Latest YouTube Video

Saturday, June 4, 2016

Submit a tip

Submit A Tip If you witness a crime on campus and would like to report it anonymously, please utilize one of the anonymous reporting methods below; ...

from Google Alert - anonymous http://ift.tt/24pmiJX
via IFTTT

Ravens: The late legendary Muhammad Ali's 2012 preseason visit proved the inspiration behind Super Bowl run - Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Irongate — New Stuxnet-like Malware Targets Industrial Control Systems

Security researchers have discovered a sophisticated piece of malware that uses tricks from the Stuxnet sabotage malware and is specifically designed to target industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. Researchers at the security firm FireEye Labs Advanced Reverse Engineering said on Thursday that the malware, dubbed "IRONGATE," affects


from The Hacker News http://ift.tt/1Pby1ox
via IFTTT

Has Your TeamViewer Account Been Hacked? Here's What to Do Immediately

Do you have remote login software TeamViewer installed on your desktop? If Yes, then it could be possible that your system can be accessed by attackers to steal your personal details, including your bank and PayPal accounts, as several reports on Reddit and Twitter suggests. According to recent reports, the popular TeamViewer software that is used to remotely control PCs appears to have been


from The Hacker News http://ift.tt/22EsgHt
via IFTTT

I have a new follower on Twitter


Lashunda Virgen
Reaching out & fulfilling purpose! Taking one day at a time with love. My hand in his, to a place he knows. I Love Jesus.
Fort Collins

Following: 16159 - Followers: 20557

June 04, 2016 at 01:58AM via Twitter http://twitter.com/Lashundaadu

NGC 4631: The Whale Galaxy


NGC 4631 is a big beautiful spiral galaxy. Seen edge-on, it lies only 25 million light-years away in the well-trained northern constellation Canes Venatici. The galaxy's slightly distorted wedge shape suggests to some a cosmic herring and to others its popular moniker, The Whale Galaxy. Either way, it is similar in size to our own Milky Way. In this sharp color image, the galaxy's yellowish core, dark dust clouds, bright blue star clusters, and red star forming regions are easy to spot. A companion galaxy, the small elliptical NGC 4627 is just above the Whale Galaxy. Faint star streams seen in deep images are the remnants of small companion galaxies disrupted by repeated encounters with the Whale in the distant past. The Whale Galaxy is also known to have spouted a halo of hot gas glowing in X-rays. via NASA http://ift.tt/1PqPBu1

Vegetation greening trend in Canada and Alaska: 1984-2012

High-latitude regions have been warming rapidly since the last century, at a rate higher than the global average. At continental scales, satellite data since the 1980s have indicated increased vegetation productivity (greening) across northern high latitudes, and a productivity decline (browning) for certain areas of undisturbed boreal forest of Canada and Alaska. These remote sensing results have been corroborated by in-situ evidence. This research provides a spatially complete view of the vegetation greenness change for all of Canada and Alaska by calculating per-pixel NDVI trend from all available 1984-2012 peak-summer Landsat-5 and -7 surface reflectance data. By incorporating observations from overlapping scenes, researchers obtained up to 160 valid NDVI values for certain areas from this 29-year period, establishing the mid-Summer greenness trend. This animation shows the resulting greenness trend over Canada and Alaska with special attention focused on the regions of Quebec and northern Alaska.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1Zll9BX
via IFTTT

Friday, June 3, 2016

Orioles: All-Star RP Darren O'Day placed on the 15-day DL with a strained right hamstring; P Mike Wright called up (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Anonymous Leaks Database from South African Platinum Mining Corporation

Anonymous Leaks Database from South African Platinum Mining Corporation Softpedia. 1:01 PM. Sudbury Platinum resumes drilling at Aer-Kidd and ...

from Google Alert - anonymous http://ift.tt/1U2saaE
via IFTTT

Have you ever suspected that Facebook secretly listening to you to target Ads?

Have you ever felt Facebook is showing you very relevant ads about topics you’re only discussing around your phone? If yes, then you may find this news worth reading. Communications Professor Kelli Burns from the University of South Florida claims that Facebook is listening to all conversations people have while its app is open to serve more relevant ads for products related to what they are


