Latest YouTube Video

Saturday, April 30, 2016

I have a new follower on Twitter


Tina Quincy



Following: 225 - Followers: 6

April 30, 2016 at 11:27PM via Twitter http://twitter.com/evsidorova41178

NFL Draft: Ravens select Virginia CB Maurice Canady in 6th round (209th overall); Mel Kiper's No. 17 ranked corner (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select Navy RB Keenan Reynolds in 6th round (182nd overall); holds FBS record with 88 TDs all-time (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Cynthia Johnson
Entrepreneur, Speaker and Columnist Focused on Personal Branding and Digital Marketing. I've got 5 minutes, let's connect cynthia@cynthialive.com
Venice Beach, CA
https://t.co/AwUt4MPubm
Following: 448121 - Followers: 555442

April 30, 2016 at 03:41PM via Twitter http://twitter.com/CynthiaLIVE

NFL Draft: Ravens select Grand Valley State DE Matt Judon in 5th round (146th overall); winner of D-II top DL award (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select La. Tech RB Kenneth Dixon in 4th round (134th overall); 26 total TDs in 2015 (2nd in nation) (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select Michigan DT Willie Henry in 4th round (132nd overall); honorable All-Big Ten in 2015 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select Nebraska OT Alex Lewis in 4th round (130th overall); Mel Kiper's No. 9 ranked offensive tackle (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL: Ravens would have taken OT Laremy Tunsil at No. 6 if not for gas mask video - Schefter; fall to No. 13 cost him $7M (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select Cincinnati WR Chris Moore in 4th round (107th overall); 40 catches, 870 yards and 7 TDs in 2015 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

NFL Draft: Ravens select Temple CB Tavon Young in 4th round (104th overall); finished 4-year career with 7 INTs (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

And The Anonymous Nobody

In the run up to the Kickstarter-powered "and the Anonymous Nobody…", De La Soul have gifted their supportive fanbase a free EP. "For Your Pain ...

from Google Alert - anonymous http://ift.tt/1pRO3NC
via IFTTT

Fermi's Gamma-ray Moon


If you could only see gamma-rays, photons with up to a billion or more times the energy of visible light, the Moon would be brighter than the Sun! That startling notion underlies this novel image of the Moon, based on data collected by the Fermi Gamma-ray Space Telescope's Large Area Telescope (LAT) instrument during its first seven years of operation (2008-2015). Fermi's gamma-ray vision doesn't distinguish details on the lunar surface, but a gamma-ray glow consistent with the Moon's size and position is clearly found at the center of the false color map. The brightest pixels correspond to the most significant detections of lunar gamma-rays. Why is the gamma-ray Moon so bright? High-energy charged particles streaming through the Solar System known as cosmic rays constantly bombard the lunar surface, unprotected by a magnetic field, generating the gamma-ray glow. Because the cosmic rays come from all sides, the gamma-ray Moon is always full and does not go through phases. The first gamma-ray image of the Moon was captured by the EGRET instrument onboard the Compton Gamma-ray Observatory, launched 25 years ago. via NASA http://ift.tt/1NFCW5y

Anonymous threat against 'American students' closes Ohio schools

April 29 (Reuters) - An anonymous video posted on a social media group for Ohio University students threatened "American students" with death, ...

from Google Alert - anonymous http://ift.tt/21kLkKc
via IFTTT

Friday, April 29, 2016

NFL Draft: Ravens select BYU DE Bronson Kaufusi in 3rd round (70th overall); team captain had 11 sacks in 2015 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Orioles Video: Nolan Reimold launches a go-ahead 3-run homer to break open a tie game in 6-3 win over the White Sox (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

NFL Draft: Ravens select Boise State LB Kamalei Correa in 2nd round (42nd overall); 34 tackles and 5 sacks in 2015 (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

One Less Gun: Anonymous Tip from Concerned Citizen Leads to Recovered Firearm in Dorchester

On Thursday April 28, 2016, officers assigned to District B-3 (Mattapan) received an anonymous tip from a concerned citizen which led to the recovery ...

from Google Alert - anonymous http://ift.tt/1SPYagg
via IFTTT

Anonymous user df93d5

Name, Anonymous user df93d5. User since, April 7, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/1TkmAvD
via IFTTT

ICC 16.0.2 incorrect error on anonymous union initialization

Hello, I've run into a compile error with icpc 16.0.2 that I think is incorrect. If I have an anonymous union in a class the compiler only considers it ...

from Google Alert - anonymous http://ift.tt/1r3GKDi
via IFTTT

Anonymous was a Woman

Anonymous was a Woman. S11 episode 4 00:43:18. Gibbs and McGee travel to Afghanistan when a murder case leads them to an Afghan women's ...

from Google Alert - anonymous http://ift.tt/1UmvUnD
via IFTTT

TypeScript to generate named registers rather than anonymous registers

TypeScript to generate named registers rather than anonymous registers #8385. Open. DanielRosenwasser opened this Issue 6 minutes ago · 0 ...

from Google Alert - anonymous http://ift.tt/1rFR5q4
via IFTTT

"Download link" not working for anonymous users

When I use the formater "Download link" it is not working for anonymous, they simply come to a page where it says "Access denied"

from Google Alert - anonymous http://ift.tt/24ag45M
via IFTTT

Ransomware Virus Shuts Down Electric and Water Utility

Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars. Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files. Guess what could be the next target of ransomware malware?


from The Hacker News http://ift.tt/1O0OYRK
via IFTTT

Ravens: CB Jimmy Smith will have screws removed from his surgically repaired right foot, miss 4-6 weeks - reports (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Koo

Anonymous often leads to bullying, trolling and generally negativity .... So we have tried other anonymous chats, the difference is that we curate the ...

from Google Alert - anonymous http://ift.tt/1Ta034w
via IFTTT

ISS Daily Summary Report – 04/28/16

Fluid Shifts (FS) Baseline Imaging Operations: With guidance from the ground teams, crewmembers continued supporting the second week of FS operations by conducting an Ultrasound 2 scan and eye exams using the Optical Coherence Tomography (OCT) hardware. Fluids Shift is divided into three one-week segments: Dilution Measures, Baseline Imaging, and Baseline Imaging using the Russian Chibis Lower Body Negative Pressure (LBNP) device. The experiment measures how much fluid shifts from the lower body to the upper body, in or out of cells and blood vessels, and determines the impact these shifts have on fluid pressure in the head, changes in vision and eye structures.   Cell Mechanosensing- 3 (CMS-3) Closeout: Following completion of microscope observations last week, the crew completed closeout activities by removing the Thermal Container from the Microscope in Multi-purpose Small Payload Rack Work Volume (MSPR WV). The investigation identifies gravity sensors in skeletal muscle cells to develop countermeasures to muscle atrophy. Scientists believe that the lack of mechanical stress from gravity causes tension fluctuations in the plasma membrane of skeletal muscle cells which changes the expression of key proteins and genes and allows muscles to atrophy.   Strata Payload Activation: The crew configured and activated Strata-1 in the US LAB. Strata-1 investigates the properties and behavior of regolith on small, airless bodies.  Regolith is the impact-shattered “soil” found on asteroids, comets, the Moon, and other airless worlds, but it is different from soil on Earth in that it contains no living material.  Strata-1’s goal is to provide answers about how regolith behaves and moves in microgravity, how easy or difficult it is to anchor a spacecraft in regolith, how it interacts with spacecraft and spacesuit materials, and other important properties.   Mobile Servicing System (MSS) Operations/HTV-6 Get-ahead Tasks: Robotics Ground Controllers are currently performing 1A battery operations.  The first bolt’s torque has been successfully released. Engineering and robotics teams are working a forward plan for battery 3A2-2 H1 bolt completion including increasing the maximum commanded torque. Additional attempts are tentatively scheduled tomorrow.   Inadvertent Time Tag Command during 4A3 Battery Reconditioning: During 4A3 battery reconditioning operations this morning, a time-tagged command executed after the time tag queue had been cleared. The executed command was the Battery Charge Discharge Unit (BCDU) Fault Isolator Closed command.  After the error was discovered, a BCDU Fault Isolator Open command was executed to correct. There were no impacts to the vehicle. Data will be evaluated following 4A3 battery reconditioning completion on May 4 to determine if there was any impact to the reconditioning effort.   Human Research Facility (HRF) Resupply: The crew restocked HRF supplies and trashed expired and limited life items.   Today’s Planned Activities All activities were completed unless otherwise noted. CORRECTSIYA. Blood Collection r/g 2091 CORRECTSIYA. Venous blood sample processing using Plasma-03 centrifuge / r/g 2091 CORRECTSIYA. Sample Handover to USOS for MELFI Insertion / r/g 2091 RUEXP – Blood Sample Insertion into MELFI ENERGY Diet Log of Breakfast JEMAL Slide Table extension FLUID SHIFTS. OCT Setup FS-OCT-BL SETUP Baseline OCT Setup DRAGON Transfers Multi-Purpose Small Payload Rack (MSPR) Payload Closeout Ops CORRECTSIYA. Closeout Ops / r/g 2091 FINEMOTR Experiment Ops FLUID SHIFTS. Ultrasound 2 Power On FLUID SHIFTS Donning CardioLab Holter, Subject CORRECTSIYA. Questionnaire Photos / r/g 2091 FLUID SHIFTS Baseline Ultrasound Scan, Subject Formaldehyde Monitoring Kit (FMK) Stow Operations CIR Hardware Setup OTKLIK. Hardware Monitoring / r/g 1588 JEMRMS  Hardware Checkout FLUID SHIFTS Scanning Operator Assistance SPHEROIDS Copying KUBIK 6 Data to EDR Intermodular TORU Test with Mated Progress 431 (DC1) r/g 2096 SPHEROIDS Taking KUBIK 6 Temperature Data SPHEROIDS Copying KUBIK 6 Data to EDR Medical Kit Audit / r/g 2056 Changeout of Replaceable Condensate Removal Lines [СМОК] r/g 2056 Retracting Slide Table in JEMAL and closing Outer Hatch JEMRMS Equipment deactivation FLUID SHIFTS CCFP Baseline Test, Subject METERON Onboard Training Laser Eye Protection Disk Removal from Cupola windows Part 2 Periodic Fitness Evaluation – Nom Ops (subject) FLUID SHIFTS Assisted Test, Subject FLUID SHIFTS Baseline Test, Operator FLUID SHIFTS DPOAE Baseline Test, Subject FLUID SHIFTS Hardware Power Off and Stow FLUID SHIFTS Tonometry Baseline Setup FLUID SHIFTS. Ultrasound 2 Hardware Power Off FLUID SHIFTS Baseline Test, Operator FLUID SHIFTS Tonometer Test, Subject FLUID SHIFTS Doffing CardioLab Holter, Subject FLUID SHIFTS. Tonometry Equipment stow FLUID SHIFTS CCFP Baseline Stowage RSS1 laptop BRI data download / r/g 2052 DRAGON Transfers THERM Closeout Ops ENERGY Diet Log of Lunch SPHEROIDS. Temperature Check. URAGAN. [ВСС] R&R and Test Photography r/g 2095 Changeout of Replaceable Condensate Removal Lines [СМОК] r/g 2056 Pre-packing EDV 1240 shell for return / r/g 2093 WRS – Recycle Tank Fill from EDV Crew Prep For PAO PCO2M Interface Check PAO Snapchat [Deferred] СОЖ Maintenance Water Recovery System (WRS): Payload Water Reservoir (PWR) Fill 1 SmartCycler (SCYC) Battery Check HRF Blood collection setup Vacuum cleaning ventilation grille on FGB interior panels (201, 301, 401) IMS Delta File Prep WRS-PWR-Reservoir Fill (PWR) DRAGON Transfers HRF2 Supply Kit Resupply Dragon Cargo Operations Conference ENERGY Diet Log of Dinner   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. 1A battery bolt ops Nominal ground commanding   Three-Day Look Ahead: Friday, 04/29: SmartCycler, METERON, ENERGY, MSPR Microscope closeout, N1 reconfig Saturday, 04/30: Crew off duty; housekeeping Sunday, 05/01: Crew off duty   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) On [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Normal Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1NFwECV
via IFTTT

