Verification of ИП-1 Flow Sensor Position / Pressure Control & Atmosphere Monitoring System Rodent Research (RR) – Animal transfer to MSG and back IMS Update […]

from ISS On-Orbit Status Report http://ift.tt/1QpHkQz
via IFTTT

Opera Browser Now Offers Free and Unlimited Built-in VPN Service

In Brief Opera becomes the first web browser to offer a built-in Free, unlimited and 256-bit encrypted VPN service for everyone. Opera's Free VPN protects unencrypted browser session from leaking on public WiFi networks and will also let unblock firewalls to improve privacy and security. Virtual Private Networks (VPNs) have become an important tool not just for large companies, but also


from The Hacker News http://ift.tt/1TkK6ey
via IFTTT

CMA Meeting Directory

CMA Meeting DirectoryCrystal Meth Anonymous is a fellowship of people who share their experience, strength and hope with each other, so they may ...

from Google Alert - anonymous http://ift.tt/20ZMRVZ
via IFTTT

Creators of SpyEye Virus Sentenced to 24 Years in Prison

In Brief Two International hackers, Aleksandr Andreevich Panin and Hamza Bendelladj, have been sentenced to a combined 24 years and 6 months in prison for their roles in developing and distributing SpyEye banking trojan, a powerful botnet similar to the infamous ZeuS malware. Both hackers were charged with stealing hundreds of millions of dollars from banking institutions worldwide.


from The Hacker News http://ift.tt/1pjR5tA
via IFTTT

Galaxy Einstein Ring


Can one galaxy hide behind another? Not in the case of SDP.81. Here the foreground galaxy, shown in blue in an image taken by the Hubble Space Telescope, acts like a huge gravitational lens, pulling light from a background galaxy, shown in red in an image taken in radio waves by the Atacama Large Millimeter Array (ALMA), around it, keeping it visible. The alignment is so precise that the distant galaxy is distorted into part of a ring around the foreground galaxy, a formation known as an Einstein ring. Detailed analysis of the gravitational lens distortions indicate that a small dark satellite galaxy participates in the deflections, bolstering indication that many satellite galaxies are quite dim and dominated by dark matter. That small galaxy is depicted by a small white dot on the left. Although spanning only a few arcseconds, the featured Einstein ring is really tens of thousands of light years across. via NASA http://ift.tt/1S9NY2Z

Wednesday, April 20, 2016

Orioles Video: Adam Jones lays out to make a diving catch robbing Jose Bautista of RBI in 4-3 victory vs. the Blue Jays (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

I have a new follower on Twitter


Cortney Sargent, Sr.
Proud father, husband, radio host, and entrepreneur. Founder/lead designer of Sargent Branding Firm. https://t.co/8gV7gxbwC9
Tupelo, MS
https://t.co/KXfU5mQdS2
Following: 1288 - Followers: 1529

April 20, 2016 at 08:49PM via Twitter http://twitter.com/cortneyssargent

Procedural urban environments for FPS games. (arXiv:1604.05791v1 [cs.AI])

This paper presents a novel approach to procedural generation of urban maps for First Person Shooter (FPS) games. A multi-agent evolutionary system is employed to place streets, buildings and other items inside the Unity3D game engine, resulting in playable video game levels. A computational agent is trained using machine learning techniques to capture the intent of the game designer as part of the multi-agent system, and to enable a semi-automated aesthetic selection for the underlying genetic algorithm.



from cs.AI updates on arXiv.org http://ift.tt/1Qoq527
via IFTTT

Estimating 3D Trajectories from 2D Projections via Disjunctive Factored Four-Way Conditional Restricted Boltzmann Machines. (arXiv:1604.05865v1 [cs.CV])

Estimation, recognition, and near-future prediction of 3D trajectories based on their two dimensional projections available from one camera source is an exceptionally difficult problem due to uncertainty in the trajectories and environment, high dimensionality of the specific trajectory states, lack of enough labeled data and so on. In this article, we propose a solution to solve this problem based on a novel deep learning model dubbed Disjunctive Factored Four-Way Conditional Restricted Boltzmann Machine (DFFW-CRBM). Our method improves state-of-the-art deep learning techniques for high dimensional time-series modeling by introducing a novel tensor factorization capable of driving forth order Boltzmann machines to considerably lower energy levels, at no computational costs. DFFW-CRBMs are capable of accurately estimating, recognizing, and performing near-future prediction of three-dimensional trajectories from their 2D projections while requiring limited amount of labeled data. We evaluate our method on both simulated and real-world data, showing its effectiveness in predicting and classifying complex ball trajectories and human activities.



from cs.AI updates on arXiv.org http://ift.tt/20YUmMT
via IFTTT

A Factorization Machine Framework for Testing Bigram Embeddings in Knowledgebase Completion. (arXiv:1604.05878v1 [cs.CL])

Embedding-based Knowledge Base Completion models have so far mostly combined distributed representations of individual entities or relations to compute truth scores of missing links. Facts can however also be represented using pairwise embeddings, i.e. embeddings for pairs of entities and relations. In this paper we explore such bigram embeddings with a flexible Factorization Machine model and several ablations from it. We investigate the relevance of various bigram types on the fb15k237 dataset and find relative improvements compared to a compositional model.



from cs.AI updates on arXiv.org http://ift.tt/1Qoq7aa
via IFTTT

Multiplayer Games for Learning Multirobot Coordination Algorithms. (arXiv:1604.05942v1 [cs.RO])

Humans have an impressive ability to solve complex coordination problems in a fully distributed manner. This ability, if learned as a set of distributed multirobot coordination strategies, can enable programming large groups of robots to collaborate towards complex coordination objectives in a way similar to humans. Such strategies would offer robustness, adaptability, fault-tolerance, and, importantly, distributed decision-making. To that end, we have designed a networked gaming platform to investigate human group behavior, specifically in solving complex collaborative coordinated tasks. Through this platform, we are able to limit the communication, sensing, and actuation capabilities provided to the players. With the aim of learning coordination algorithms for robots in mind, we define these capabilities to mimic those of a simple ground robot.



from cs.AI updates on arXiv.org http://ift.tt/1NCcHYs
via IFTTT

A topological insight into restricted Boltzmann machines. (arXiv:1604.05978v1 [cs.NE])

Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic features extraction, unsupervised weights initialization, but also as density estimators. Thus, their generative and discriminative capabilities, but also their computational time are instrumental to a wide range of applications. Our main contribution is to look at RBMs from a topological perspective, bringing insights from network science. Firstly, here we show that RBMs and Gaussian RBMs (GRBMs) are bipartite graphs which naturally have a small-world topology. Secondly, we demonstrate both on synthetic and real-world databases that by constraining RBMs and GRBMs to a scale-free topology (while still considering local neighborhoods and data distribution), we reduce the number of weights that need to be computed by a few orders of magnitude, at virtually no loss in generative performance. Thirdly, we show that, given the same number of weights, our proposed sparse models (which by design have a higher number of hidden neurons) achieve better generative capabilities than standard fully connected RBMs and GRBMs (which by design have a smaller number of hidden neurons) at no additional computational costs.



from cs.AI updates on arXiv.org http://ift.tt/1Sc5aoE
via IFTTT

Constructive Preference Elicitation by Setwise Max-margin Learning. (arXiv:1604.06020v1 [stat.ML])

In this paper we propose an approach to preference elicitation that is suitable to large configuration spaces beyond the reach of existing state-of-the-art approaches. Our setwise max-margin method can be viewed as a generalization of max-margin learning to sets, and can produce a set of "diverse" items that can be used to ask informative queries to the user. Moreover, the approach can encourage sparsity in the parameter space, in order to favor the assessment of utility towards combinations of weights that concentrate on just few features. We present a mixed integer linear programming formulation and show how our approach compares favourably with Bayesian preference elicitation alternatives and easily scales to realistic datasets.



from cs.AI updates on arXiv.org http://ift.tt/1Tk3Kr9
via IFTTT

Hierarchical Deep Reinforcement Learning: Integrating Temporal Abstraction and Intrinsic Motivation. (arXiv:1604.06057v1 [cs.LG])

Learning goal-directed behavior in environments with sparse feedback is a major challenge for reinforcement learning algorithms. The primary difficulty arises due to insufficient exploration, resulting in an agent being unable to learn robust value functions. Intrinsically motivated agents can explore new behavior for its own sake rather than to directly solve problems. Such intrinsic behaviors could eventually help the agent solve tasks posed by the environment. We present hierarchical-DQN (h-DQN), a framework to integrate hierarchical value functions, operating at different temporal scales, with intrinsically motivated deep reinforcement learning. A top-level value function learns a policy over intrinsic goals, and a lower-level function learns a policy over atomic actions to satisfy the given goals. h-DQN allows for flexible goal specifications, such as functions over entities and relations. This provides an efficient space for exploration in complicated environments. We demonstrate the strength of our approach on two problems with very sparse, delayed feedback: (1) a complex discrete MDP with stochastic transitions, and (2) the classic ATARI game `Montezuma's Revenge'.



from cs.AI updates on arXiv.org http://ift.tt/1Qoq3Yd
via IFTTT

Question Answering via Integer Programming over Semi-Structured Knowledge. (arXiv:1604.06076v1 [cs.AI])

Answering science questions posed in natural language is an important AI challenge. Answering such questions often requires non-trivial inference and knowledge that goes beyond factoid retrieval. Yet, most systems for this task are based on relatively shallow Information Retrieval (IR) and statistical correlation techniques operating on large unstructured corpora. We propose a structured inference system for this task, formulated as an Integer Linear Program (ILP), that answers natural language questions using a semi-structured knowledge base derived from text, including questions requiring multi-step inference and a combination of multiple facts. On a dataset of real, unseen science questions, our system significantly outperforms (+14%) the best previous attempt at structured reasoning for this task, which used Markov Logic Networks (MLNs). It also improves upon a previous ILP formulation by 17.7%. When combined with unstructured inference methods, the ILP system significantly boosts overall performance (+10%). Finally, we show our approach is substantially more robust to a simple answer perturbation compared to statistical correlation methods.



from cs.AI updates on arXiv.org http://ift.tt/23KxANJ
via IFTTT

The Backtracking Survey Propagation Algorithm for Solving Random K-SAT Problems. (arXiv:1508.05117v3 [cs.CC] UPDATED)

Satisfiability of large random Boolean formulas with K variables per clause (random K-satisfiability) is a fundamental problem in combinatorial discrete optimization. Here we study random K -satisfiability for K = 3, 4 by the Backtracking Survey Propagation (BSP) algorithm, which is able to find, in a time almost linear in the problem size, solutions within a region never reached before: for K = 3 the algorithmic threshold practically coincides with the SAT-UNSAT threshold, while for K=4 it extrapolates beyond the rigidity threshold, where most of the solutions acquire a positive density of frozen variables. All solutions found by BSP have no frozen variables, thus supporting the conjecture that only unfrozen solutions can be found in linear time. The iterative algorithm for determining which variables are frozen in a solution (whitening) reaches the all-variables-unfrozen fixed point following a two step process and has a relaxation time diverging at the algorithmic threshold.



from cs.AI updates on arXiv.org http://ift.tt/1I5Y6A4
via IFTTT

Format Manuscripts/Mixed Material

Results: 1-3 of 3 | Refined by: Original Format: Manuscripts/Mixed Material Remove Look Inside: Anonymous to Andrew Jackson, July 20, 1836 ...

from Google Alert - anonymous http://ift.tt/242exLK
via IFTTT

[FD] Lock Browser 5.3 (Browser Security Open Source Python)

SUMMARY This open source tool strictly controls what web browser can access, which stops web browser from loading harmful content - Phishing, Non-Secure HTTP, or whatever that's not in your whitelist. SITUATION "Security flaws in Google Chrome, Microsoft Edge, and Apple Safari were all successfully exploited... browsers as well as Windows, OS X, and Flash" http://ift.tt/1LvqXqt ATTACK Attacks have to make target's browser load attacker's website, which has two scenarios - send the link(phishing), or control a website that target will visit. The latter is difficult because web servers are usually(not always) much more secure than web browsers, and attackers simply don't know which websites. The former, Phishing, is "mainstream", because it's a lot easier: the address of email sender can be faked, the content of email can look 100% legitimate and compelling, and the URL can hide behind redirection service("dereferer" of email system, t.co, or whatever). SOLUTION Whitelist - for example, the whitelist contains Gmail, PayPal, Chase, GitHub, and Twitter. Attacker's website is not in the whitelist, so the harmful content does not reach browser, even if some users are "stupid enough" to click links from The Phishing Guy. URLs Project Home Page: http://ift.tt/1rlzC5S Source Code: http://ift.tt/1SleYZW HISTORY It's fork of HTTPS Only released in March: http://ift.tt/1LGFzTX And this is likely the last version - because the source code is so short and simple, maybe there is really no bug here! Let me hope so. Kind Regards,