from The Hacker News http://ift.tt/1X2vXa6
via IFTTT

ISS Daily Summary Report – 06/02/16

NanoRacks CubeSat Deployer #8 (NRCSD#8) Deployment Operations: The final NRCSD #8 silo was successfully deployed yesterday at 9:15 PM CDT which concludes three consecutive days of deployment operations. Eight silos were deployed during these operations, each containing two CubeSats for a total of 16 Doves. The Dove satellites are a fleet of nanosatellites that enables imagery of the entire changing planet to be taken on a frequent basis, with humanitarian and environmental applications ranging from monitoring deforestation and the ice caps to disaster relief and improving agriculture yields in developing nations. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle [of deployments.   Bigelow Expandable Aerospace Module (BEAM) Vestibule Outfitting Status: The crew installed the BEAM bulkhead Inter-Module Ventilation (IMV) valve this morning. The Vacuum Access Jumper was then connected to the Node 3 aft hatch to depressurize the Node 3 aft vestibule to 5 psi and perform an 8 hour leak check which is currently ongoing and will confirm good seals on the newly installed Node 3 aft and BEAM IMV valves.   Biological Rhythms 48 Multi Media Card Exchange: The crew stopped the first 24-hour recording that began yesterday and changed out the Multi Media Card and battery of the Digital Walk Holter ECG before starting the second 24-hour recording. The objective of the Japan Aerospace Exploration Agency (JAXA) Biological Rhythms 48 is to study the effects of long-term microgravity exposure on heart function by analyzing an astronaut’s electrocardiogram for 48 hours.   Auxin Transport Run #3.1: The crew retrieved samples that were installed in the Cell Biology Experiment Unit (CBEF) three days ago for incubation and performed the fixation, sampling and closeout activities to complete the last of a four day Auxin Transport experiment run. The Japan Aerospace Exploration Agency (JAXA) Auxin Transport investigation clarifies the role of auxins in pea and maize (corn) seedlings grown in microgravity, leading to new insight into how gravity, or the lack of gravity, affects plant development. This study may contribute to increasing the efficiency of plant cultivation in plant factories. The data obtained from the second experiment run will provide evidence of spaceflight‐alterations in auxin polar transport and endogenous levels of auxin, resulting in automorphogenesis.   European Modular Cultivation System (EMCS) Pressure Relief Valve Check and Water Pump Tube Installation: The crew began installing six water pump tubes on two Rotor Based Life Support System (RBLSS) modules and conducting a pressure relief check by pushing three relief valve buttons located on EMCS Holding Structure to check that the resistance to pushing action is low and comparable for all three valves. This activity is performed once a year to ensure that valves do not get stuck and to assess their functionality. However, the Express Rack 3 Laptop (ELC 3) lost comm with indications of a hard disk error. A power cycle did not recover the system. The crew performed troubleshooting to remove the laptop battery, reseat the hard drive and reinstall the battery but the boot up sequence carried the crew back to where they had started so the installation was aborted.   Packed Bed Reactor Experiment (PBRE) Lab Video Setup: Following the PBRE hardware setup and installation earlier this week, the crew set up a video camcorder for over-the-shoulder view of the Microgravity Science Glovebox (MSG) high definition (HD) monitor for the ground to view the water separator. The PBRE will be used to study the behavior of gases and liquids when they flow simultaneously through a column filled with fixed porous media. The porous media or “packing” can be made of different shapes and materials and are used widely in chemical engineering as a means to enhance the contact between two immiscible fluid phases (e.g., liquid-gas, water-oil, etc.). Packed columns can serve as reactors, scrubbers, strippers, etc. in systems where efficient interphase contact is desired, both on Earth and in space.   Window Observational Research Facility (WORF) Solid State Power Control Module (SSPCM) Trip Recovery: During the METEOR payload Software Load and Hardware Setup on May 20th, the WORF SSPCM channel 23 tripped when the crew flipped the Payload 3 power switch to supply power to the 28 VDC to 120VAC Inverter upstream of the METEOR hardware. It was subsequently determined that the SSPCM trip limit was set to the 10 Amp setting, while the in-rush current of the inverter requires the trip limit to be set to the 20 Amp setting. Earlier this week the SSPCM trip limit for channel 23 was increased to 20 Amps and power was successfully applied to METEOR. No additional issues have been reported.   Autonomous Mission Operations (AMO): The crew successfully executed the first crew initiated run of the AMO experiment.  Using onboard AMO software, the crew completed the autonomous deactivation and activation of an EXPRESS Rack (ER7 at Lab P2).  While the ground team was monitoring via telemetry, this activity was completed entirely by crew and onboard software without ground personnel or ground commands. The overall purpose of the AMO investigation is to demonstrate on-board crew autonomy techniques for future deep-space human spaceflight missions.  Additionally, this was the first time an ISS payload rack was nominally deactivated, then reactivated by the crew without ground support.   Remote Power Controller Module (RPCM) P12B-A Remove & Replace (R&R): Overnight, ground controllers performed day 2 of the 6 day choreography to proceed with the P12B-A RPCM R&R to restore power to the P1 Lower Outboard Luminaire Heater. Over the course of the evening the team removed a spare RPCM from Cargo Transport Container 5 (CTC-5) and relocated it to the unoccupied P11A-C location on the truss. This evening, the team is continuing operations by relocating the P11A-A RPCM to the currently unoccupied P11A-D location and moving the spare RPCM that is now in the P11A-C location into the P11A-A slot. The RPCM that is currently in the P11A-A location is loaded with the firmware necessary to perform “hot-mate” operations and will eventually be […]

from ISS On-Orbit Status Report http://ift.tt/1WzdrWT
via IFTTT

Anonymous Crime Tip

Official site of the Town of Hillsborough, N.C. Includes contact information, town news, meeting information and information about town government ...

from Google Alert - anonymous http://ift.tt/1Y6cepl
via IFTTT

Russia arrests 50 hackers who stole $25 million from Banks

Russian authorities have arrested a gang of 50 hackers suspected of stealing more than 1.7 Billion Rubles (over US$25 Million) from banks and other financial institutions in the country since 2011. The same criminal gang had tried to steal a further 2.273 Billion Roubles by issuing false payment instructions, but that were blocked. <!-- adsense --> The group allegedly used a Trojan called "


from The Hacker News http://ift.tt/1sRTii0
via IFTTT

I have a new follower on Twitter


Matt Gourd
Digital content shinobi with a penchant for clear writing and rational thinking. Spare-time DJ, audiophile and competitive jogger.
London, England
https://t.co/ytniAarTur
Following: 3886 - Followers: 2911

June 03, 2016 at 06:48AM via Twitter http://twitter.com/matt_gourd

Hackers Selling Unpatched Microsoft Windows Zero-Day Exploit for $90,000

How much a Windows zero-day exploit that affects all versions of Windows operating system costs on the black market? It's $95,000, at least, for the one recently spotted by security researchers. Researchers from Trustwave's SpiderLabs team have uncovered a zero-day exploit on Russian underground malware forum exploit.in, affecting all versions of Microsoft Windows OS from Windows 2000 all


from The Hacker News http://ift.tt/25B35r1
via IFTTT

Facebook Messenger App — Choose either End-to-End Encryption or Artificial Intelligence