I have a new follower on Twitter


Awesome WordPress
Hosting in the Cloud
The clouds
https://t.co/5dIsa35FTE
Following: 2879 - Followers: 411

April 29, 2016 at 06:10AM via Twitter http://twitter.com/awesome_wp

Microsoft to Store Data on DNA — 1,000,000,000 TB in Just a Gram

In Brief Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years. Microsoft has purchased 10 Million strands of synthetic DNA, called Oligonucleotides a.k.a. DNA molecules, from biology startup Twist and collaborated with researchers from University of Washington to explore the idea of using synthetic DNA to store huge amount of data. Microsoft is planning to


from The Hacker News http://ift.tt/1N5NOd5
via IFTTT

[FD] Wordpress Truemag Theme - Client Side Cross Site Scripting Web Vulnerability

Document Title: =============== Wordpress Truemag Theme - Client Side Cross Site Scripting Web Vulnerability References (Source): ==================== http://ift.tt/1WuC8SB Release Date: ============= 2016-04-29 Vulnerability Laboratory ID (VL-ID): ==================================== 1839 Common Vulnerability Scoring System: ==================================== 3.3 Product & Service Introduction: =============================== CactusThemes is an experienced and passionate web design team with over 8 years working together designing and developing themes and plugins. Our goal is to create the best WordPress themes for education, event, news, etc. and meet all your needs. (Copy of the Homepage: http://ift.tt/1QEBWJC ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered a client-side cross site scripting vulnerability in the official Wordpress Truemag Theme. Vulnerability Disclosure Timeline: ================================== 2016-04-29: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== CactusThemes Product: Truemag Theme (Wordpress) - Theme (Web-Application) 2016 Q2 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A client-side cross site scripting web vulnerability has been discovered in the official Wordpress Truemag Theme web-application. The non-persistent vulnerability allows remote attackers to inject own malicious script code to client-side application to browser requests. The client-side cross site vulnerability is located in the `s` value of the page module GET method request. Remote attackers are able to inject own malicious script codes to the client-side of the online service web-application to compromise user session information or data. The request method to execute is GET and the attack vector is non-persistent. The security risk of the client-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.3. Exploitation of the non-persistent web vulnerability requires no privileged web application user account and low user interaction (click link). Successful exploitation of the vulnerability results in session hijacking, non-persistent phishing, non-persistent external redirects, non-persistent load of malicious script codes or non-persistent web module context manipulation. Request Method(s): [+] GET Vulnerable Service(s): [+] Truemag Theme (Wordpress) Vulnerable Module(s): [+] /wp-contact/theme/truemag Vulnerable Parameter(s): [+] s Proof of Concept (PoC): ======================= The remote cross site vulnerability can be exploited by remote attackers without privileged web-application user account and with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Dork(s): inurl: /wp-contact/theme/truemag PoC: Payload ">%20 PoC: Example http://ift.tt/1rEl8yf SIDE CROSS SITE SCRIPTING VULNERABILITY!] PoC: Exploitation http://ift.tt/1QEBZoG">%20 Reference(s): http://ift.tt/1QEBZoG Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure parse and encode of the vulnerable `s` value in the webpage GET method request. Encode the parameter and restrict the value input to prevent further script code injection attacks. Security Risk: ============== The security risk of the client-side cross site scripting web vulnerability in the vulnerbale `s` value is estimated as medium. (CVSS 3.3) Credits & Authors: ================== Iran Cyber Security Group - 0x3a (ICG SEC) [Iran-Cyber.Net] [http://ift.tt/1JLGIbT] Special Thanks: root3r Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-lab.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: twitter.com/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1oSBx0A Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@ or research@vulnerability-lab.com) to get a ask permission. Copyright © 2016 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

U.S. Supreme Court allows the FBI to Hack any Computer in the World

In Brief The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York. But the amended rule would now make it


from The Hacker News http://ift.tt/1VEpMZb
via IFTTT

A Dust Angel Nebula


The combined light of stars along the Milky Way are reflected by these cosmic dust clouds that soar some 300 light-years or so above the plane of our galaxy. Dubbed the Angel Nebula, the faint apparition is part of an expansive complex of dim and relatively unexplored, diffuse molecular clouds. Commonly found at high galactic latitudes, the dusty galactic cirrus can be traced over large regions toward the North and South Galactic poles. Along with the refection of starlight, studies indicate the dust clouds produce a faint reddish luminescence, as interstellar dust grains convert invisible ultraviolet radiation to visible red light. Also capturing nearby Milky Way stars and an array of distant background galaxies, the deep, wide-field 3x5 degree image spans about 10 Full Moons across planet Earth's sky toward the constellation Ursa Major. via NASA http://ift.tt/1QCgbtZ

Ravens contacted Cowboys about moving up two spots to No. 4 to draft Florida State CB Jalen Ramsey - reports (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Thursday, April 28, 2016

Orioles Video: Chris Davis and Mark Trumbo hit back-to-back home runs in the 3rd inning in 10-2 win over White Sox (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Ravens: 20 years after drafting Jonathan Ogden, Baltimore confident it has a franchise LT in Ronnie Stanley - Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Propositional Abduction with Implicit Hitting Sets. (arXiv:1604.08229v1 [cs.AI])

Logic-based abduction finds important applications in artificial intelligence and related areas. One application example is in finding explanations for observed phenomena. Propositional abduction is a restriction of abduction to the propositional domain, and complexity-wise is in the second level of the polynomial hierarchy. Recent work has shown that exploiting implicit hitting sets and propositional satisfiability (SAT) solvers provides an efficient approach for propositional abduction. This paper investigates this earlier work and proposes a number of algorithmic improvements. These improvements are shown to yield exponential reductions in the number of SAT solver calls. More importantly, the experimental results show significant performance improvements compared to the the best approaches for propositional abduction.



from cs.AI updates on arXiv.org http://ift.tt/1SU9ICn
via IFTTT

Quantum Cognition Beyond Hilbert Space I: Fundamentals. (arXiv:1604.08268v1 [cs.AI])

The formalism of quantum theory in Hilbert space has been applied with success to the modeling and explanation of several cognitive phenomena, whereas traditional cognitive approaches were problematical. However, this 'quantum cognition paradigm' was recently challenged by its proven impossibility to simultaneously model 'question order effects' and 'response replicability'. In Part I of this paper we describe sequential dichotomic measurements within an operational and realistic framework for human cognition elaborated by ourselves, and represent them in a quantum-like 'extended Bloch representation' where the Born rule of quantum probability does not necessarily hold. In Part II we apply this mathematical framework to successfully model question order effects, response replicability and unpacking effects, thus opening the way toward quantum cognition beyond Hilbert space.



from cs.AI updates on arXiv.org http://ift.tt/1SO1zMC
via IFTTT

Quantum cognition beyond Hilbert space II: Applications. (arXiv:1604.08270v1 [cs.AI])

The research on human cognition has recently benefited from the use of the mathematical formalism of quantum theory in Hilbert space. However, cognitive situations exist which indicate that the Hilbert space structure, and the associated Born rule, would be insufficient to provide a satisfactory modeling of the collected data, so that one needs to go beyond Hilbert space. In Part I of this paper we follow this direction and present a general tension-reduction (GTR) model, in the ambit of an operational and realistic framework for human cognition. In this Part II we apply this non-Hilbertian quantum-like model to faithfully reproduce the probabilities of the 'Clinton/Gore' and 'Rose/Jackson' experiments on question order effects. We also explain why the GTR-model is needed if one wants to deal, in a fully consistent way, with response replicability and unpacking effects.



from cs.AI updates on arXiv.org http://ift.tt/1NEmm6f
via IFTTT

Semantic Reasoning for Context-aware Internet of Things Applications. (arXiv:1604.08340v1 [cs.AI])