Source: Gmail -> IFTTT-> Blogger

[FD] [ERPSCAN-16-005] SAP HANA hdbxsengine JSON DoS vulnerability

Application: SAP HANA Versions Affected: SAP HANA Vendor URL: http://SAP.com Bugs: DoS Sent: 28.09.2015 Reported: 28.09.2015 Vendor response: 29.09.2015 Date of Public Advisory: 12.01.2016 Reference: SAP Security Note 2241978 Author: Mathieu Geli (ERPScan) Description 1. ADVISORY INFORMATION Title: SAP NetWeaver J2EE Engine 7.40 Advisory ID: [ERPSCAN-16-005] Risk: Medium Advisory URL: http://ift.tt/1QnGTtn Date published: 12.01.2016 Vendors contacted: SAP 2. VULNERABILITY INFORMATION Class: DoS Impact: Resource consumption Remotely Exploitable: Yes Locally Exploitable: No CVSS Information CVSS Base Score: 5.0 / 10 CVSS Base Vector: AV : Access Vector (Related exploit range) Network (N) AC : Access Complexity (Required attack complexity) Low (L) Au : Authentication (Level of authentication needed to exploit) None (N) C : Impact to Confidentiality None (N) I : Impact to Integrity Partial (P) A : Impact to Availability None (N) 3. VULNERABILITY DESCRIPTION Anonymous attacker can use a special HTTP request to perform a DoS attack against HANA. 4. VULNERABLE PACKAGES SAP HANA revision 102.02 Other versions are probably affected too, but they were not checked. 5. SOLUTIONS AND WORKAROUNDS To correct this vulnerability, install SAP Security Note 2241978 6. AUTHOR Mathieu Geli (ERPScan) 7. TECHNICAL DESCRIPTION An attacker can use a Buffer Overflow vulnerability to inject a specially crafted code into working memory. The code will be executed by the vulnerable application. Executed commands will run with the same privileges as the service that executed them. This can lead to taking complete control over the application, denial of service, command execution, and other attacks. 8. REPORT TIMELINE Sent: 28.09.2015 Reported: 28.09.2015 Vendor response: 29.09.2015 Date of Public Advisory: 12.01.2016 9. REFERENCES http://ift.tt/1QnGTtn 10. ABOUT ERPScan Research The company’s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for discovering more than 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to have exposed new types of vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated for the best server-side vulnerability at BlackHat 2013. ERPScan experts have been invited to speak, present, and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB, and private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS-SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award-winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and featured in specialized info-sec publications worldwide. These include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise, and Chinabyte, to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct the best SAP security research. 11. ABOUT ERPScan ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud. Usually our clients are large enterprises, Fortune 2000 companies and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. We ‘follow the sun’ and function in two hubs, located in the Palo Alto and Amsterdam to provide threat intelligence services, agile support and operate local offices and partner network spanning 20+ countries around the globe. Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 Phone: 650.798.5255 Twitter: @erpscan Scoop-it: Business Application Security

Source: Gmail -> IFTTT-> Blogger

[FD] [ERPSCAN-16-004] SAP NetWeaver 7.4 (Pmitest servlet) XSS vulnerability

Application: SAP NetWeaver Versions Affected: SAP NetWeaver J2EE Engine 7.40 Vendor URL: http://SAP.com Bugs: Cross-Site Scripting Sent: 01.09.2015 Reported: 01.09.2015 Vendor response: 02.09.2015 Date of Public Advisory: 12.01.2016 Reference: SAP Security Note 2234918 Author: Vahagn Vardanyan (ERPScan) Description 1. ADVISORY INFORMATION Title: SAP NetWeaver J2EE Engine 7.40 Advisory ID: [ERPSCAN-16-004] Risk: Medium Advisory URL: http://ift.tt/23nE6aG Date published: 12.01.2016 Vendors contacted: SAP 2. VULNERABILITY INFORMATION Class: Cross-Site Scripting, XSS [CWE-79] Impact: information disclosure Remotely Exploitable: Yes Locally Exploitable: No CVSS Information CVSS Base Score: 4.3 / 10 CVSS Base Vector: AV : Access Vector (Related exploit range) Network (N) AC : Access Complexity (Required attack complexity)Medium (M) Au : Authentication (Level of authentication needed to exploit) None (N) C : Impact to Confidentiality None (N) I : Impact to Integrity Partial (P) A : Impact to AvailabilityNone (N) 3. VULNERABILITY DESCRIPTION Anonymous attacker can use a special HTTP request to hijack session data of administrators or users of the web resource. 4. VULNERABLE PACKAGES SAP NetWeaver J2EE Engine 7.40 Other versions are probably affected too, but they were not checked. 5. SOLUTIONS AND WORKAROUNDS To correct this vulnerability, install SAP Security Note 2234918 6. AUTHOR Vahagn Vardanyan (ERPScan) 7. TECHNICAL DESCRIPTION PMI can be abused by attackers allowing them to modify displayed application content without authorization and to potentially obtain authentication information of other legitimate users. 8. REPORT TIMELINE Sent: 01.09.2015 Reported: 01.09.2015 Vendor response: 02.09.2015 Date of Public Advisory: 12.01.2016 9. REFERENCES http://ift.tt/23nE6aG 10. ABOUT ERPScan Research The company’s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for discovering more than 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to have exposed new types of vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be nominated for the best server-side vulnerability at BlackHat 2013. ERPScan experts have been invited to speak, present, and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB, and private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS-SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award-winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and featured in specialized info-sec publications worldwide. These include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise, and Chinabyte, to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct the best SAP security research. 11. ABOUT ERPScan ERPScan is the most respected and credible Business Application Security provider. Founded in 2010, the company operates globally and enables large Oil and Gas, Financial and Retail organizations to secure their mission-critical processes. Named as an ‘Emerging Vendor’ in Security by CRN, listed among “TOP 100 SAP Solution providers” and distinguished by 30+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan’s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure SAP and Oracle ERP systems and business-critical applications from both, cyber-attacks as well as internal fraud. Usually our clients are large enterprises, Fortune 2000 companies and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. We ‘follow the sun’ and function in two hubs, located in the Palo Alto and Amsterdam to provide threat intelligence services, agile support and operate local offices and partner network spanning 20+ countries around the globe. Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 Phone: 650.798.5255 Twitter: @erpscan Scoop-it: Business Application Security

Source: Gmail -> IFTTT-> Blogger

[FD] Executable installers are vulnerableWEVIL (case 33): GData's installers allow escalation of privilege

Orioles: P Ubaldo Jimenez dominates Blue Jays' Big 3 mashers holding them to a .127 lifetime batting average - Crasnick (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Researcher releases Free Ransomware Detection Tool for Mac OS X Users

In Brief: Introducing RansomWhere, a free generic ransomware detection tool for Mac OS X users that can identify ransomware-like behavior by continually monitoring the file-system for the creation of encrypted files by suspicious processes. This ransomware detection tool helps to block the suspicious processes and waits for the user to decide whether to allow or stop the process.