Facebook is set to introduce end-to-end encryption for its Messenger app, allowing more than its 900 Million users to send and receive messages that can not be read or intercepted by law enforcement or even the social network itself. However, it’s not the kind of end-to-end encrypted chat feature provided by Apple or WhatsApp in which all your conversation are entirely encrypted by default. <


from The Hacker News http://ift.tt/1Zixery
via IFTTT

Three Planets from Pic du Midi


Seen any planets lately? All three planets now shining brightly in the night sky are imaged in these panels, captured last week with the 1 meter telescope at Pic du Midi Observatory in the French Pyrenees. Near opposition and closest to Earth on May 30, Mars is presently offering the best ground-based photo-ops in the last decade. The sharp image finds clouds above the Red Planet's north pole (top) and towering volcanos near its right limb. Saturn reaches its own opposition tonight, its bright rings and gaps clearly revealed in the telescopic portrait. Jupiter is currently highest during the evening twilight and shows off its planet-girdling cloud bands and Great Red Spot in this scene. Of course close-up images of the ruling gas giant will follow the July arrival of the solar-powered Juno spacecraft and JunoCam. via NASA http://ift.tt/1Xki47V

Mercury Transit 2016 from SDO/HMI

Mercury transit, from May 9, 2016, as seen by the HMI telescope on Solar Dynamics Observatory.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1VAFrIC
via IFTTT

Mercury Transit 2016 from SDO/AIA at 171 Angstroms

Mercury transit, from May 9, 2016, as seen by the AIA telescope with 171 Angstrom filter on Solar Dynamics Observatory. This is a composited product, producing a full disk 4Kx4K view by combining the image subsets taken at 12 second cadence with full-disk images taken about every 90 seconds. It is generated for esthetics use and it not suitable for scientific analysis.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/20WDrK5
via IFTTT

Mercury Transit 2016 from SDO/AIA at 304 Angstroms

Mercury transit, from May 9, 2016, as seen by the AIA telescope with 304 Angstrom filter on Solar Dynamics Observatory. This is a composited product, producing a full disk 4Kx4K view by combining the image subsets taken at 12 second cadence with full-disk images taken about every 90 seconds. It is generated for esthetics use and it not suitable for scientific analysis.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/1VAFxjq
via IFTTT

Orioles Highlight: Mark Trumbo and Adam Jones each hit 2 homers, team goes deep 7 times in 12-7 win over Red Sox (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Thursday, June 2, 2016

I have a new follower on Twitter


Alayna Frankenberry
Content writing, Social media, online marketing and digital PR for @ContentFac (but mostly me talking about #TheXFiles and being way too proud of my cat).
Pittsburgh
https://t.co/PxGaTGmrlu
Following: 2092 - Followers: 2659

June 02, 2016 at 11:25PM via Twitter http://twitter.com/AFrankenberry

Red Sox Correction: Xander Bogaerts extended hitting streak with 2-run single off left-center field wall (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Red Sox: SS Xander Bogaerts extends hitting streak to 26 games with 2-run double in 6th inning vs. Orioles (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles: Yovani Gallardo threw 3 innings (59 pitches) in rehab start for Class-A Frederick; next rehab outing Tuesday (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

On the equivalence between Kolmogorov-Smirnov and ROC curve metrics for binary classification. (arXiv:1606.00496v1 [cs.AI])

Binary decisions are very common in artificial intelligence. Applying a threshold on the continuous score gives the human decider the power to control the operating point to separate the two classes. The classifier,s discriminating power is measured along the continuous range of the score by the Area Under the ROC curve (AUC_ROC) in most application fields. Only finances uses the poor single point metric maximum Kolmogorov-Smirnov (KS) distance. This paper proposes the Area Under the KS curve (AUC_KS) for performance assessment and proves AUC_ROC = 0.5 + AUC_KS, as a simpler way to calculate the AUC_ROC. That is even more important for ROC averaging in ensembles of classifiers or n fold cross-validation. The proof is geometrically inspired on rotating all KS curve to make it lie on the top of the ROC chance diagonal. On the practical side, the independent variable on the abscissa on the KS curve simplifies the calculation of the AUC_ROC. On the theoretical side, this research gives insights on probabilistic interpretations of classifiers assessment and integrates the existing body of knowledge of the information theoretical ROC approach with the proposed statistical approach based on the thoroughly known KS distribution.



from cs.AI updates on arXiv.org http://ift.tt/2878DMb
via IFTTT

Mining Software Components from Object-Oriented APIs. (arXiv:1606.00561v1 [cs.SE])

Object-oriented Application Programing Interfaces (APIs) support software reuse by providing pre-implemented functionalities. Due to the huge number of included classes, reusing and understanding large APIs is a complex task. Otherwise, software components are admitted to be more reusable and understandable entities than object-oriented ones. Thus, in this paper, we propose an approach for reengineering object-oriented APIs into component-based ones. We mine components as a group of classes based on the frequency they are used together and their ability to form a quality-centric component. To validate our approach, we experimented on 100 Java applications that used Android APIs.



from cs.AI updates on arXiv.org http://ift.tt/25A8fno
via IFTTT

The Challenge of Non-Technical Loss Detection using Artificial Intelligence: A Survey. (arXiv:1606.00626v1 [cs.AI])

Detection of non-technical losses (NTL) which include electricity theft, faulty meters or billing errors has attracted increasing attention from researchers in electrical engineering and computer science. NTLs cause significant harm to the economy, as in some countries they may range up to 40% of the total electricity distributed. The predominant research direction is employing artificial intelligence (AI) to solve this problem. Promising approaches have been reported falling into two categories: expert systems incorporating hand-crafted expert knowledge or machine learning, also called pattern recognition or data mining, which learns fraudulent consumption patterns from examples without being explicitly programmed. This paper first provides an overview about how NTLs are defined and their impact on economies. Next, it covers the fundamental pillars of AI relevant to this domain. It then surveys these research efforts in a comprehensive review of algorithms, features and data sets used. It finally identifies the key scientific and engineering challenges in NTL detection and suggests how they could be solved. We believe that those challenges have not sufficiently been addressed in past contributions and that covering those is necessary in order to advance NTL detection.