Advances in ICT are bringing into reality the vision of a large number of uniquely identifiable, interconnected objects and things that gather information from diverse physical environments and deliver the information to a variety of innovative applications and services. These sensing objects and things form the Internet of Things (IoT) that can improve energy and cost efficiency and automation in many different industry fields such as transportation and logistics, health care and manufacturing, and facilitate our everyday lives as well. IoT applications rely on real-time context data and allow sending information for driving the behaviors of users in intelligent environments.



from cs.AI updates on arXiv.org http://ift.tt/1rm9gAC
via IFTTT

Exploiting variable associations to configure efficient local search algorithms in large-scale binary integer programs. (arXiv:1604.08448v1 [cs.DS])

We present a data mining approach for reducing the search space of local search algorithms in a class of binary integer programs including the set covering and partitioning problems. We construct a k-nearest neighbor graph by extracting variable associations from the instance to be solved, in order to identify promising pairs of flipping variables in the neighborhood search. We also develop a 4-flip neighborhood local search algorithm that flips four variables alternately along 4-paths or 4-cycles in the k-nearest neighbor graph. We incorporate an efficient incremental evaluation of solutions and an adaptive control of penalty weights into the 4-flip neighborhood local search algorithm. Computational comparison with the latest solvers shows that our algorithm performs effectively for large-scale set covering and partitioning problems.



from cs.AI updates on arXiv.org http://ift.tt/1SO1zMx
via IFTTT

Sentence Pair Scoring: Towards Unified Framework for Text Comprehension. (arXiv:1603.06127v2 [cs.CL] UPDATED)

We review the task of Sentence Pair Scoring, popular in the literature in various forms --- slanted as Answer Sentence Selection, Paraphrasing, Semantic Text Scoring, Next Utterance Ranking, Recognizing Textual Entailment or e.g.\ a component of Memory Networks.

We argue that all such tasks are similar from the model perspective and propose new baselines by comparing the performance of common IR metrics and popular convolutional, recurrent and attention-based neural models across many Sentence Pair Scoring tasks and datasets. We discuss the problem of evaluating randomized models, propose a statistically grounded methodology, and attempt to improve comparisons by releasing new datasets that are much harder than some of the currently used well explored benchmarks.

To address the current research fragmentation in a future-proof way, we introduce a unified open source software framework with easily pluggable models and tasks, allowing easy evaluation of sentence models on a wide range of semantic natural language datasets. This allows us to outline a path towards a universal learned semantic model for machine reading tasks. We support this plan by experiments that demonstrate reusability of trained sentence models across tasks and corpora of very different nature.



from cs.AI updates on arXiv.org http://ift.tt/1S1WM78
via IFTTT

A Discrete and Bounded Envy-Free Cake Cutting Protocol for Any Number of Agents. (arXiv:1604.03655v3 [cs.DS] UPDATED)

We consider the well-studied cake cutting problem in which the goal is to find an envy-free allocation based on queries from the agents. The problem has received attention in computer science, mathematics, and economics. It has been a major open problem whether there exists a bounded and discrete envy-free protocol. We resolve the problem by proposing a discrete and bounded envy-free protocol for any number of agents.



from cs.AI updates on arXiv.org http://ift.tt/1Q85mzr
via IFTTT

constructors can be anonymous?

Participate in discussions with other Treehouse members and learn.

from Google Alert - anonymous http://ift.tt/1pMfPeq
via IFTTT

Lambda (anonymous/first class procedures) and custom reporters

Yes. The high ceiling part doesn't mean you add new and complex features. It means that they're adding simple features with complex possibilities.

from Google Alert - anonymous http://ift.tt/1NY43DL
via IFTTT

'Individual A' Can Remain Anonymous in Hastert Case--For Now

An Illinois judge said Thursday the man who first accused Dennis Hastert of sexual abuse can remain anonymous — for now — as he presses ahead ...

from Google Alert - anonymous http://ift.tt/1qYWVSr
via IFTTT

Ravens Final Mock Draft: Mel Kiper - Ohio State DE Joey Bosa; Todd McShay - Ole Miss OT Laremy Tunsil (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

[Beta 16] - angular doesn't work after upgrade

scheduleMacroTask @ angular2-polyfills.js:299(anonymous function) ... system.src.js:371 Assertion failed: loading or loaded(anonymous function) ...

from Google Alert - anonymous http://ift.tt/1qYMgam
via IFTTT

Judge: Man suing Hastert can remain anonymous for now

YORKVILLE, Ill. (AP) — A judge says a man who alleges Dennis Hastert sexually abused him doesn't have to disclose his name in his lawsuit against ...

from Google Alert - anonymous http://ift.tt/1WtlcvG
via IFTTT

Judge: Man suing Hastert can remain anonymous for now

Judge: Man suing Hastert can remain anonymous for now. Published Thursday, April 28, 2016 | 9:12 a.m.. Updated 32 minutes ago. YORKVILLE, Ill.

from Google Alert - anonymous http://ift.tt/1rlhrNu
via IFTTT

2016 NFL draft: Eli Apple victim of anonymous scout absurdity

Mike Florio points out the ridiculousness of the anonymous scout's statement that Apple can't cook.

from Google Alert - anonymous http://ift.tt/1TgnBFa
via IFTTT

Orioles: In Q&A with ESPN The Mag, Manny Machado says he \"could be one of the best\" SS, still gets \"starstruck\" by A-Rod (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

In-Brief: Telegram Vulnerability, Malware in Nuclear Plant, Anti-Tor Malware and Hotpatching Exploit

Clickjacking Vulnerability in Telegram Web Client The official Telegram web-client that allows its users to access messenger account over desktop’s web browser is vulnerable to clickjacking web application vulnerability. Egyptian security researcher Mohamed A. Baset told The Hacker News about a flaw in Telegram that could allow an attacker to change sensitive information of a Telegram user,


from The Hacker News http://ift.tt/24mr3pj
via IFTTT

ISS Daily Summary Report – 04/27/16

Energy Operations: The crew completed day six of the ten-day European Space Agency (ESA) Energy experiment run by collecting ISS tap water samples taken from the Potable Water Dispenser (PWD) and body samples. This investigation will help determine the crewmembers’ energy requirements for long-term space flight.  Energy also measures adaptations in the components of total energy expenditure of crewmembers so that an equation to determine the energy requirements of crewmembers during space flight may be derived. Such knowledge of energy requirements is of a great importance to ensure health, good performance and the overall success of a mission, and also contributes to ensure adequate exercise load and cargo allotments for food during space flight.   Fluid Shifts Baseline Imaging Operations: With guidance from the ground teams, crewmembers began the second week of operations for Fluid Shifts by configuring Ultrasound 2 and performing an Ultrasound scan before conducting Cerebral and Cochlear Fluid Pressure (CCFP) measurement tests. Fluids Shifts is divided into three one-week segments: Dilution Measures, Baseline Imaging, and Baseline Imaging using the Russian Chibis Lower Body Negative Pressure (LBNP) device. The experiment measures how much fluid shifts from the lower body to the upper body, in or out of cells and blood vessels, and determines the impact these shifts have on fluid pressure in the head, changes in vision and eye structures.   Genes in Space: The crew completed the final of four planned sessions of the Genes in Space experiment by retrieving the miniPCR sample tubes from the Glacier, configuring the hardware in the Maintenance Work Area (MWA), and processing the samples in the miniPCR.  The investigation is a winning student-designed experiment to test whether the polymerase chain reaction (PCR) can be used to study deoxyribonucleic acid (DNA) alterations aboard the ISS.  Spaceflight causes many changes to the human body, including alterations in DNA and a weakened immune system. Understanding whether these two processes are linked is important for safeguarding crew health, but DNA technology that can track these changes is relatively untested in space.   NanoRack Module 9 Operations: The third of five NanoRacks Module 9 experiment sessions was completed today. The crew activated, deactivated, and shook the mixture tubes to facilitate the experiment. Module-9 is a collection of student research projects utilizing the NanoRacks mix sticks. Student teams from across the United States designed their own experiments using flight approved fluids and materials. The experiments include the Staphylococcus Epidermidis in Microgravity, Evaporation Investigation, Operation Germination of Cottonseeds, and Rust Formation in Microgravity.   Fine Motor Skills: A series of interactive tasks was completed for this investigation which is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.   Dose Tracker: The crew configured the Dose Tracker app and completed entries for medication tracking. This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The investigation collects observations about the relationship between crew members and their environment on the ISS. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Japanese Small Satellite Orbital Demonstration (JSSOD) Microsat “DIWATA” #1 (M-1) Deploy: Earlier this morning the crew opened the outer hatch and extended the Slide Table (ST) to the JEM Exposed Facility (JEF) in preparation for JEM Remote Manipulator System (JEMRMS) Multi-Purpose Experiment Platform (MPEP) grapple and deployment of the JSSOD M-1 satellite. Satellite deployment was completed successfully. The crew then retracted the ST and closed the hatch.  Microsat is a 50-kg-class microsatellite named “DIWATA-1” (meaning “fairy” in Filipino). It is the first microsatellite owned by the Philippine government with Filipino engineers involved in its development. The satellite will observe Earth and monitor climate changes.   Mobile Servicing System (MSS) Operations/H-II Transfer Vehicle (HTV)-6 Get-ahead Tasks: The robotics ground controllers continued with Special Purpose Dexterous Manipulator (SPDM) operations to retract the secondary bolts (H1), breaking torque on the primary bolts (H2), and re-torqueing the primary bolts to a lower setting on the S4 batteries.  All 3A battery bolts are complete except for battery 3A2-2 H1 bolt. Engineering and robotics teams are working a forward plan for battery 3A2-2 completion including whether the maximum commanded torque can be increased. The arm is now in position to support 1A battery operations scheduled to begin tomorrow.   Common Communications for Visiting Vehicles (C2V2) Radio Frequency (RF) Checkout Day 3: C2V2-A RF checkout test D was completed. C2V2-A sent Global Positioning System (GPS) Auxiliary Data (GAD) to the simulated Visiting Vehicle (Electronic System Test Laboratory) on the forward link. Ground teams verified health and status telemetry from the Visiting Vehicle on the return link.   Remote Power Controller Module (RPCM) LA2B_A Remote Power Controller (RPC) 4 Trip: RPCM LA2B_A RPC 4 tripped today.  This RPC powers the Rack Flow Control Assembly (RFCA) for EXPRESS Rack 2 (ER2). The RFCA was open at the time of the trip, so coolant is still flowing to the rack and there is no immediate impact to ER2 operation or Payloads in the rack. Review of the 50 Hz data dump indicates that this was an overcurrent trip of 3.5 +/ 0.2 amps which met the RPC Trip Limit. The RPC is currently open with closed command inhibited. Ground teams are investigating the cause of the trip.   Dragon Cargo Operations: As […]

from ISS On-Orbit Status Report http://ift.tt/24mkaEt
via IFTTT

Child Porn Suspect Held in Jail for 7 Months for refusing to Decrypt Hard Drives

In Brief A suspect of child pornography possession, Francis Rawls, who is a former Philadelphia Police Department sergeant, has been in solitary confinement without charges for last seven months and will remain until he complies with a court order forcing him to decrypt his password-protected hard drives seized in connection with a child pornography investigation. Remember Ramona Fricosu?