from The Hacker News http://ift.tt/1XJ0FSE
via IFTTT

'We no nothing about that letter' says anonymous Oakbay employee

Frustrated anonymous caller, who says she is an employee at Oakbay Investments says she doesn't know anything about the open letter written to ...

from Google Alert - anonymous http://ift.tt/20XPnfl
via IFTTT

Anonymous Register Link not showing in Login Block

Anonymous users cannot create new accounts because the link does not show in the Login Screen. I enabled Visitors here: Configuration > People ...

from Google Alert - anonymous http://ift.tt/1SvKDgK
via IFTTT

Virtual Special Issues: Aerospace & Astrobiology Top Cited Articles

The Elsevier’s Aerospace & Astrobiology multidisciplinary team has put together this “virtual” special issue, which consists of the top two most highly cited articles (publication dates 2013-2015) from Elsevier’s Aerospace, Earth & Planetary Sciences collections.



from Icarus http://ift.tt/1SvtHae
via IFTTT

ISS Daily Summary Report 04/19/16

Genes in Space: The Genes in Space experiment began this morning with retrieval of the miniPCR sample tubes from the Glacier and hardware setup in the maintenance work area (MWA). Sample processing was performed and data was downlinked. The Genes in Space investigation is a winning student-designed experiment to test whether the polymerase chain reaction (PCR) can be used to study DNA alterations aboard the ISS.  Spaceflight causes changes to the human body including alterations in DNA and a weakened immune system. Understanding whether these two processes are linked is important for safeguarding crew health but DNA technology that can track these changes is relatively untested in space. Rodent Research 3 CASIS Injection Review: In preparation for upcoming RR-3 operations, crewmembers reviewed the Standalone Subcutaneous Injection material, discussed operations with the payload developer, and gathered hardware in preparation for the injection session this week.  RR-3 studies molecular and physical changes in the musculoskeletal system that happen in space. Results expand scientists’ understanding of muscle atrophy and bone loss in space while testing an antibody that has been known to prevent muscle wasting in mice on Earth. NanoRacks Module-51: The crew documented the first of several statuses for the sub-experiments inside NanoRacks Module-51. A status will be provided consecutively for the next three weeks.The four different investigations within the module study: antibiotic use to inhibit Staphylococcus aureus bacteria; the rate at which yeast decomposes organic matter; whether steroid-enhanced plants could grow better in space than on Earth; and whether an enzyme derived from fireflies can cause bioluminescence in microgravity. Wet Lab RNA SmartCycler Session: The crew retrieved samples from the MELFI and completed a brief overview of procedures. They then began the Wet Lab RNA SmartCycler validation ops by processing a quality control sample to verify that the SmartCycler operates as expected in microgravity. Wetlab RNA SmartCycler is a research platform for conducting real-time quantitative gene expression analysis aboard the ISS. The system enables spaceflight genomic studies involving a wide variety of biospecimen types in the unique microgravity environment of space. NeuroMapping Operations: The crew set up and performed NeuroMapping operations, which included testing in two body configurations; “strapped in” and ”free floating”. The investigation studies whether long-duration spaceflight causes changes to the brain, including brain structure and function, motor control, and multi-tasking abilities. It also measures how long it would take for the brain and body to recover from changes. Previous research and anecdotal evidence from astronauts suggests movement control and cognition can be affected in microgravity. The NeuroMapping investigation performs structural and functional magnetic resonance brain imaging (MRI and fMRI) to assess any changes that occur after spending months on the International Space Station. Dose Tracker: The crew configured the Dose Tracker application and completed entries for medication tracking. This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effects, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions. Habitability Human Factors Directed Observations: The crew performed a session of the Habitability experiment by recording a walk-through video documenting observations of an area or activity to provide insight related to human factors and habitability. The investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need. Extravehicular Mobility Unit (EMU) 3011: A successful loop scrub was performed on EMU 3011 after which the suit was packed in the launch enclosure for return on SpX-8. The suit was last used during the SSU R&R in January 2016 when water was reported in the helmet. Mobile Servicing System (MSS) Operations: Last night, Robotics Ground Controllers operated the Space Station Remote Manipulator System (SSRMS) to walkoff from the Lab Power Data Grapple Fixture (PDGF) onto Mobile Base System (MBS) PDGF1.  The SSRMS was then maneuvered to a translate configuration and the Mobile Transporter (MT) was translated from Worksite (WS) #6 to WS2.  Next, the SSRMS was maneuvered to the first position for the Starboard Solar Alpha Rotary Joint (SARJ) to Crew and Equipment Translation Aid (CETA) Cart Clearance Survey near WS1 and the survey at this position was performed.  The SSRMS was maneuvered to the second position for the SARJ to CETA Cart Clearance Survey and this survey was also completed.  The third and final operations were performed today to survey the Starboard SARJ for clearance analysis of the MT translation path to WS1 for the HTV-6 battery task. Today’s Planned Activities All activities were completed unless otherwise noted. Biochemical Urine Test r/g 1974 URISYS Hardware Stowage Health Maintenance System (HMS) Tonometry Test Setup Auxiliary Computer System [ВКС] Laptops Antivirus Scan Check and Status Report / r/g 8247 WRS Water Sample Analysis SREDA-ISS. Preparation Steps and Observation Start r/g 1987 RSE-Med laptop hard drive audit. Tagup with specialists / r/g 2002 Vision Test Progress 432 (Aft) Transfers and IMS Ops / r/g 1812, 1832, 1990 CIR Hardware Setup COSMOCARD. Preparation and Starting 24-hr ECG Recording / r/g 1988 WRS Recycle Tank Fill Tonometry Test, CMO Assistance Vision Test, Survey Questionnaire Completion BIMS. Operator Assistance During the Experiment / r/g 1989 Tonometry Test, Subject Soyuz 720 Samsung Tablet Recharge, initiate GIS. Maintenance Work Area preparation for Payload use Water Resource Management (WRM) Initiate Condensate Sampling BIMS. Experiment Ops. r/g 1989 SmartCycler (SCYC)  Sample Retrieval from MERLIN-3 for Session 2 Ops Initiate EMU Cooling Loop Scrub Part 1 SmartCycler (SCYC) Experiment Procedure Review Power Switching Unit БСК-1#10Ю=А457 swap assessment r/g 2003 SREDA-ISS. Closeout Ops / r/g 1987, steps 8-10 Water Resource Management (WRM) Terminate Condensate Sampling MOTOCARD. Experiment Ops r/g 1995 Tonometry […]

from ISS On-Orbit Status Report http://ift.tt/1VjzKiF
via IFTTT

China wants Apple's Source Code but the Company Refused

In Brief Apple's head of legal has denied all rumors about providing its complete source code or any backdoor to the Chinese government. Apple officially confirmed that the Chinese government has asked Apple twice in the past two years to hand over the source code for its operating system, but the company refused in both the cases. In a Tuesday hearing entitled "Deciphering the Debate Over


from The Hacker News http://ift.tt/1TiOZ7X
via IFTTT

Hypocrisy on anonymous donors

... of North Carolina's sweeping anti-LGBT law · Home · Policy Watch Radio and Video · Radio Commentaries. Hypocrisy on anonymous donors ...