from cs.AI updates on arXiv.org http://ift.tt/24lBxne
via IFTTT

Death and Suicide in Universal Artificial Intelligence. (arXiv:1606.00652v1 [cs.AI])

Reinforcement learning (RL) is a general paradigm for studying intelligent behaviour, with applications ranging from artificial intelligence to psychology and economics. AIXI is a universal solution to the RL problem; it can learn any computable environment. A technical subtlety of AIXI is that it is defined using a mixture over semimeasures that need not sum to 1, rather than over proper probability measures. In this work we argue that the shortfall of a semimeasure can naturally be interpreted as the agent's estimate of the probability of its death. We formally define death for generally intelligent agents like AIXI, and prove a number of related theorems about their behaviour. Notable discoveries include that agent behaviour can change radically under positive linear transformations of the reward signal (from suicidal to dogmatically self-preserving), and that the agent's posterior belief that it will survive increases over time.



from cs.AI updates on arXiv.org http://ift.tt/1VAlodl
via IFTTT

Multiresolution Recurrent Neural Networks: An Application to Dialogue Response Generation. (arXiv:1606.00776v1 [cs.CL])

We introduce the multiresolution recurrent neural network, which extends the sequence-to-sequence framework to model natural language generation as two parallel discrete stochastic processes: a sequence of high-level coarse tokens, and a sequence of natural language tokens. There are many ways to estimate or learn the high-level coarse tokens, but we argue that a simple extraction procedure is sufficient to capture a wealth of high-level discourse semantics. Such procedure allows training the multiresolution recurrent neural network by maximizing the exact joint log-likelihood over both sequences. In contrast to the standard log-likelihood objective w.r.t. natural language tokens (word perplexity), optimizing the joint log-likelihood biases the model towards modeling high-level abstractions. We apply the proposed model to the task of dialogue response generation in two challenging domains: the Ubuntu technical support domain, and Twitter conversations. On Ubuntu, the model outperforms competing approaches by a substantial margin, achieving state-of-the-art results according to both automatic evaluation metrics and a human evaluation study. On Twitter, the model appears to generate more relevant and on-topic responses according to automatic evaluation metrics. Finally, our experiments demonstrate that the proposed model is more adept at overcoming the sparsity of natural language and is better able to capture long-term structure.



from cs.AI updates on arXiv.org http://ift.tt/1XUgfgj
via IFTTT

Prior Swapping for Data-Independent Inference. (arXiv:1606.00787v1 [stat.ML])

While Bayesian methods are praised for their ability to incorporate useful prior knowledge, in practice, priors that allow for computationally convenient or tractable inference are more commonly used. In this paper, we investigate the following question: for a given model, is it possible to use any convenient prior to infer a false posterior, and afterwards, given some true prior of interest, quickly transform this result into the true posterior?

We present a procedure to carry out this task: given an inferred false posterior and true prior, our algorithm generates samples from the true posterior. This transformation procedure, which we call "prior swapping" works for arbitrary priors. Notably, its cost is independent of data size. It therefore allows us, in some cases, to apply significantly less-costly inference procedures to more-sophisticated models than previously possible. It also lets us quickly perform any additional inferences, such as with updated priors or for many different hyperparameter settings, without touching the data. We prove that our method can generate asymptotically exact samples, and demonstrate it empirically on a number of models and priors.



from cs.AI updates on arXiv.org http://ift.tt/1XUgiZm
via IFTTT

Multi-View Treelet Transform. (arXiv:1606.00800v1 [stat.ML])

Current multi-view factorization methods make assumptions that are not acceptable for many kinds of data, and in particular, for graphical data with hierarchical structure. At the same time, current hierarchical methods work only in the single-view setting. We generalize the Treelet Transform to the Multi-View Treelet Transform (MVTT) to allow for the capture of hierarchical structure when multiple views are avilable. Further, we show how this generalization is consistent with the existing theory and how it might be used in denoising empirical networks and in computing the shared response of functional brain data.



from cs.AI updates on arXiv.org http://ift.tt/1sQy6J9
via IFTTT

On the satisfiability problem for SPARQL patterns. (arXiv:1406.1404v2 [cs.DB] UPDATED)

The satisfiability problem for SPARQL patterns is undecidable in general, since the expressive power of SPARQL 1.0 is comparable with that of the relational algebra. The goal of this paper is to delineate the boundary of decidability of satisfiability in terms of the constraints allowed in filter conditions. The classes of constraints considered are bound-constraints, negated bound-constraints, equalities, nonequalities, constant-equalities, and constant-nonequalities. The main result of the paper can be summarized by saying that, as soon as inconsistent filter conditions can be formed, satisfiability is undecidable. The key insight in each case is to find a way to emulate the set difference operation. Undecidability can then be obtained from a known undecidability result for the algebra of binary relations with union, composition, and set difference. When no inconsistent filter conditions can be formed, satisfiability is efficiently decidable by simple checks on bound variables and on the use of literals. The paper also points out that satisfiability for the so-called `well-designed' patterns can be decided by a check on bound variables and a check for inconsistent filter conditions.



from cs.AI updates on arXiv.org http://ift.tt/1pVVLkE
via IFTTT

Uncertain programming model for multi-item solid transportation problem. (arXiv:1606.00002v1 [math.OC] CROSS LISTED)