from The Hacker News http://ift.tt/1qXob3M
via IFTTT

Former Tor Developer Created Malware for FBI to Unmask Tor Users

In Brief According to an investigation, Matt Edman, a cyber security expert and former employee of the Tor Project, helped the FBI with Cornhusker a.k.a Torsploit malware that allowed Feds to hack and unmask Tor users in several high-profile cases, including Operation Torpedo and Silk Road. Do you know who created malware for the FBI that allowed Feds to unmask Tor users? It's an insider's


from The Hacker News http://ift.tt/1SRTsl7
via IFTTT

Anonymous to Andrew Jackson, December 10, 1833

Jackson, A. & Anonymous. (1833) Anonymous to Andrew Jackson, December 10, 1833 . [Manuscript/Mixed Material] Retrieved from the Library of ...

from Google Alert - anonymous http://ift.tt/1QCdN6v
via IFTTT

Anonymous user 0e8806

Name, Anonymous user 0e8806. User since, April 27, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/1rjTqX5
via IFTTT

PLATINUM Hackers Hijack Windows Hotpatching to Stay Hidden

In Brief The Microsoft’s Windows Defender Advanced Threat Hunting team detected that a cyber espionage group of hackers, known as PLATINUM, has found a way to turn the Windows's Hotpatching technique (a way of updating the operating system without requiring a restart) to hide its malware from Antivirus products. PLATINUM group has been active since 2009 and launching large-scale attacks


from The Hacker News http://ift.tt/244WHeq
via IFTTT

Omega Centauri: The Brightest Globular Star Cluster


This huge ball of stars predates our Sun. Long before humankind evolved, before dinosaurs roamed, and even before our Earth existed, ancient globs of stars condensed and orbited a young Milky Way Galaxy. Of the 200 or so globular clusters that survive today, Omega Centauri is the largest, containing over ten million stars. Omega Centauri is also the brightest globular cluster, at apparent visual magnitude 3.9 it is visible to southern observers with the unaided eye. Cataloged as NGC 5139, Omega Centauri is about 18,000 light-years away and 150 light-years in diameter. Unlike many other globular clusters, the stars in Omega Centauri show several different ages and trace chemical abundances, indicating that the globular star cluster has a complex history over its 12 billion year age. via NASA http://ift.tt/1WpI4MP

Wednesday, April 27, 2016

[FD] Xerox Phaser 6700 - Remote Root-Exploits utilizing Clone Files

Document Title: =============== Xerox Phaser 6700 - Remote Root-Exploits utilizing Clone Files References (Source): ==================== - http://ift.tt/1qVYGzL - http://ift.tt/26vSG1t - http://ift.tt/1qVYGzQ Release Date: ============= 2016-04-27 Product & Service Introduction: =============================== The Xerox Phaser 6700 is an office printer. http://ift.tt/26vSGhJ Vulnerability Disclosure Timeline: ================================== 2016-03-24: Notification and information exchange with Xerox. 2016-03-29: Verified issue for firmware 081.140.106.01300 as requested by Xerox and notified Xerox. 2016-04-27: Public Disclosure. Discovery Status: ================= Published Affected Product(s): ==================== Xerox Phaser 6700: - 081.140.103.22600 - 081.140.104.17600 - 081.140.105.00700 - 081.140.105.20400 - 081.140.106.01300 Exploitation Technique: ======================= - Remote: Xerox provides a clone feature to transfer printer settings. It is possible to run arbitrary code in these clone files. - Remote: The clone file upload page does not check the login credentials. - Local: The firmware is located on an easily accessible SD-card. It is possible to change the Linux based firmware. Solution - Fix & Patch: ======================= - Disable update and clone features. - Restrict admin access. Credits & Authors: ================== Fraunhofer FKIE: Raphael Ernst, Peter Weidenbach

Source: Gmail -> IFTTT-> Blogger

[FD] Bug bounty submission

Hi. My name is Takashi Suzuki. I found reflected xss on mozilla's services(wiki.mozilla.org). I want to list my bug on your list. What should I do? Full detail is found on bugzilla. Source: http://ift.tt/1T5Ubcl Thank you.

Source: Gmail -> IFTTT-> Blogger

Orioles Video: Joey Rickard rips a 3-run HR in the 5th inning to provide all the offense in a 3-1 win over the Rays (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Procedural Generation of Angry Birds Levels using Building Constructive Grammar with Chinese-Style and/or Japanese-Style Models. (arXiv:1604.07906v1 [cs.AI])

This paper presents a procedural generation method that creates visually attractive levels for the Angry Birds game. Besides being an immensely popular mobile game, Angry Birds has recently become a test bed for various artificial intelligence technologies. We propose a new approach for procedurally generating Angry Birds levels using Chinese style and Japanese style building structures. A conducted experiment confirms the effectiveness of our approach with statistical significance.



from cs.AI updates on arXiv.org http://ift.tt/1Wr3Nnn
via IFTTT

Distributed Flexible Nonlinear Tensor Factorization. (arXiv:1604.07928v1 [cs.LG])

Tensor factorization is an important approach to multiway data analysis. Compared with popular multilinear methods, nonlinear tensor factorization models are able to capture more complex relationships in data. However, they are computationally expensive and incapable of exploiting the data sparsity. To overcome these limitations, we propose a new tensor factorization model. The model employs a Gaussian process (GP) to capture the complex nonlinear relationships. The GP can be projected to arbitrary sets of tensor elements, and thus can avoid the expensive computation of the Kronecker product and is able to flexibly incorporate meaningful entries for training. Furthermore, to scale up the model to large data, we develop a distributed variational inference algorithm in MapReduce framework. To this end, we derive a tractable and tight variational evidence lower bound (ELBO) that enables efficient parallel computations and high quality inferences. In addition, we design a non-key-value Map-Reduce scheme that can prevent the costly data shuffling and fully use the memory-cache mechanism in fast MapReduce systems such as SPARK. Experiments demonstrate the advantages of our method over existing approaches in terms of both predictive performance and computational efficiency. Moreover, our approach shows a promising potential in the application of Click-Through-Rate (CTR) prediction for online advertising.



from cs.AI updates on arXiv.org http://ift.tt/24l1JQE
via IFTTT

The Power of Arc Consistency for CSPs Defined by Partially-Ordered Forbidden Patterns. (arXiv:1604.07981v1 [cs.CC])

Characterising tractable fragments of the constraint satisfaction problem (CSP) is an important challenge in theoretical computer science and artificial intelligence. Forbidding patterns (generic sub-instances) provides a means of defining CSP fragments which are neither exclusively language-based nor exclusively structure-based. It is known that the class of binary CSP instances in which the broken-triangle pattern (BTP) does not occur, a class which includes all tree-structured instances, are decided by arc consistency (AC), a ubiquitous reduction operation in constraint solvers. We provide a characterisation of simple partially-ordered forbidden patterns which have this AC-solvability property. It turns out that BTP is just one of five such AC-solvable patterns. The four other patterns allow us to exhibit new tractable classes.



from cs.AI updates on arXiv.org http://ift.tt/1TeXGh5
via IFTTT

Probabilistic Graphical Models on Multi-Core CPUs using Java 8. (arXiv:1604.07990v1 [cs.AI])

In this paper, we discuss software design issues related to the development of parallel computational intelligence algorithms on multi-core CPUs, using the new Java 8 functional programming features. In particular, we focus on probabilistic graphical models (PGMs) and present the parallelisation of a collection of algorithms that deal with inference and learning of PGMs from data. Namely, maximum likelihood estimation, importance sampling, and greedy search for solving combinatorial optimisation problems. Through these concrete examples, we tackle the problem of defining efficient data structures for PGMs and parallel processing of same-size batches of data sets using Java 8 features. We also provide straightforward techniques to code parallel algorithms that seamlessly exploit multi-core processors. The experimental analysis, carried out using our open source AMIDST (Analysis of MassIve Data STreams) Java toolbox, shows the merits of the proposed solutions.



from cs.AI updates on arXiv.org http://ift.tt/1Wr3KIe
via IFTTT

Selecting the Selection. (arXiv:1604.08055v1 [cs.AI])

Modern saturation-based Automated Theorem Provers typically implement the superposition calculus for reasoning about first-order logic with or without equality. Practical implementations of this calculus use a variety of literal selections and term orderings to tame the growth of the search space and help steer proof search. This paper introduces the notion of lookahead selection that estimates (looks ahead) the effect on the search space of selecting a literal. There is also a case made for the use of incomplete selection functions that attempt to restrict the search space instead of satisfying some completeness criteria. Experimental evaluation in the \Vampire\ theorem prover shows that both lookahead selection and incomplete selection significantly contribute to solving hard problems unsolvable by other methods.



from cs.AI updates on arXiv.org http://ift.tt/1TeXHS3
via IFTTT

Defining Concepts of Emotion: From Philosophy to Science. (arXiv:1604.08148v1 [cs.AI])

This paper is motivated by a series of (related) questions as to whether a computer can have pleasure and pain, what pleasure (and intensity of pleasure) is, and, ultimately, what concepts of emotion are.