from Google Alert - anonymous http://ift.tt/1MHEcoC
via IFTTT

Tuesday, April 19, 2016

Text-based LSTM networks for Automatic Music Composition. (arXiv:1604.05358v1 [cs.AI])

In this paper, we introduce new methods and discuss results of text-based LSTM (Long Short-Term Memory) networks for automatic music composition. The proposed network is designed to learn relationships within text documents that represent chord progressions and drum tracks in two case studies. In the experiments, word-RNNs (Recurrent Neural Networks) show good results for both cases, while character-based RNNs (char-RNNs) only succeed to learn chord progressions. The proposed system can be used for fully automatic composition or as semi-automatic systems that help humans to compose music by controlling a diversity parameter of the model.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1VCKuIB
via IFTTT

Extending the Harper Identity to Iterated Belief Change. (arXiv:1604.05419v1 [cs.AI])

The field of iterated belief change has focused mainly on revision, with the other main operator of AGM belief change theory, i.e. contraction, receiving relatively little attention. In this paper we extend the Harper Identity from single-step change to define iterated contraction in terms of iterated revision. Specifically, just as the Harper Identity provides a recipe for defining the belief set resulting from contracting A in terms of (i) the initial belief set and (ii) the belief set resulting from revision by not-A, we look at ways to define the plausibility ordering over worlds resulting from contracting A in terms of (iii) the initial plausibility ordering, and (iv) the plausibility ordering resulting from revision by not-A. After noting that the most straightforward such extension leads to a trivialisation of the space of permissible orderings, we provide a family of operators for combining plausibility orderings that avoid such a result. These operators are characterised in our domain of interest by a pair of intuitively compelling properties, which turn out to enable the derivation of a number of iterated contraction postulates from postulates for iterated revision. We finish by observing that a salient member of this family allows for the derivation of counterparts for contraction of some well known iterated revision operators, as well as for defining new iterated contraction operators.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1QlwVW7
via IFTTT

Understanding Rating Behaviour and Predicting Ratings by Identifying Representative Users. (arXiv:1604.05468v1 [cs.IR])

Online user reviews describing various products and services are now abundant on the web. While the information conveyed through review texts and ratings is easily comprehensible, there is a wealth of hidden information in them that is not immediately obvious. In this study, we unlock this hidden value behind user reviews to understand the various dimensions along which users rate products. We learn a set of users that represent each of these dimensions and use their ratings to predict product ratings. Specifically, we work with restaurant reviews to identify users whose ratings are influenced by dimensions like 'Service', 'Atmosphere' etc. in order to predict restaurant ratings and understand the variation in rating behaviour across different cuisines. While previous approaches to obtaining product ratings require either a large number of user ratings or a few review texts, we show that it is possible to predict ratings with few user ratings and no review text. Our experiments show that our approach outperforms other conventional methods by 16-27% in terms of RMSE.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1VCKs3t
via IFTTT

Managing Overstaying Electric Vehicles in Park-and-Charge Facilities. (arXiv:1604.05471v1 [cs.AI])

With the increase in adoption of Electric Vehicles (EVs), proper utilization of the charging infrastructure is an emerging challenge for service providers. Overstaying of an EV after a charging event is a key contributor to low utilization. Since overstaying is easily detectable by monitoring the power drawn from the charger, managing this problem primarily involves designing an appropriate penalty during the overstaying period. Higher penalties do discourage overstaying; however, due to uncertainty in parking duration, less people would find such penalties acceptable, leading to decreased utilization (and revenue). To analyze this central trade-off, we develop a novel framework that integrates models for realistic user behavior into queueing dynamics to locate the optimal penalty from the points of view of utilization and revenue, for different values of the external charging demand. Next, when the model parameters are unknown, we show how an online learning algorithm, such as UCB, can be adapted to learn the optimal penalty. Our experimental validation, based on charging data from London, shows that an appropriate penalty can increase both utilization and revenue while significantly reducing overstaying events.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1QlwX0e
via IFTTT

Demand Prediction and Placement Optimization for Electric Vehicle Charging Stations. (arXiv:1604.05472v1 [cs.AI])

Effective placement of charging stations plays a key role in Electric Vehicle (EV) adoption. In the placement problem, given a set of candidate sites, an optimal subset needs to be selected with respect to the concerns of both (a) the charging station service provider, such as the demand at the candidate sites and the budget for deployment, and (b) the EV user, such as charging station reachability and short waiting times at the station. This work addresses these concerns, making the following three novel contributions: (i) a supervised multi-view learning framework using Canonical Correlation Analysis (CCA) for demand prediction at candidate sites, using multiple datasets such as points of interest information, traffic density, and the historical usage at existing charging stations; (ii) a mixed-packing-and- covering optimization framework that models competing concerns of the service provider and EV users; (iii) an iterative heuristic to solve these problems by alternately invoking knapsack and set cover algorithms. The performance of the demand prediction model and the placement optimization heuristic are evaluated using real world data.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1pfq2zz
via IFTTT

The SP theory of intelligence and the representation and processing of knowledge in the brain. (arXiv:1604.05535v1 [cs.AI])

The "SP theory of intelligence", with its realisation in the "SP computer model", aims to simplify and integrate observations and concepts across AI-related fields, with information compression as a unifying theme. This paper describes how abstract structures and processes in the theory may be realised in terms of neurons, their interconnections, and the transmission of signals between neurons. This part of the SP theory -- "SP-neural" -- is a tentative and partial model for the representation and processing of knowledge in the brain. In the SP theory (apart from SP-neural), all kinds of knowledge are represented with "patterns", where a pattern is an array of atomic symbols in one or two dimensions. In SP-neural, the concept of a "pattern" is realised as an array of neurons called a "pattern assembly", similar to Hebb's concept of a "cell assembly" but with important differences. Central to the processing of information in the SP system is the powerful concept of "multiple alignment", borrowed and adapted from bioinformatics. Processes such as pattern recognition, reasoning and problem solving are achieved via the building of multiple alignments, while unsupervised learning -- significantly different from the "Hebbian" kinds of learning -- is achieved by creating patterns from sensory information and also by creating patterns from multiple alignments in which there is a partial match between one pattern and another. Short-lived neural structures equivalent to multiple alignments will be created via an inter-play of excitatory and inhibitory neural signals. The paper discusses several associated issues, with relevant empirical evidence.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1VCKusm
via IFTTT