In this paper, an uncertain Multi-objective Multi-item Solid Transportation Problem (MMSTP) based on uncertainty theory is presented. In the model, transportation costs, supplies, demands and conveyances parameters are taken to be uncertain parameters. There are restrictions on some items and conveyances of the model. Therefore, some particular items cannot be transported by some exceptional conveyances. Using the advantage of uncertainty theory, the MMSTP is first converted into an equivalent deterministic MMSTP. By applying convex combination method and minimizing distance function method, the deterministic MMSTP is reduced into single objective programming problems. Thus, both single objective programming problems are solved using Maple 18.02 optimization toolbox. Finally, a numerical example is given to illustrate the performance of the models.



from cs.AI updates on arXiv.org http://ift.tt/1sNv88v
via IFTTT

[FD] Multiple XSS in Babylon

I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

[FD] Nagios XI Multiple Vulnerabilities

( , ) (, . '.' ) ('. ', ). , ('. ( ) ( (_,) .'), ) _ _, / _____/ / _ \ ____ ____ _____ \____ \==/ /_\ \ _/ ___\/ _ \ / \ / \/ | \\ \__( <_> ) Y Y \ /______ /\___|__ / \___ >____/|__|_| / \/ \/.-. \/ \/:wq (x.0) '=.|w|.=' _=''"''=. presents.. Nagios XI Multiple Vulnerabilities Affected versions: Nagios XI <= 5.2.7 PDF: http://ift.tt/20WjJyh

Source: Gmail -> IFTTT-> Blogger

[FD] Force allow access button to Bypass windows firewall

Ravens: Pittsburgh's Markus Wheaton and Stephon Tuitt say Baltimore, not Cincinnati, remains the team's biggest rival (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

I have a new follower on Twitter


Virtual Training Inc
Here at Virtual Training Innovation, we believe in creating less hassle for employers when it comes to training their new employees.
Santa Clara, CA
http://t.co/6jGm0JeKNd
Following: 3634 - Followers: 3275

June 02, 2016 at 03:56PM via Twitter http://twitter.com/VTrainingInc

SportsCenter Video: Ravens' Eugene Monroe says players have been \"very supportive\" of his backing of medical marijuana (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

File uploads fail as anonymous user with caching on with multiple file fields

Make sure page caching is enabled for anonymous users. Open a new incognito or private browsing window. Select the first file and click upload.

from Google Alert - anonymous http://ift.tt/1TLN7D6
via IFTTT

I have a new follower on Twitter


Consciousness Sci
OM! CONSCIOUSNESS SCIENCE | #AI #consciousness #intelligence #idealism #realism #nonduality #panpsychism #universalconsciousness #IoT || https://t.co/UQQKblJzA6

https://t.co/YOQBXKjDbn
Following: 1673 - Followers: 325

June 02, 2016 at 12:01PM via Twitter http://twitter.com/consciousci_sv

Jay Z Responds To Pundit Tomi Lahren On 'Drug Dealers Anonymous'

Jay Z used his new track to fire back at a conservative pundit after she condemned the rapper for his former profession: drug trafficking.

from Google Alert - anonymous http://ift.tt/25CSAad
via IFTTT

ISS Daily Summary Report – 06/01/16

NanoRacks CubeSat Deployer #8 (NRCSD#8) Deployment Operations: Following completion of successful deployment of 5 NRCSD #8 silos, one more silo was successfully deployed last night and another earlier this morning. The last deploy is planned for tonight at 9:15 PM CDT, which will conclude three consecutive days of deployment operations for NRCSD#8. Each silo contains two CubeSats for a total of 16 Doves. The Dove satellites are a fleet of nanosatellites that enables imagery of the entire changing planet to be taken on a frequent basis, with humanitarian and environmental applications ranging from monitoring deforestation and the ice caps to disaster relief and improving agriculture yields in developing nations. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle [of deployments.   Biological Rhythms 48 Holter Start: The crew began the operations phase of the Biological Rhythms experiment by attaching the Digital Walk Holter Electrocardiogram (ECG) and electrodes and initiating the first of two 24-hour measurements. The crew will perform a recording event with the Digital Walk Holter ECG and Actiwatch Spectrum following the measurements. The objective of the Japan Aerospace Exploration Agency (JAXA) Biological Rhythms 48 is to study the effects of long-term microgravity exposure on heart function by analyzing an astronaut’s electrocardiogram for 48 hours.   Personal CO2 Monitor Installation: The crew completed software and hardware installation by configuring the iPad applications, updating the Personal CO2 monitor software, and setting up the Carbon Dioxide Monitor (CDM) and the Personal CO2 Monitors. The Personal CO2 Monitor demonstrates a system capable of unobtrusively collecting and downlinking individual crew members’ CO2 exposure for an extended period. This investigation evaluates wearability principles in microgravity and also demonstrates Modular Wearable Architecture Base Board, allowing rapid certification of future wearable devices.   Sprint: The crew completed the operational phase of Sprint VO2 including video setup, exercise preparation, instrument calibrations and exercise protocol.  Sprint VO2 is a test that measures oxygen uptake, ventilatory threshold, and other physiological parameters for evaluation of Sprint exercise prescription. It evaluates the use of high intensity, low volume exercise training to minimize loss of muscle, bone, and cardiovascular function in ISS crew members during long-duration missions.   Dose Tracker: The crew completed entries for medication tracking. This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area/activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the International Space Station. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much space crew members need.   Bigelow Expandable Aerospace Module (BEAM) Vestibule Outfitting: BEAM successfully completed an 80 hour leak check this morning and the crew began activities to prepare the vestibule for BEAM ingress tentatively scheduled for Monday, June 6th. The crew removed the Node 3 Aft Negative Pressure Relief Valves (NPRV) and installed Inter Module Ventilation (IMV) Valves. During the activities it was discovered that the Node 3 Aft Starboard IMV Flexible Coupling was missing.  This coupling is needed to connect the ducting to the starboard IMV on the IMV return leg between BEAM and Node 3. The flex coupling is unique to this location and there are no spares on orbit or alternate locations from which to scavenge. Vestibule operations the rest of the week will continue as planned, however, this issue will likely need to be resolved prior to BEAM ingress. Teams are developing a workaround.   Special Purpose Dexterous Manipulator (SPDM) P12B-A Remote Power Controller Module (RPCM) Remove & Replace (R&R): Last evening, ground controllers began operations to R&R RPCM P12B-A. RPC 16 that failed in 2012 and powers the P1 Lower Outboard Luminaire Heater. These operations will be performed over the course of 6 days and require the relocation of multiple RPCMs to utilize the RPCM that is currently in the P11A-A location as a donor to allow for a hot-mate at the P12B-A location. During last night’s operations, Cargo Transport Container 5 (CTC-5) was relocated from EXPRESS Logistics Carrier 3 (ELC-3) to the Enhanced ORU Temporary Platform (EOTP) and the CTC was opened. This set the team up to continue with this evenings operations to relocate a spare RPCM from the CTC and temp stow it in the currently unoccupied P11A-C location on the truss.   Advanced Resistive Exercise Device (ARED) Sensor Calibration Status: Following yesterday’s unsuccessful attempt to perform an ARED sensor calibration, it was determined that the cause of the error message received by the crew was likely due to a corrupt file on the SSC. This particular SSC had issues last week that required a reload of the SSC. Ground teams will download the pertinent files in an attempt to confirm this theory. Operators will then remove all of the files and reload them to the SSC to correct the issue. A verification that the correct files have been successfully loaded to the SSC will be performed prior to rescheduling the ARED sensor calibration.   Japanese Experiment Module (JEM) Return Grille Cleaning: The crew removed the return grille mesh cover and cleaned the inside return grilles in the JEM Pressurized Module (JPM) and the Japanese Experiment Logistics Module-Pressurized Section (JLP).   Today’s Planned Activities All activities were completed unless otherwise noted. PHS Hardware Installation BEAM – Pressure and Temperature Measurements Periodic Health Evaluation (PHS) – CMO Dust Filters Replacement and [B1] and [B2] […]