To determine what an emotion is, is a matter of conceptualization, namely, understanding and explicitly encoding the concept of emotion as people use it in everyday life. This is a notoriously difficult problem (Frijda, 1986, Fehr \& Russell, 1984). This paper firstly shows why this is a difficult problem by aligning it with the conceptualization of a few other so called semantic primitives such as "EXIST", "FORCE", "BIG" (plus "LIMIT"). The definitions of these thought-to-be-indefinable concepts, given in this paper, show what formal definitions of concepts look like and how concepts are constructed. As a by-product, owing to the explicit account of the meaning of "exist", the famous dispute between Einstein and Bohr is naturally resolved from linguistic point of view. Secondly, defending Frijda's view that emotion is action tendency (or Ryle's behavioral disposition (propensity)), we give a list of emotions defined in terms of action tendency. In particular, the definitions of pleasure and the feeling of beauty are presented.

Further, we give a formal definition of "action tendency", from which the concept of "intensity" of emotions (including pleasure) is naturally derived in a formal fashion. The meanings of "wish", "wait", "good", "hot" are analyzed.



from cs.AI updates on arXiv.org http://ift.tt/1Wr3KrM
via IFTTT

Classifying Options for Deep Reinforcement Learning. (arXiv:1604.08153v1 [cs.LG])

Deep reinforcement learning is the learning of multiple levels of hierarchical representations for reinforcement learning. Hierarchical reinforcement learning focuses on temporal abstractions in planning and learning, allowing temporally-extended actions to be transferred between tasks. In this paper we combine one method for hierarchical reinforcement learning - the options framework - with deep Q-networks (DQNs) through the use of different "option heads" on the policy network, and a supervisory network for choosing between the different options. We show that in a domain where we have prior knowledge of the mapping between states and options, our augmented DQN achieves a policy competitive with that of a standard DQN, but with much lower sample complexity. This is achieved through a straightforward architectural adjustment to the DQN, as well as an additional supervised neural network.



from cs.AI updates on arXiv.org http://ift.tt/1TeXHBL
via IFTTT

Train and Test Tightness of LP Relaxations in Structured Prediction. (arXiv:1511.01419v3 [stat.ML] UPDATED)

Structured prediction is used in areas such as computer vision and natural language processing to predict structured outputs such as segmentations or parse trees. In these settings, prediction is performed by MAP inference or, equivalently, by solving an integer linear program. Because of the complex scoring functions required to obtain accurate predictions, both learning and inference typically require the use of approximate solvers. We propose a theoretical explanation to the striking observation that approximations based on linear programming (LP) relaxations are often tight on real-world instances. In particular, we show that learning with LP relaxed inference encourages integrality of training instances, and that tightness generalizes from train to test data.



from cs.AI updates on arXiv.org http://ift.tt/1GMs2ry
via IFTTT

Simple, Robust and Optimal Ranking from Pairwise Comparisons. (arXiv:1512.08949v2 [cs.LG] UPDATED)

We consider data in the form of pairwise comparisons of n items, with the goal of precisely identifying the top k items for some value of k < n, or alternatively, recovering a ranking of all the items. We analyze the Copeland counting algorithm that ranks the items in order of the number of pairwise comparisons won, and show it has three attractive features: (a) its computational efficiency leads to speed-ups of several orders of magnitude in computation time as compared to prior work; (b) it is robust in that theoretical guarantees impose no conditions on the underlying matrix of pairwise-comparison probabilities, in contrast to some prior work that applies only to the BTL parametric model; and (c) it is an optimal method up to constant factors, meaning that it achieves the information-theoretic limits for recovering the top k-subset. We extend our results to obtain sharp guarantees for approximate recovery under the Hamming distortion metric, and more generally, to any arbitrary error requirement that satisfies a simple and natural monotonicity condition.



from cs.AI updates on arXiv.org http://ift.tt/1JKngGM
via IFTTT

Anonymous scout criticizes Eli Apple because he 'can't cook'

An anonymous scout criticized Ohio State cornerback Eli Apple because he “can't cook,” reports the Milwaukee Journal Sentinel's Bob McGinn.

from Google Alert - anonymous http://ift.tt/1NULe4m
via IFTTT

I have a new follower on Twitter


Frida Grigsby
Socialist ✪ Veggie advocate ✪ Evil beer maven


Following: 1670 - Followers: 283

April 27, 2016 at 04:33PM via Twitter http://twitter.com/FrdGrgsby

I have a new follower on Twitter


Monica Boan
Hiker ✪ Fitness guru ✪ Passionate entrepreneur


Following: 1763 - Followers: 315

April 27, 2016 at 04:33PM via Twitter http://twitter.com/MonicBon261

Eli Apple's mom responds after anonymous NFL scout disses her son

BLACKSBURG, VA – SEPTEMBER 7: Eli Apple #13 of the Ohio State Buckeyes looks on against the Virginia Tech Hokies at Lane Stadium on ...

from Google Alert - anonymous http://ift.tt/1N0l59r
via IFTTT

anonymous avatar

Buy ANONYMOUS AVATAR [DLC] for PS4 from PlayStation®Store US for $1.99. Download PlayStation® games and DLC to PS4™, PS3™, and PS ...

from Google Alert - anonymous http://ift.tt/1riuBei
via IFTTT

[FD] EMC M&R (Watch4net) lacks Cross-Site Request Forgery protection

--------------------------------------------------------------------

Source: Gmail -> IFTTT-> Blogger

This Tiny Computer has no Battery, Powered Wirelessly from Radio Waves

No matter how smart and fast your devices would be, the biggest issue is always with the battery technology. Whenever you go to buy any electronic gadget — smartphone, laptop, or any wearable — the most important specification isn’t its processor speed or its camera quality but its Battery Backup, which is not getting better any time soon. What if you could eliminate the very thing entirely


from The Hacker News http://ift.tt/1pERUNK
via IFTTT

[FD] Oracle Discoverer Viewer BI - Open Redirect Vulnerability

Document Title: =============== Oracle Discoverer Viewer BI - Open Redirect Vulnerability References (Source): ==================== http://ift.tt/1XTUsDE Oracle ID: S0666670 Release Date: ============= 2016-04-26 Vulnerability Laboratory ID (VL-ID): ==================================== 1667 Common Vulnerability Scoring System: ==================================== 2.8 Product & Service Introduction: =============================== Discoverer is an intuitive ad-hoc query, reporting, analysis, and Web-publishing tool that empowers business users at all levels of the organization to gain immediate access to information from data marts, data warehouses, online transaction processing systems and Oracle E-Business Suite.. The latest release of Oracle Business Intelligence Discoverer 11g offers new functionality, including published Discoverer Webservice APIs, integration with Oracle WebCenter, integration with Oracle WebLogic Server, integration with Enterprise Manager (Fusion Middleware Control) and improved performance and scalability. (Copy of the Vendor Homepage: http://ift.tt/1QAapZQ ) Abstract Advisory Information: ============================== An independent vulnerability laboratory researcher discovered an open redirect web vulnerability in the official Oracle Discoverer Viewer Business Intelligence software. Vulnerability Disclosure Timeline: ================================== 2016-01-18: Researcher Notification & Coordination (Tommy DeVoss) 2016-01-19: Vendor Notification (Oracle Corporation Security Team) 2016-01-20: Vendor Response/Feedback (Oracle Corporation Security Team) 2016-04-25: Vendor Fix/Patch (Oracle BI Developer Team) 2016-04-26: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Oracle Product: Oracle Discoverer Viewer Business Intelligence - Software 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== Low Technical Details & Description: ================================ An open redirect web vulnerability has been discovered in the official Oracle Discoverer Viewer for Business Intelligence software. The bug allows remote attackers to execute external urls by the internal web-application requests via client-side. The vulnerability is located in the `customUrl` parameter of the vulnerable `exit` module. The vulnerability allows an remote attacker to prepare client-side malicious urls to external sources. The request method to execute is GET and the vulnerability is located on the application-side of the software. The vulnerability is a classic open redirect web vulnerability. The security risk of the open redirect web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.0. Exploitation of the persistent input validation web vulnerability requires no privileged user account and low or medium user interaction. Successful exploitation of the vulnerability results in client-side redirects to malicious sources or client-side phishing. Request Method(s): [+] GET Vulnerable Module(s): [+] exit Vulnerable Parameter(s): [+] customUrl Proof of Concept (PoC): ======================= The open redirect web vulnerability can be exploited by remote attackers without privileged web-application user account and with medium user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: 127.0.0.1:8080/path/to/app/exit?event=exit&clientType=viewer&customUrl=http://[EVIL-URL-INPUT!].com Solution - Fix & Patch: ======================= The vulnerability can be patched by a secure restriction of the `customUrl` parameter in the `exit` module of the software. Disallow to request not whitelisted webpages in the `customURL` value and include a tag filter to prevent as well. Security Risk: ============== The security risk of the open redirect web vulnerability in the Oracle Discoverer Viewer Business Intelligence software is estimated as low. (CVSS 2.8) Credits & Authors: ================== Tommy DeVoss - [http://ift.tt/1QAapZR] Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. Vulnerability Lab disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability-Lab or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if Vulnerability-Lab or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. We do not approve or encourage anybody to break any licenses, policies, deface websites, hack into databases or trade with stolen data. Domains: http://ift.tt/1jnqRwA - www.vuln-lab.com - http://ift.tt/1kouTut Contact: admin@vulnerability-lab.com - research@vulnerability-lab.com - admin@evolution-sec.com Section: magazine.vulnerability-lab.com - http://ift.tt/1zNuo47 - http://ift.tt/1wo6y8x Social: twitter.com/vuln_lab - http://ift.tt/1kouSqa - http://youtube.com/user/vulnerability0lab Feeds: http://ift.tt/1iS1DH0 - http://ift.tt/1kouSqh - http://ift.tt/1kouTKS Programs: http://ift.tt/1iS1GCs - http://ift.tt/1iS1FyF - http://ift.tt/1oSBx0A Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability Laboratory. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by Vulnerability-Lab Research Team or its suppliers. All pictures, texts, advisories, source code, videos and other information on this website is trademark of vulnerability-lab team & the specific authors or managers. To record, list, modify, use or edit our material contact (admin@ or research@vulnerability-lab.com) to get a ask permission. Copyright © 2016 | Vulnerability Laboratory - [Evolution Security GmbH]™

Source: Gmail -> IFTTT-> Blogger

For the First time, FBI discloses a Flaw to Apple, but it's already Patched!