AGI and Reflexivity. (arXiv:1604.05557v1 [cs.AI])

We define a property of intelligent systems, which we call Reflexivity. In human beings, it is one aspect of consciousness, and an element of deliberation. We propose a conjecture, that this property is conditioned by a topological property of the processes which implement this reflexivity. These processes may be symbolic, or non symbolic e.g. connexionnist. An architecture which implements reflexivity may be based on the interaction of one or several modules of deep learning, which may be specialized or not, and interconnected in a relevant way. A necessary condition of reflexivity is the existence of recurrence in its processes, we will examine in which cases this condition may be sufficient. We will then examine how this topology and this property make possible the expression of a second property, the deliberation. In a final paragraph, we propose an evaluation of intelligent systems, based on the fulfillment of all or some of these properties.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1QlwVW2
via IFTTT

Contribution to the Formal Specification and Verification of a Multi-Agent Robotic System. (arXiv:1604.05577v1 [cs.SE])

It is important to have multi-agent robotic system specifications that ensure correctness properties of safety and liveness. As these systems have concurrency, and often have dynamic environment, the formal specification and verification of these systems along with step-wise refinement from abstract to concrete concepts play a major role in system correctness. Formal verification is used for exhaustive investigation of the system space thus ensuring that undetected failures in the behavior are excluded. We construct the system incrementally from subcomponents, based on software architecture. The challenge is to develop a safe multi-agent robotic system, more specifically to ensure the correctness properties of safety and liveness. Formal specifications based on model-checking are flexible, have a concrete syntax, and play vital role in correctness of a multi-agent robotic system. To formally verify safety and liveness of such systems is important because they have high concurrency and in most of the cases have dynamic environment. We have considered a case-study of a multi-agent robotic system for the transport of stock between storehouses to exemplify our formal approach. Our proposed development approach allows for formal verification during specification definition. The development process has been classified in to four major phases of requirement specifications, verification specifications, architecture specifications and implementation.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1VCKrN9
via IFTTT

Pattern-Based Approach to the Workflow Satisfiability Problem with User-Independent Constraints. (arXiv:1604.05636v1 [cs.AI])

The fixed parameter tractable (FPT) approach is a powerful tool in tackling computationally hard problems. In this paper we link FPT results to classic artificial intelligence techniques to show how they complement each other. Specifically, we consider the workflow satisfiability problem (WSP) which asks whether there exists an assignment of authorised users to the steps in a workflow specification, subject to certain constraints on the assignment. It was shown that WSP restricted to the class of user-independent constraints (UI), covering many practical cases, admits FPT algorithms.

We show that the FPT nature of WSP with UI constraints decomposes the problem into two levels, and exploit this in a new FPT algorithm that is by many orders of magnitude faster then the previous state-of-the-art WSP algorithm.

The WSP with UI constraints can also be viewed as an extension of the hypergraph list colouring problem. Inspired by a classic graph colouring method called Zykov's Contraction, we designed a new pseudo-boolean (PB) formulation of WSP with UI constraints that also exploits the two-level split of the problem. Our experiments showed that, in many cases, this formulation being solved with a general purpose PB solver demonstrated performance comparable to that of our bespoke FPT algorithm. This raises the potential of using general purpose solvers to tackle FPT problems efficiently.

We also study the practical, average-case, performance of various algorithms. To support this we extend studies of phase transition phenomena in the understanding of the average computational effort needed to solve decision problems. We investigate, for the first time, the phase transition properties of the WSP, under a model for generation of random instances, and note that the methods of the phase transition study need to be adjusted to FPT problems.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1QlwVFL
via IFTTT

Proving the Incompatibility of Efficiency and Strategyproofness via SMT Solving. (arXiv:1604.05692v1 [cs.GT])

Two important requirements when aggregating the preferences of multiple agents are that the outcome should be economically efficient and the aggregation mechanism should not be manipulable. In this paper, we provide a computer-aided proof of a sweeping impossibility using these two conditions for randomized aggregation mechanisms. More precisely, we show that every efficient aggregation mechanism can be manipulated for all expected utility representations of the agents' preferences. This settles a conjecture by Aziz et al. [2013b] and strengthens a number of existing theorems, including statements that were shown within the special domain of assignment. Our proof is obtained by formulating the claim as a satisfiability problem over predicates from real-valued arithmetic, which is then checked using an SMT (satisfiability modulo theories) solver. To the best of our knowledge, this is the first application of SMT solvers in computational social choice.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1SS54hL
via IFTTT

Time-Sensitive Bayesian Information Aggregation for Crowdsourcing Systems. (arXiv:1510.06335v2 [cs.AI] UPDATED)

Crowdsourcing systems commonly face the problem of aggregating multiple judgments provided by potentially unreliable workers. In addition, several aspects of the design of efficient crowdsourcing processes, such as defining worker's bonuses, fair prices and time limits of the tasks, involve knowledge of the likely duration of the task at hand. Bringing this together, in this work we introduce a new time--sensitive Bayesian aggregation method that simultaneously estimates a task's duration and obtains reliable aggregations of crowdsourced judgments. Our method, called BCCTime, builds on the key insight that the time taken by a worker to perform a task is an important indicator of the likely quality of the produced judgment. To capture this, BCCTime uses latent variables to represent the uncertainty about the workers' completion time, the tasks' duration and the workers' accuracy. To relate the quality of a judgment to the time a worker spends on a task, our model assumes that each task is completed within a latent time window within which all workers with a propensity to genuinely attempt the labelling task (i.e., no spammers) are expected to submit their judgments. In contrast, workers with a lower propensity to valid labeling, such as spammers, bots or lazy labelers, are assumed to perform tasks considerably faster or slower than the time required by normal workers. Specifically, we use efficient message-passing Bayesian inference to learn approximate posterior probabilities of (i) the confusion matrix of each worker, (ii) the propensity to valid labeling of each worker, (iii) the unbiased duration of each task and (iv) the true label of each task. Using two real-world public datasets for entity linking tasks, we show that BCCTime produces up to 11% more accurate classifications and up to 100% more informative estimates of a task's duration compared to state-of-the-art methods.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1MU61b9
via IFTTT

Convolutional Models for Joint Object Categorization and Pose Estimation. (arXiv:1511.05175v6 [cs.CV] UPDATED)