from ISS On-Orbit Status Report http://ift.tt/1X0wBog
via IFTTT

[FD] SEC Consult SA-20160602-0 :: Multiple critical vulnerabilities in Ubee EVW3226 Advanced wireless voice gateway

SEC Consult Vulnerability Lab Security Advisory < 20160602-0 > ======================================================================= title: Multiple critical vulnerabilities product: Ubee EVW3226 Advanced wireless voice gateway vulnerable version: Firmware EVW3226_1.0.20 fixed version: - CVE number: - impact: critical homepage: http://ift.tt/1Phkpgw found: 2016-01-09 by: Manuel Hofer (Office Vienna) SEC Consult Vulnerability Lab An integrated part of SEC Consult Bangkok - Berlin - Linz - Montreal - Moscow Singapore - Vienna (HQ) - Vilnius - Zurich http://ift.tt/1mGHMNR ======================================================================= Vendor description:

Source: Gmail -> IFTTT-> Blogger

New Music: Pusha T Drops Drug Dealers Anonymous, featuring Jay Z

O.O.D. Music President Pusha T has delivered on his promise of new music with the late-night release of his latest song, “Drug Dealers Anonymous,” ...

from Google Alert - anonymous http://ift.tt/1WxKLxt
via IFTTT

Pusha T & Jay Z Are “Drug Dealers Anonymous&rdquo

Pusha T and Jay Z are back with a new track entitled “Drug Dealers Anonymous,” produced by DJ Dahi. This latest single marks the beginning of the ...

from Google Alert - anonymous http://ift.tt/1TYZP4X
via IFTTT

I have a new follower on Twitter


Baseball Polls
Posting and creating interesting baseball related polls and questions. (I do not own any of the material posted).


Following: 120 - Followers: 3

June 02, 2016 at 12:12AM via Twitter http://twitter.com/Baseballpolls4

Wednesday, June 1, 2016

Hear Jay Z and Pusha T Confess on 'Drug Dealers Anonymous'

Pusha T and Jay Z teamed up for a new track called “Drug Dealers Anonymous”. It's available on Tidal now. As of last night, you could also find an ...

from Google Alert - anonymous http://ift.tt/1XR7raQ
via IFTTT

Red Sox: SS Xander Bogaerts extends hitting streak to 25 games with a single in the 6th inning vs. the Orioles (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

How to avoid ethically relevant Machine Consciousness. (arXiv:1606.00058v1 [cs.AI])

This paper discusses the root cause of systems perceiving the self experience and how to exploit adaptive and learning features without introducing ethically problematic system properties.



from cs.AI updates on arXiv.org http://ift.tt/1Ui4smg
via IFTTT

Quantifying the probable approximation error of probabilistic inference programs. (arXiv:1606.00068v1 [cs.AI])

This paper introduces a new technique for quantifying the approximation error of a broad class of probabilistic inference programs, including ones based on both variational and Monte Carlo approaches. The key idea is to derive a subjective bound on the symmetrized KL divergence between the distribution achieved by an approximate inference program and its true target distribution. The bound's validity (and subjectivity) rests on the accuracy of two auxiliary probabilistic programs: (i) a "reference" inference program that defines a gold standard of accuracy and (ii) a "meta-inference" program that answers the question "what internal random choices did the original approximate inference program probably make given that it produced a particular result?" The paper includes empirical results on inference problems drawn from linear regression, Dirichlet process mixture modeling, HMMs, and Bayesian networks. The experiments show that the technique is robust to the quality of the reference inference program and that it can detect implementation bugs that are not apparent from predictive performance.



from cs.AI updates on arXiv.org http://ift.tt/1UfY7YT
via IFTTT

Applications of Probabilistic Programming (Master's thesis, 2015). (arXiv:1606.00075v1 [cs.AI])

This thesis describes work on two applications of probabilistic programming: the learning of probabilistic program code given specifications, in particular program code of one-dimensional samplers; and the facilitation of sequential Monte Carlo inference with help of data-driven proposals. The latter is presented with experimental results on a linear Gaussian model and a non-parametric dependent Dirichlet process mixture of objects model for object recognition and tracking.