In Brief The Federal Bureau of Investigation (FBI) made its first disclosure about a software security flaw to Apple under the Vulnerability Equities Process (VEP), a White House initiative created in April 2014 for reviewing flaws and deciding which ones should be made public. Unfortunately, the vulnerability reported by the federal agency only affected older versions of Apple’s iOS and OS


from The Hacker News http://ift.tt/26tCQ7q
via IFTTT

Ocean City, MD's surf is at least 5.14ft high

Maryland-Delaware, May 03, 2016 at 04:00AM

Ocean City, MD Summary
At 4:00 AM, surf min of 5.14ft. At 10:00 AM, surf min of 5.22ft. At 4:00 PM, surf min of 4.77ft. At 10:00 PM, surf min of 4.34ft.

Surf maximum: 6.01ft (1.83m)
Surf minimum: 5.14ft (1.57m)
Tide height: 3.59ft (1.09m)
Wind direction: ENE
Wind speed: 22.33 KTS


from Surfline http://ift.tt/1kVmigH
via IFTTT

Lambda (anonymous/first class procedures) and custom reporters

The Sticky wrote: If Scratch was a room, it would have a low floor, wide walls, and a high ceiling. * Low floor: It should be easy to climb in and get ...

from Google Alert - anonymous http://ift.tt/1ryNudf
via IFTTT

Anonymous Resume

Here's the concept: A website where people can go and create a profile of their professional accomplishments. This is a concept...

from Google Alert - anonymous http://ift.tt/1Wp7vOz
via IFTTT

NGC 6872: A Stretched Spiral Galaxy


What makes this spiral galaxy so long? Measuring over 700,000 light years across from top to bottom, NGC 6872, also known as the Condor galaxy, is one of the most elongated barred spiral galaxies known. The galaxy's protracted shape likely results from its continuing collision with the smaller galaxy IC 4970, visible just above center. Of particular interest is NGC 6872's spiral arm on the upper left, as pictured here, which exhibits an unusually high amount of blue star forming regions. The light we see today left these colliding giants before the days of the dinosaurs, about 300 million years ago. NGC 6872 is visible with a small telescope toward the constellation of the Peacock (Pavo). via NASA http://ift.tt/1reZNLn

ISS Daily Summary Report – 04/26/16

Rodent Research 3 (RR-3) Operations: The RR-3 access units were inspected with no issues and restocked with food bars. RR-3 studies molecular and physical changes in the musculoskeletal system that happen in space. Results expand scientists’ understanding of muscle atrophy and bone loss in space, while testing an antibody that has been known to prevent muscle wasting in mice on Earth.   Fluid Shifts Baseline Imaging Preparation: In preparation for this week’s Fluid Shifts exercises, the crew configured hardware and the Cerebral and Cochlear Fluid Pressure (CCFP) analyzer device which will be used to conduct measurement tests. Fluids Shift is divided into three one-week segments: Dilution Measures, Baseline Imaging, and Baseline Imaging using the Russian Chibis Lower Body Negative Pressure (LBNP) device. The experiment measures how much fluid shifts from the lower body to the upper body, in or out of cells and blood vessels, and determines the impact these shifts have on fluid pressure in the head, changes in vision and eye structures.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the International Space Station. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Wet Lab Ribonucleic Acid (RNA) SmartCycler Session: The crew completed the third of four Wet Lab RNA SmartCycler sessions by processing a quality control sample to verify that the SmartCycler operates as expected in microgravity. The Wet Lab RNA SmartCycler is a research platform for conducting real-time quantitative gene expression analysis aboard the ISS. The system enables spaceflight genomic studies involving a wide variety of biospecimen types in the unique microgravity environment of space.   Common Communications for Visiting Vehicles (C2V2) Radio Frequency (RF) Checkout: The C2V2 Comm Units are two fully redundant radios (C2V2 A and C2V2 B) that are planned for use with future visiting vehicles. The units were installed on March 11 in MSS-2 rack in the LAB. Initial activation was performed on April 1. The following tests have been completed. Monday: A Radio Frequency (RF) pass lasting approximately 8 minutes was completed successfully with appropriate “fill frames” transmitted to the ground. This test provided confirmation that the C2V2 A’s forward and aft antennas are functioning as planned. Tuesday: Two tests were performed. In the first test, C2V2-A successfully sent a command and GPS Auxiliary Data (GAD) to Electronic System Test Laboratory (ESTL) on the forward link. In the second test, C2V2-A successfully sent GAD, Broadcast Auxiliary Data (BAD) and Audio to ESTL on the forward link and successful performed a comm check on S/G 4 between CAPCOM and ESTL. Checkout tests are planned daily until May 6.   Recycle Fill Tank Assembly (RFTA): On Sunday the RFTA stopped short of empty when draining to a Russian [EDV]. The ball bearing level indication stopped short of full by ½” to ¾”.  The crew proceeded with troubleshooting and completed the RFTA drain to a Temporary Urine and Brine Storage System (TUBSS).  The likely cause was the EDV initially used had some residue brine that caused the RFTA to not drain completely. Ground teams will continue to track the performance of the tanks.   Mobile Servicing System (MSS) Operations/HTV-6 Get-ahead Tasks: Yesterday, Special Purpose Dexterous Manipulator (SPDM) operations began fully retracting the secondary bolts (H1), breaking torque on the primary bolts (H2), and re-torquing the primary bolts to a lower setting on the S4 batteries. Ground teams operations were successful for 6 bolts, unsuccessful for 2 bolts, and have 4 bolts that remain to be attempted. Later today, re-attempts on bolts 3A2-1 H1, 3A2-2 H1 and initial attempts on the 4 remaining H2 bolts will resume. Order of operation and status is as follows: 3A Battery 3A2-1, Bolt H1 – Not successful 3A Battery 3A2-2, Bolt H1 – Not successful 3A Battery 3A2-1, Bolt H2 – Forward work (Can’t be attempted until H1 released) 3A Battery 3A2-2, Bolt H2 – Forward work (Can’t be attempted until H1 released) 3A Battery 3A1-1, Bolt H1 – Successful 3A Battery 3A1-2, Bolt H1 – Successful 3A Battery 3A1-2, Bolt H2 – Successful 3A Battery 3A1-1, Bolt H2 – Successful 3A Battery 3A3-1, Bolt H1 – Successful 3A Battery 3A3-2, Bolt H1 – Successful 3A Battery 3A3-1, Bolt H2 – Forward work (Ran out of time on 4/25/16) 3A Battery 3A3-2, Bolt H2 – Forward work (Ran out of time on 4/25/16)   London Marathon: On Sunday, Peake ran the 26.2-mile London Marathon on the Treadmill 2 (T2) in an estimated time of 3:35:21. He was the official starter of the race and watched BBC coverage of the event while running. He is the second astronaut to run a marathon on the ISS. In 2007, Sunita Williams ran the Boston Marathon on T2.   Today’s Planned Activities All activities were completed unless otherwise noted. ENERGY Diet Log of Breakfast On MCC Go Micropurification Unit (БМП) Ф2 Absorption Cartridge Regeneration (Start) CORRECTSIA. Logging Liquid and Food (Medicine) Intake / r/g 2047 Transfer from EDV to TUBSS Greetings Video Recording / r/g 2075 EDV swap WRS – Water Sample Analysis Soyuz 720 Samsung Tablet Recharge – Start VIZIR. Hardware Installation, Software Update and Hardware Calibration r/g 2079 + New SW version SCYC. Sample retrieval from MERLIN-3 for Session 2 Soyuz 719 Samsung Tablet Recharge – Start MDE. Sample Retrieval and Temporary Stowage Tear down EDV to TUBBS transfer setup SEISMOPROGNOZ. Data Transfer from МКСД HDD (Start) r/g 1595 КОХ1 Technical Specifications Check.  Ñ€/г 2057 In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill Fluids Integrated Rack (FIR) Rack Doors Open Photo TV Camera Set Up LMM- Plate Change out Photo/TV RR- Camcorder Video Setup In Flight Maintenance (IFM) Waste and Hygiene Compartment (WHC) Full Fill Fluids Integrated Rack (FIR) Rack Doors Close СОЖ Maintenance HABIT […]

from ISS On-Orbit Status Report http://ift.tt/1pDkfny
via IFTTT

Tuesday, April 26, 2016

Anonymous Link

This Qualtrics support page teaches about the Anonymous Link distribution feature, which is a URL that can be accessed by nearly anyone.

from Google Alert - anonymous http://ift.tt/1rgAFnt
via IFTTT

Anonymous user e3fb62

Name, Anonymous user e3fb62. User since, April 6, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/26sJKcV
via IFTTT

Conversational Markers of Constructive Discussions. (arXiv:1604.07407v1 [cs.CL])

Group discussions are essential for organizing every aspect of modern life, from faculty meetings to senate debates, from grant review panels to papal conclaves. While costly in terms of time and organization effort, group discussions are commonly seen as a way of reaching better decisions compared to solutions that do not require coordination between the individuals (e.g. voting)---through discussion, the sum becomes greater than the parts. However, this assumption is not irrefutable: anecdotal evidence of wasteful discussions abounds, and in our own experiments we find that over 30% of discussions are unproductive.