In the task of Object Recognition, there exists a dichotomy between the categorization of objects and estimating object pose, where the former necessitates a view-invariant representation, while the latter requires a representation capable of capturing pose information over different categories of objects. With the rise of deep architectures, the prime focus has been on object category recognition. Deep learning methods have achieved wide success in this task. In contrast, object pose regression using these approaches has received relatively much less attention. In this paper we show how deep architectures, specifically Convolutional Neural Networks (CNN), can be adapted to the task of simultaneous categorization and pose estimation of objects. We investigate and analyze the layers of various CNN models and extensively compare between them with the goal of discovering how the layers of distributed representations of CNNs represent object pose information and how this contradicts with object category representations. We extensively experiment on two recent large and challenging multi-view datasets. Our models achieve better than state-of-the-art performance on both datasets.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/1WY53kr
via IFTTT

Orioles: Former P Milt Pappas dies at 76; 110-74 in 9 seasons with team part of trade that brought Frank Robinson there (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Viber adds End-to-End Encryption and PIN protected Hidden Chats features

In Brief Viber, the popular mobile messaging app announced Tuesday that it has added full end-to-end encryption for video, voice and text message services for its millions of users. Here, the end-to-end encryption means only you and the person you are communicating with can read the content, and nobody in between, not even the company and if court orders company to provide user data, they


from The Hacker News http://ift.tt/20V2e1S
via IFTTT

I have a new follower on Twitter


Thorsten Heller
Co-#Founder & Über-#Geek at @greenbirdIT with way too many thoughts on #IoT, #BigData, #AI, #ApacheSpark, #ApacheKafka, #Docker, #Containers, #PaaS & #Startups.
San Francisco, CA | Oslo, NO
https://t.co/i7YzkDZyKX
Following: 7857 - Followers: 8778

April 19, 2016 at 03:21PM via Twitter http://twitter.com/ThoHeller

Ravens: QB Joe Flacco says he has made \"big improvements\" over the last 3 weeks of rehab following December knee surgery (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

MIT builds Artificial Intelligence system that can detect 85% of Cyber Attacks

In Brief What if we could Predict when a cyber attack is going to occur before it actually happens and prevent it? Isn't it revolutionary idea for Internet Security? Security researchers at MIT have developed a new Artificial Intelligence-based cyber security platform, called 'AI2,' which has the ability to predict, detect, and stop 85% of Cyber Attacks with high accuracy. Cyber security


from The Hacker News http://ift.tt/23X8W9e
via IFTTT

error TS1206

I am trying to use a decorator with an anonymous class (class expression) on ... I didn't see anything addressing decorating anonymous classes in the ...

from Google Alert - anonymous http://ift.tt/1qWPtYh
via IFTTT

I have a new follower on Twitter


Masaya & Company
Handmade modern wood furniture, sustainably sourced from seedling to finished product. We plant 100 trees for every furniture piece sold.
nicaragua & nashville
https://t.co/kIWv9qAGvy
Following: 3305 - Followers: 2994

April 19, 2016 at 12:44PM via Twitter http://twitter.com/masayacompany

Empirical study of PROXTONE and PROXTONE$$ for Fast Learning of Large Scale Sparse Models. (arXiv:1604.05024v1 [cs.LG])

PROXTONE is a novel and fast method for optimization of large scale non-smooth convex problem \cite{shi2015large}. In this work, we try to use PROXTONE method in solving large scale \emph{non-smooth non-convex} problems, for example training of sparse deep neural network (sparse DNN) or sparse convolutional neural network (sparse CNN) for embedded or mobile device. PROXTONE converges much faster than first order methods, while first order method is easy in deriving and controlling the sparseness of the solutions. Thus in some applications, in order to train sparse models fast, we propose to combine the merits of both methods, that is we use PROXTONE in the first several epochs to reach the neighborhood of an optimal solution, and then use the first order method to explore the possibility of sparsity in the following training. We call such method PROXTONE plus (PROXTONE$^+$). Both PROXTONE and PROXTONE$^+$ are tested in our experiments, and which demonstrate both methods improved convergence speed twice as fast at least on diverse sparse model learning problems, and at the same time reduce the size to 0.5\% for DNN models. The source of all the algorithms is available upon request.

Help us improve arXiv so we can better serve you. Take our user survey.