In Chapter 1 we provide a brief introduction to probabilistic programming.

In Chapter 3 we present an approach to automatic discovery of samplers in the form of probabilistic programs. We formulate a Bayesian approach to this problem by specifying a grammar-based prior over probabilistic program code. We use an approximate Bayesian computation method to learn the programs, whose executions generate samples that statistically match observed data or analytical characteristics of distributions of interest. In our experiments we leverage different probabilistic programming systems to perform Markov chain Monte Carlo sampling over the space of programs. Experimental results have demonstrated that, using the proposed methodology, we can learn approximate and even some exact samplers. Finally, we show that our results are competitive with regard to genetic programming methods.

In Chapter 3, we describe a way to facilitate sequential Monte Carlo inference in probabilistic programming using data-driven proposals. In particular, we develop a distance-based proposal for the non-parametric dependent Dirichlet process mixture of objects model. We implement this approach in the probabilistic programming system Anglican, and show that for that model data-driven proposals provide significant performance improvements. We also explore the possibility of using neural networks to improve data-driven proposals.



from cs.AI updates on arXiv.org http://ift.tt/25BIN4f
via IFTTT

Hardness of the Pricing Problem for Chains in Barter Exchanges. (arXiv:1606.00117v1 [cs.DS])

Kidney exchange is a barter market where patients trade willing but medically incompatible donors. These trades occur via cycles, where each patient-donor pair both gives and receives a kidney, and via chains, which begin with an altruistic donor who does not require a kidney in return. For logistical reasons, the maximum length of a cycle is typically limited to a small constant, while chains can be much longer. Given a compatibility graph of patient-donor pairs, altruists, and feasible potential transplants between them, finding even a maximum-cardinality set of vertex-disjoint cycles and chains is NP-hard. There has been much work on developing provably optimal solvers that are efficient in practice. One of the leading techniques has been branch and price, where column generation is used to incrementally bring cycles and chains into the optimization model on an as-needed basis. In particular, only positive-price columns need to be brought into the model. We prove that finding a positive-price chain is NP-complete. This shows incorrectness of two leading branch-and-price solvers that suggested polynomial-time chain pricing algorithms.



from cs.AI updates on arXiv.org http://ift.tt/25BHP8c
via IFTTT

A Survey of Qualitative Spatial and Temporal Calculi -- Algebraic and Computational Properties. (arXiv:1606.00133v1 [cs.AI])

Qualitative Spatial and Temporal Reasoning (QSTR) is concerned with symbolic knowledge representation, typically over infinite domains. The motivations for employing QSTR techniques range from exploiting computational properties that allow efficient reasoning to capture human cognitive concepts in a computational framework. The notion of a qualitative calculus is one of the most prominent QSTR formalisms. This article presents the first overview of all qualitative calculi developed to date and their computational properties, together with generalized definitions of the fundamental concepts and methods, which now encompass all existing calculi. Moreover, we provide a classification of calculi according to their algebraic properties.



from cs.AI updates on arXiv.org http://ift.tt/1Ui4udW
via IFTTT

A structured argumentation framework for detaching conditional obligations. (arXiv:1606.00339v1 [cs.AI])

We present a general formal argumentation system for dealing with the detachment of conditional obligations. Given a set of facts, constraints, and conditional obligations, we answer the question whether an unconditional obligation is detachable by considering reasons for and against its detachment. For the evaluation of arguments in favor of detaching obligations we use a Dung-style argumentation-theoretical semantics. We illustrate the modularity of the general framework by considering some extensions, and we compare the framework to some related approaches from the literature.



from cs.AI updates on arXiv.org http://ift.tt/25BI6rD
via IFTTT

How to move beyond general game playing artificial intelligence by player modelling. (arXiv:1606.00401v1 [cs.HC])

General game playing artificial intelligence has recently seen important advances due to the various techniques known as 'deep learning'. However the advances conceal equally important limitations in their reliance on: massive data sets; fortuitously constructed problems; and absence of any human-level complexity, including other human opponents. On the other hand, deep learning systems which do beat human champions, such as in Go, do not generalise well. The power of deep learning simultaneously exposes its weakness. Given that deep learning is mostly clever reconfigurations of well-established methods, moving beyond the state of art calls for forward-thinking visionary solutions, not just more of the same. I present the argument that general game playing artificial intelligence will require a generalised player model. This is because games are inherently human artefacts which therefore, as a class of problems, contain cases which require a human-style problem solving approach. I relate this argument to the performance of state of art general game playing agents. I then describe a concept for a formal category theoretic basis to a generalised player model. This formal model approach integrates my existing 'Behavlets' method for psychologically-derived player modelling:

Cowley, B., Charles, D. (2016). Behavlets: a Method for Practical Player Modelling using Psychology-Based Player Traits and Domain Specific Features. User Modeling and User-Adapted Interaction, 26(2), 257-306.



from cs.AI updates on arXiv.org http://ift.tt/1Ui3BCm
via IFTTT

MLB: Red Sox OF Mookie Betts hits 2nd home run of game in 2nd inning; ties league record with 5 HRs in a two-game span (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Orioles recall P T.J. McFarland (1.69 ERA) from Triple-A Norfolk; P Ashur Tolliver optioned to minors (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