We propose a framework for analyzing conversational dynamics in order to determine whether a given task-oriented discussion is worth having or not. We exploit conversational patterns reflecting the flow of ideas and the balance between the participants, as well as their linguistic choices. We apply this framework to conversations naturally occurring in an online collaborative world exploration game developed and deployed to support this research. Using this setting, we show that linguistic cues and conversational patterns extracted from the first 20 seconds of a team discussion are predictive of whether it will be a wasteful or a productive one.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/24iDm6c
via IFTTT

Balancing Appearance and Context in Sketch Interpretation. (arXiv:1604.07429v1 [cs.AI])

We describe a sketch interpretation system that detects and classifies clock numerals created by subjects taking the Clock Drawing Test, a clinical tool widely used to screen for cognitive impairments (e.g., dementia). We describe how it balances appearance and context, and document its performance on some 2,000 drawings (about 24K clock numerals) produced by a wide spectrum of patients. We calibrate the utility of different forms of context, describing experiments with Conditional Random Fields trained and tested using a variety of features. We identify context that contributes to interpreting otherwise ambiguous or incomprehensible strokes. We describe ST-slices, a novel representation that enables "unpeeling" the layers of ink that result when people overwrite, which often produces ink impossible to analyze if only the final drawing is examined. We characterize when ST-slices work, calibrate their impact on performance, and consider their breadth of applicability.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/1WoMi7i
via IFTTT

Semantic Change Detection with Hypermaps. (arXiv:1604.07513v1 [cs.CV])

Change detection is the study of detecting changes between two different images of a scene taken at different times. This paper proposes the concept of semantic change detection, which involves intuitively inserting semantic meaning into detected change areas. The problem to be solved consists of two parts, semantic segmentation and change detection. In order to solve this problem and obtain a high-level of performance, we propose an improvement to the hypercolumns representation, hereafter known as hypermaps, which effectively uses convolutional maps obtained from convolutional neural networks (CNNs). We also employ multi-scale feature representation captured by different image patches. We applied our method to the TSUNAMI Panoramic Change Detection dataset, and re-annotated the changed areas of the dataset via semantic classes. The results show that our multi-scale hypermaps provided outstanding performance on the re-annotated TSUNAMI dataset.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/24iDm62
via IFTTT

Mutual Transformation of Information and Knowledge. (arXiv:1604.07625v1 [cs.AI])

Information and knowledge are transformable into each other. Information transformation into knowledge by the example of rule generation from OWL (Web Ontology Language) ontology has been shown during the development of the SWES (Semantic Web Expert System). The SWES is expected as an expert system for searching OWL ontologies from the Web, generating rules from the found ontologies and supplementing the SWES knowledge base with these rules. The purpose of this paper is to show knowledge transformation into information by the example of ontology generation from rules.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/1WoMjIj
via IFTTT

Tournament selection in zeroth-level classifier systems based on average reward reinforcement learning. (arXiv:1604.07704v1 [cs.AI])

As a genetics-based machine learning technique, zeroth-level classifier system (ZCS) is based on a discounted reward reinforcement learning algorithm, bucket-brigade algorithm, which optimizes the discounted total reward received by an agent but is not suitable for all multi-step problems, especially large-size ones. There are some undiscounted reinforcement learning methods available, such as R-learning, which optimize the average reward per time step. In this paper, R-learning is used as the reinforcement learning employed by ZCS, to replace its discounted reward reinforcement learning approach, and tournament selection is used to replace roulette wheel selection in ZCS. The modification results in classifier systems that can support long action chains, and thus is able to solve large multi-step problems.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/24iDlPN
via IFTTT

Distributed Clustering of Linear Bandits in Peer to Peer Networks. (arXiv:1604.07706v1 [cs.LG])

We provide two distributed confidence ball algorithms for solving linear bandit problems in peer to peer networks with limited communication capabilities. For the first, we assume that all the peers are solving the same linear bandit problem, and prove that our algorithm achieves the optimal asymptotic regret rate of any centralised algorithm that can instantly communicate information between the peers. For the second, we assume that there are clusters of peers solving the same bandit problem within each cluster, and we prove that our algorithm discovers these clusters, while achieving the optimal asymptotic regret rate within each one. Through experiments on several real-world datasets, we demonstrate the performance of proposed algorithms compared to the state-of-the-art.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/1WoMi7e
via IFTTT

Using Indirect Encoding of Multiple Brains to Produce Multimodal Behavior. (arXiv:1604.07806v1 [cs.AI])

An important challenge in neuroevolution is to evolve complex neural networks with multiple modes of behavior. Indirect encodings can potentially answer this challenge. Yet in practice, indirect encodings do not yield effective multimodal controllers. Thus, this paper introduces novel multimodal extensions to HyperNEAT, a popular indirect encoding. A previous multimodal HyperNEAT approach called situational policy geometry assumes that multiple brains benefit from being embedded within an explicit geometric space. However, experiments here illustrate that this assumption unnecessarily constrains evolution, resulting in lower performance. Specifically, this paper introduces HyperNEAT extensions for evolving many brains without assuming geometric relationships between them. The resulting Multi-Brain HyperNEAT can exploit human-specified task divisions to decide when each brain controls the agent, or can automatically discover when brains should be used, by means of preference neurons. A further extension called module mutation allows evolution to discover the number of brains, enabling multimodal behavior with even less expert knowledge. Experiments in several multimodal domains highlight that multi-brain approaches are more effective than HyperNEAT without multimodal extensions, and show that brains without a geometric relation to each other outperform situational policy geometry. The conclusion is that Multi-Brain HyperNEAT provides several promising techniques for evolving complex multimodal behavior.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/24iDlPD
via IFTTT

An Empirical Study into Annotator Agreement, Ground Truth Estimation, and Algorithm Evaluation. (arXiv:1307.0426v3 [cs.CV] UPDATED)

Although agreement between annotators has been studied in the past from a statistical viewpoint, little work has attempted to quantify the extent to which this phenomenon affects the evaluation of computer vision (CV) object detection algorithms. Many researchers utilise ground truth (GT) in experiments and more often than not this GT is derived from one annotator's opinion. How does the difference in opinion affect an algorithm's evaluation? Four examples of typical CV problems are chosen, and a methodology is applied to each to quantify the inter-annotator variance and to offer insight into the mechanisms behind agreement and the use of GT. It is found that when detecting linear objects annotator agreement is very low. The agreement in object position, linear or otherwise, can be partially explained through basic image properties. Automatic object detectors are compared to annotator agreement and it is found that a clear relationship exists. Several methods for calculating GTs from a number of annotations are applied and the resulting differences in the performance of the object detectors are quantified. It is found that the rank of a detector is highly dependent upon the method used to form the GT. It is also found that although the STAPLE and LSML GT estimation methods appear to represent the mean of the performance measured using the individual annotations, when there are few annotations, or there is a large variance in them, these estimates tend to degrade. Furthermore, one of the most commonly adopted annotation combination methods--consensus voting--accentuates more obvious features, which results in an overestimation of the algorithm's performance. Finally, it is concluded that in some datasets it may not be possible to state with any confidence that one algorithm outperforms another when evaluating upon one GT and a method for calculating confidence bounds is discussed.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/12hOdvC
via IFTTT

Network of Bandits. (arXiv:1602.03779v6 [cs.AI] UPDATED)

The distribution of the best arm identification task on the user's devices offers several advantages for application purposes: scalability, reduction of deployment costs and privacy. We propose a distributed version of the algorithm Successive Elimination using a simple architecture based on a single server which synchronizes each task executed on the user's devices. We show that this algorithm is near optimal both in terms of transmitted number of bits and in terms of number of pulls per player. Finally, we propose an extension of this approach to distribute the contextual bandit algorithm Bandit Forest, which is able to finely exploit the user's data while guaranteeing the privacy.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/1XmBDce
via IFTTT

Protein Secondary Structure Prediction Using Cascaded Convolutional and Recurrent Neural Networks. (arXiv:1604.07176v1 [q-bio.BM])

Protein secondary structure prediction is an important problem in bioinformatics. Inspired by the recent successes of deep neural networks, in this paper, we propose an end-to-end deep network that predicts protein secondary structures from integrated local and global contextual features. Our deep architecture leverages convolutional neural networks with different kernel sizes to extract multiscale local contextual features. In addition, considering long-range dependencies existing in amino acid sequences, we set up a bidirectional neural network consisting of gated recurrent unit to capture global contextual features. Furthermore, multi-task learning is utilized to predict secondary structure labels and amino-acid solvent accessibility simultaneously. Our proposed deep network demonstrates its effectiveness by achieving state-of-the-art performance, i.e., 69.7% Q8 accuracy on the public benchmark CB513, 76.9% Q8 accuracy on CASP10 and 73.1% Q8 accuracy on CASP11. Our model and results are publicly available.

Help us improve arXiv so we can better serve you. Take our user survey (survey closes April 27, 8PM EDT).



from cs.AI updates on arXiv.org http://ift.tt/1WQEtYw
via IFTTT

Ravens Video: Jamison Hensley gives reasons for taking Ole Miss OT Laremy Tunsil with 6th pick in NFL Nation mock draft (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous user eff2e3

Name, Anonymous user eff2e3. User since, April 24, 2016. Number of add-ons developed, 0 add-ons. Average rating of developer's add-ons, Not yet ...

from Google Alert - anonymous http://ift.tt/1VR72q2
via IFTTT

Ravens Buzz: Ohio State's Joey Bosa and other pass-rushers targeted at No. 6 in the draft, source tells Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Pro-ISIS Hackers releases 'Kill List' Of 43 United States Officials

In Brief A group of pro-ISIS hackers calling themselves the United Cyber Caliphate (UCC) has issued a "Kill List" containing the names of dozens of U.S. government personnel at the Pentagon, Department of Homeland Security, State Department, and several other federal agencies. Meanwhile, the US military’s Cyber Command has announced to launch its first attack against ISIS' digital


from The Hacker News http://ift.tt/24hRKvo
via IFTTT

This SUMMER, Make up to $8000+MORE. Immediate Need 4 Anonymous Donors

Attention Women 21-30: Become an Anonymous Egg Donor! Make up to $8000 + MORE While Helping Others! Would you like to make up to $8000+ ...

from Google Alert - anonymous http://ift.tt/1NPkan8
via IFTTT

Ravens could provide first big surprise of the NFL draft by choosing LT Ronnie Stanley over LT Laremy Tunsil - Hensleu (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

In-Brief: Spotify Hack, Secret of Chrome OS, MIT Bug Bounty, Nanowire Batteries

1. Spotify Hacked! Change your Password ASAP If you are one of the millions of people around the world who love to listen to music on Spotify, you may need to change your password immediately. Has Spotify been hacked? The company says no, but some Spotify users have claimed their profiles were hijacked, and details were changed without knowledge, including passwords and email addresses <!--


from The Hacker News http://ift.tt/1rfanC2
via IFTTT

how do I plot this anonymous function?