from cs.AI updates on arXiv.org http://ift.tt/22JgiuA
via IFTTT

ISS Daily Summary Report 04/18/16

Bigelow Expandable Activity Module (BEAM): Over the weekend, Robotics Ground Controllers transferred BEAM from the SpX-8 Dragon trunk to the Node 3 Aft Port.  Activities included Common Berthing Mechanism (CBM) prep for mate and inspection, BEAM extraction, maneuver to install position, CBM capture, and BEAM release. The crew and ground utilized the Node 3 Aft Active CBM to capture and bolt BEAM to the ISS. BEAM inflation is currently planned for late May.   Cell Mechanosensing 3 (CMS-3) Operations and Closeout: Over the weekend, the remaining microscope observations for the JAXA Cell Mechanosensing-3 investigation were completed. Today, the crew performed closeout activities by removing the Observation and Measurement Experiment Units from the Cell Biology Experiment Facility (CBEF). The CMS-3 investigation identifies gravity sensors in skeletal muscle cells to develop countermeasures to muscle atrophy. Scientists believe that the lack of mechanical stress from gravity causes tension fluctuations in the plasma membrane of skeletal muscle cells which changes the expression of key proteins and genes and allows muscles to atrophy.   Genes in Space: Crewmembers completed activation and checkout prior to performing a hardware test to prepare for the Genes in Space exercises planned for this week.  The Genes in Space investigation is a winning student-designed experiment to test whether the polymerase chain reaction (PCR) can be used to study DNA alterations aboard the ISS.  Spaceflight causes numerous changes to the human body, including alterations in DNA and a weakened immune system. Understanding whether these two processes are linked is important for safeguarding crew health, but DNA technology that can track these changes is relatively untested in space.   Light Microscopy Module (LMM) Microchannel Diffusion Configuration: Crewmembers configured the LMM for the Microchannel Diffusion investigation. The Advanced Colloids Experiment (ACE) sample will be removed from the Auxiliary Fluids Container (AFC) prior to the Bio Base being installed into the LMM AFC and the Diffusion Plate being installed onto the Bio Base. The objective of Microchannel Diffusion is to provide insight into how microparticles interact with the surface of confining microchannels in the absence of gravitational forces. The analysis focuses on how physical and electrostatic confinement affect the diffusive transport of microparticles in microchannels. Insight into confined diffusive transport is relevant for “on- Earth” applications including drug delivery, molecular sieving and particle filtration. The study provides an understanding of microparticle diffusive transport, which can be important for future technological applications for space exploration.   Intracranial Pressure & Visual Impairment (IPVI): The crew participated in observations as part of the IPVI payload.  Recent studies have shown some crewmembers on the International Space Station experience swelling of the optic nerve, which can affect their vision. This may be because of elevated intracranial pressure, or pressure inside the head, which happens in microgravity. The investigation aims to confirm that eye abnormalities, such as swelling of the optic nerve, happen in crewmembers whose cranial pressure has increased. The investigation’s non-invasive measurement methods could be used for early detection of this pressure change.   Energy Preparation: The crew gathered the PFS Face Mask Kit and the food kit needed to support the upcoming European Space Agency (ESA) Energy experiment. The Energy investigation assesses energy requirements of astronauts on long-duration missions. This is important for future planning of longer-duration missions, to the Moon and Mars for example, in order to launch sufficient food supplies (but not too much), which have a positive impact on mission costs and goals.   Multi-Purpose Experiment Platform Installation: The Small Fine Arm (SFA) Airlock Attachment Mechanism (SAM) was installed on the JEM Airlock (JEMAL) Slide Table (ST) followed by MPEP installation on the SAM in preparation for Japanese Small Satellite Orbital Demonstration (JSSOD)-M1 deploy planned for April 27. Following completion, the Slide Table was retracted back into the JEMAL. MPEP is a new, transportable platform which interfaces with JEMAL and JEMRMS. Electrical Mechanical Grapple Fixture (EMGF) is attached on the MPEP so that any payload on the MPEP can be transported anywhere within JEMRMS reachable envelope. In addition, power, video and communication interface is available via EMGF. The MPEP plays a key role in enhancing ISS utilization using JEM unique capability with the JEMAL and JEMRMS.   Electromagnetic Levitator (EML) Preparation: The crew prepared the EML facility for the upcoming EML Batch 1 exercise. They installed and removed the EML reprogramming cable after the Limit Parameter Sets of the EML Sample Chamber were reprogrammed by ground teams. The crew also changed the measurement mode of the EML high speed camera. EML is designed for containerless materials processing in space. EML is a facility composed of 4 inserts installed in the European Drawer Rack (EDR). Samples are installed in a dedicated Sample Chamber that is attached to EML and will be replaced by new Sample Chambers for new experiment batches.   On Board Training (OBT) Crew Health Care System (CheCS) Drill: The 46S crew completed this OBT which provides the opportunity to review procedures, hardware and communication methods necessary to manage a medical emergency. Emergency medical equipment was deployed and the crew practicef CPR positioning to ensure familiarity with procedure execution.   Mobile Servicing System (MSS) Operations: The Space Station Remote Manipulator System (SSRMS) will walk off from the Lab Power Data Grapple Fixture (PDGF) to Mobile Base System (MBS) PDGF 1.  The Mobile Transporter (MT) will be translated from Worksite (WS)6 to WS2 and the SSRMS will begin a survey of the clearances between the starboard Crew and Equipment Translation Aid (CETA) cart and the starboard Solar Alpha Rotary Joint (SARJ).  The survey will confirm adequate clearance between the CETA cart and the SARJ when the MT is at WS1.   Orbital-6 (OA-6) Cargo Transfer Status: The crew has completed 19:35 hours of cargo transfer. Remaining time needed for completion is 32.51 hours.   Today’s Planned Activities All activities were completed unless otherwise noted. HRF Urine Sample Collection HRF Urine Sample MELFI Insertion HRF Blood Sample Collection Microchannel Diffusion (MDE). Sample Retrieval and Temporary Stowage EML – cable setup for reprogramming HRF Refrigerated […]

from ISS On-Orbit Status Report http://ift.tt/1MFqxhR
via IFTTT

Google makes it mandatory for Chrome Apps to tell Users what Data they collect

In Brief Chrome apps and extensions make things easier, but they can also do terrible things like spy on web users and collect their personal data. But, now Google has updated its browser’s User Data Policy requiring all Chrome extension and app developers to disclose what data they collect. Furthermore, developers are prohibited from collecting unnecessary browsing data and must also use


from The Hacker News http://ift.tt/1S7SajS
via IFTTT

Crystal Meth Anonymous - Crystal Meth Anonymous

Crystal Meth Anonymous is a fellowship of people who share their experience, ... Crystal Meth Anonymous Official Public Service Announcement. 0:29 ...

from Google Alert - anonymous http://ift.tt/1SrXIaW
via IFTTT

Anonymous users cannot subscribe to content

Hi We have tried to implement this module with our site, but when an anonymous user tries to subscribe they recieve an email with a link and when ...

from Google Alert - anonymous http://ift.tt/1Si2sdM
via IFTTT

Hackers can spy on your calls and track location using just your phone number

In Brief The famous ‘60 Minutes’ television show shocked some viewers Sunday evening when a team of German hackers demonstrated how they hacked into an iPhone used by U.S. Congressman, then recorded his phone calls and tracked his movement through Los Angeles. Hackers leverage a security flaw in SS7 (Signalling System Seven) protocol that allows hackers to track phone locations, listen in


from The Hacker News http://ift.tt/1SrNsQ7
via IFTTT

Monday, April 18, 2016

I have a new follower on Twitter


Jacobo Guerra
Technology Innovator, A.I. Advocate & Entrepeneur #CreativeDirector #SystemDesigner #Startups #TechnologyConsultant #AppDeveloper #MediaProducer #Entrepeneur
Islas Baleares, España

Following: 1548 - Followers: 351

April 18, 2016 at 10:21PM via Twitter http://twitter.com/JacoboGuerra1

Why Artificial Intelligence Needs a Task Theory --- And What It Might Look Like. (arXiv:1604.04660v1 [cs.AI])

The concept of "task" is at the core of artificial intelligence (AI) --- the raison d'\^etre of AI systems. Tasks are used in system evaluation, pedagogy and decision making (through task decomposition and subtask selection). Other fields have strong theories of tasks in their domain that allows them to thoroughly evaluate their designs by methodical manipulation of well understood parameters of known importance; this allows an aeronautics engineer, for instance, to systematically assess the effects of wind speed on an airplane's stability. No framework exists that allows the kind of methodical manipulation found in other disciplines: Results on the few tasks in current use (c.f. board games, question-answering) cannot be easily compared, however similar or different. A task theory would address this by providing the appropriate formalization and classification of tasks, environments, and their parameters, enabling more rigorous ways of measuring, comparing, and evaluating intelligent behavior. Furthermore, analysis and (de)construction of tasks can help teachers devise appropriate challenges for learning systems, and help AI systems make more informed decisions about what (sub)tasks to pursue. Here we discuss the main elements of this argument and propose what such a theory might look like for physical tasks.



from cs.AI updates on arXiv.org http://ift.tt/1Vf09ht
via IFTTT