Hi i can't seem to figure this problem out and i thought i should ask someone. When i make the anonymous function: MyFunct = @x 3*x^2 - 2*x + 5.

from Google Alert - anonymous http://ift.tt/1Tb6YdZ
via IFTTT

[FD] Trend Micro (Account) - Email Spoofing Web Vulnerability

Document Title: =============== Trend Micro (Account) - Email Spoofing Web Vulnerability References (Source): ==================== http://ift.tt/1VNAPzL Trend Micro ID: 1-1-1035655030 Release Date: ============= 2016-04-25 Vulnerability Laboratory ID (VL-ID): ==================================== 1693 Common Vulnerability Scoring System: ==================================== 4.6 Product & Service Introduction: =============================== Trend Micro Inc. is a global security software company founded in Los Angeles, California with global headquarters in Tokyo, Japan, and regional headquarters in Asia, Europe and the Americas. The company develops security software for servers, cloud computing environments, and small business. Its cloud and virtualization security products provide cloud security for customers of VMware, Amazon AWS, Microsoft Azure and vCloud Air. Eva Chen serves as Trend Micro’s chief executive officer, a position she has held since 2005 when she succeeded founding CEO Steve Chang. Chang serves as chairman of Trend Micro. (Copy of the Homepage: http://ift.tt/1RrWcmK ) Abstract Advisory Information: ============================== The Vulnerability Laboratory Core Research Team discovered an application-side vulnerability in the official Trend Micro Accounts online service web-application. Vulnerability Disclosure Timeline: ================================== 2016-01-28: Researcher Notification & Coordination (Hadji Samir - Evolution Security GmbH) 2016-01-29: Vendor Notification (Trend Micro Security Team) 2016-02-02: Vendor Response/Feedback (Trend Micro Security Team) 2016-04-24: Vendor Fix/Patch (Trend Micro Developer Team) 2016-04-25: Security Acknowledgements (Trend Micro Security Team) 2016-04-25: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Trend Micro Product: Account System - (Web-Application) 2016 Q1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A persistant email spoofing web vulnerability has been discovered in the official Trendmirco online-service web-application. The vulnerability allows an remote attacker to send spoofed emails with injected malicious script codes or changed content. The persistent vulnerability is located in the `Share your protection` email function. It allows users to promote a product to friends or family. Remote attackers are able to inject own malicious script codes to the `download url` & `message` values of the `sendEmail` POST method request. The request method to inject is POST and the attack vector of the vulnerability is located on the application-side of the service. Remote attackers are able to manipulate the download url source and the message body context. The execution occurs in the email that arrives to the target inbox, when preparing to share. The security risk of the application-side web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 4.6. Exploitation of the application-side web vulnerability requires a low privileged web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in persistent phishing mails, session hijacking, persistent external redirect to malicious sources and application-side manipulation of affected or connected software module context. Request Method(s): [+] POST Vulnerable Module(s): [+] /my_account/product/ Vulnerable File(s): [+] sendEmail Vulnerable Parameter(s): [+] downloadURL [+] message Affected Service(s): [+] account.trendmicro.com Proof of Concept (PoC): ======================= The email spoofing and validation web vulnerability can be exploited by remote attackers with low privileged web-application user account and low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC:1 (Message Body Context)
"><"<[MALICIOUS INJECTED SCRIPT CODE VULNERABILITY!]>
PoC:2 (Download Link) Jetzt herunterladen

Source: Gmail -> IFTTT-> Blogger

[FD] VoipNow v4.0.1 - (xajax_handler) Persistent Vulnerability

Document Title: =============== VoipNow v4.0.1 - (xajax_handler) Persistent Vulnerability References (Source): ==================== http://ift.tt/1T8mAPl Release Date: ============= 2016-04-26 Vulnerability Laboratory ID (VL-ID): ==================================== 1828 Common Vulnerability Scoring System: ==================================== 3.8 Product & Service Introduction: =============================== A cloud communications platform dedicated to service providers and organizations in need of robust enterprise PBX, video, presence, instant messaging, contact center features, conferencing, faxing, and mobility. Used by more than 10,000 service providers worldwide. (Copy of the Homepage: http://ift.tt/1pBgBup ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered an application-side input validation vulnerability in the VoipNow v4.0.1 web-application. Vulnerability Disclosure Timeline: ================================== 2016-03-18: Researcher Notification & Coordination (Benjamin Kunz Mejri - Evolution Security GmbH) 2016-03-19: Vendor Notification (VoipNow Support Team) 2016-04-25: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== 4PSA Product: VoipNow - Online Service (Web-Application) 4.0.1 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ An application-side input validation web vulnerability has been discovered in the official VoipNow v4.0.1 web-application. The vulnerability allows remote attacker to inject own malicious script codes to the application-side of the vulnerable service. The persistent vulnerability is located in the `report_block_table_details` and `report_block_table_title` values of the `xajax_handler.php` file GET method request. Remote attackers are able to inject own malicious script codes to the Notes input field in the invoice template. Thus allows an attacker to trigger an execution of the payload on edit or active invoice interaction. The request method to inject is POST via input and the attack vector of the issue is located on the application-side of the service. The security risk of the application-side vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.8. Exploitation of the persistent web vulnerability requires a low privilege web-application user account and low or medium user interaction. Successful exploitation of the vulnerability results in session hijacking, persistent phishing attacks, persistent external redirects to malicious source and persistent manipulation of affected or connected application modules. Request Method(s): [+] POST Vulnerable Module(s): [+] Invoice - Template Vulnerable File(s): [+] xajax_handler.php Vulnerable Inputs(s): [+] Add Note Vulnerable Parameter(s): [+] report_block_table_details [+] report_block_table_title Proof of Concept (PoC): ======================= The persistent input validation web vulnerability can be exploited by remote attackers with low privileged web-application user account and low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Manual steps to reproduce the vulnerability ... 1. Open the main website 2. Login to the application 3. Open Invoices Management - Invoice Number as Template 4. Inject to the Note description input field on buttom the malicious payload 5. Save the request via POST method 6. Watch the printed site or the edit invoice formular to trigger the persistent script code execution 7. Successful reproduce of the application-side vulnerability! PoC: (report_block_table_details)
By VoipNow at Apr 16, 2016 16:45:19
>"><[PERSISTENT INJECTED SCRIPT CODE!]>


Source: Gmail -> IFTTT-> Blogger

Laser Gun to Detect Bombs and Chemical Weapons from 100 Feet Away

In Brief US-based Intelligence Advanced Research Projects Activity (IARPA) agency is sponsoring a program to build portable laser sensors that could detect explosives, narcotics and other dangerous chemical weapons from 100 feet away. Dubbed SILMARILS (Standoff Illuminator for Measuring Absorbance and Reflectance Infrared Light Signatures), the program aims to identify biological agents as


from The Hacker News http://ift.tt/1TaLTAs
via IFTTT

DDoS Extortionists made $100,000 without Launching a Single Attack

In Brief Cyber crooks find a new and ingenious way to make hundreds of thousands of dollars with no effort. An unknown cyber gang, pretending to be Armada Collective, has made more than $100,000 in less than two months simply by threatening to launch DDoS attack on websites, but never actually launched a single attack. A group of Cyber Extortionists is sending threatening emails to


from The Hacker News http://ift.tt/1qOFO5B
via IFTTT

The Many Shades of Anonymity

(non-anonymous) social media sites. We introduce the notion of anonymity sensitivity of a social media post, which cap- tures the extent to which users ...

from Google Alert - anonymous http://ift.tt/1rwl7fD
via IFTTT

Simeis 147: Supernova Remnant


It's easy to get lost following the intricate strands of the Spaghetti Nebula. A supernova remnant cataloged as Simeis 147 and Sh2-240, the glowing gas filaments cover nearly 3 degrees -- 6 full moons -- on the sky. That's about 150 light-years at the stellar debris cloud's estimated distance of 3,000 light-years. This sharp composite includes image data taken through a narrow-band filter to highlight emission from hydrogen atoms tracing the shocked, glowing gas. The supernova remnant has an estimated age of about 40,000 years, meaning light from the massive stellar explosion first reached Earth about 40,000 years ago. But the expanding remnant is not the only aftermath. The cosmic catastrophe also left behind a spinning neutron star or pulsar, all that remains of the original star's core. via NASA http://ift.tt/1rcmIXv

Monday, April 25, 2016

A Computational Model for Situated Task Learning with Interactive Instruction. (arXiv:1604.06849v1 [cs.AI])

Learning novel tasks is a complex cognitive activity requiring the learner to acquire diverse declarative and procedural knowledge. Prior ACT-R models of acquiring task knowledge from instruction focused on learning procedural knowledge from declarative instructions encoded in semantic memory. In this paper, we identify the requirements for designing compu- tational models that learn task knowledge from situated task- oriented interactions with an expert and then describe and evaluate a model of learning from situated interactive instruc- tion that is implemented in the Soar cognitive architecture.



from cs.AI updates on arXiv.org http://ift.tt/1WmQd4p
via IFTTT

RHOG: A Refinement-Operator Library for Directed Labeled Graphs. (arXiv:1604.06954v1 [cs.AI])

This document provides the foundations behind the functionality provided by the $\rho$G library (http://ift.tt/1SKjhUe), focusing on the basic operations the library provides: subsumption, refinement of directed labeled graphs, and distance/similarity assessment between directed labeled graphs. $\rho$G development was initially supported by the National Science Foundation, by the EAGER grant IIS-1551338.



from cs.AI updates on arXiv.org http://ift.tt/24gvWjJ
via IFTTT