427 Million Myspace Passwords leaked in major Security Breach

MySpace has suffered a major data breach in which hundreds of Millions of users have had their account details compromised. You may have forgotten Myspace and have not thought of it in years after Facebook acquired the market, but Myspace was once-popular social media website. <!-- adsense --> On Tuesday, Myspace confirmed that the company was hacked in 2013 and that the stolen Myspace


from The Hacker News http://ift.tt/1VwsejQ
via IFTTT

[FD] Joomla SecurityCheck extension - Multiple vulnerabilities

Information

Source: Gmail -> IFTTT-> Blogger

[FD] CVE-2016-3670 Stored Cross Site Scripting in Liferay CE

Fernando Câmara @ Integrity S.A www.integrity.pt https://twitter.com/overflowy http://ift.tt/1RNc0fi

Source: Gmail -> IFTTT-> Blogger

[FD] Keystone Assembler Engine is out!

Greetings, We are very excited to announce the first public release of Keystone Engine, the multi-arch, multi-platform, multi-bindings assembler framework you are all longing for! Keystone Engine offers some unparalleled features: - Multi-architecture, with support for Arm, Arm64 (AArch64/Armv8), Hexagon, Mips, PowerPC, Sparc, SystemZ & X86 (include 16/32/64bit). - Clean/simple/lightweight/intuitive architecture-neutral API. - Implemented in C/C++ languages, with 5 bindings for Python, NodeJS, Ruby, Go & Rust available. - Native support for Windows & *nix (with Mac OSX, Linux, *BSD & Solaris confirmed). - Thread-safe by design. - Open source - with a dual license. For further information, see our website at http://ift.tt/1Scrjlb See existing tools built on top of Keystone at http://ift.tt/283b2aM Keystone is a very young project, but we do hope that it will live a long life. The community support will be critical for our little open source framework! We would like show our gratitude to all the Indiegogo supporters, who financially contributed to the development of Keystone! We will never forget all testers for incredible bug reports & code contributions during the beta phase! Without the invaluable helps of community, our project would not have gone this far! Huge thanks go to LLVM project, which Keystone is based on, and extends much further in its special area. Without the almighty LLVM, Keystone would not be existent! Keystone aims to lay the ground for innovative works. We look forward to seeing many advanced research & development in the security area built on this framework. Let the fun begin! Thanks, Quynh http://ift.tt/1Scrjlb http://ift.tt/18OQOjV http://ift.tt/1KJ3yxs

Source: Gmail -> IFTTT-> Blogger

[FD] XSS in CMSimple <= v4.6.2

============================================= MGC ALERT 2016-004 - Original release date: May 28, 2016 - Last revised: June 1, 2016 - Discovered by: Manuel Garcia Cardenas - Severity: 4,8/10 (CVSS Base Score) ============================================= I. VULNERABILITY

Source: Gmail -> IFTTT-> Blogger

[FD] MitM Attack against KeePass 2's Update Check

[FD] Faraday v1.0.20 is here! New conflict resolution, hosts and services views & bug fixes!

A brand new Faraday version is ready! Faraday v1.0.20 is here, bringing more functionality to our GTK interface and other cool new features. If you've been keeping up with Faraday, on our last release http://ift.tt/1sfWN1I we published a new experimental GTK interface. In this iteration we added several missing features and fixed a lot of small bugs. You will probably notice the most our new conflict resolution dialog, which improves on our design for QT and highlights the differences between the two conflicting objects, not to mention it requires one less click from you when fixing a conflict. Conflict resolution dialog in Faraday's GTK interface Also, you will notice the status bar now displays relevant information about your workspace, so you know exactly where you stand regarding the number of hosts, services and vulnerabilities. Your workflow will also be improved by the new exit command support, which now behaves as you'd expect - if you exit from a tab inside Faraday, the tab will close. Big new features are exciting, but bug fixes and small add-ons are important too. The terminal now features infinite scrolling and scroll bars, there are more descriptive labels, the sidebar is resizable and you can search for specific workspaces by name. However, our web UI wasn't left behind, including fixes and improvements in the hosts and services views. Also, in this version we added the report import event to the commands history, so it can be viewed in the dashboard. We believe this feature will enable you to keep track of all the movements in the workspace, so we hope you enjoy it! Changes: * Fixed bugs in plugins: Acunetix - Nmap - Nikto * Removed description from Hosts list in web UI * Fixed sort in Hosts list in web UI * Fixed ports sorting in Host view in web UI * Added search link for OS in Hosts list in web UI * Removed description from Services list in web UI * Added version to Services list in web UI * Modified false values in Hosts list in web UI * Added search links in Services list in web UI * Added scrollbar in Gtk Terminal * Added workspace status in Gtk interface * Added conflict resolution support for the Gtk interface * Added search entry for workspaces in Gtk * Added support for 'exit' command inside Faraday's Gtk terminal * Improved handling of uncaught exceptions in Gtk interface * Improved text formatting in Gtk's log console * Fixed several small bugs in Faraday GTK * Added support for resize workspace bar * Added a quote for imported reports in web UI * Added support for a new type of report in Qualysguard plugin We hope you enjoy it, and let us know if you have any questions or comments. http://ift.tt/1D4inIk http://ift.tt/1D8gKXz https://twitter.com/faradaysec

Source: Gmail -> IFTTT-> Blogger

[FD] Defense in depth -- the Microsoft way (part 40): seven+ year old "blended" threat still alive and kicking

ISS Daily Summary Report – 05/31/16

NanoRacks CubeSat Deployer #8 (NRCSD#8) Deployment Operations: Following yesterday’s successful deployment of 1 of NRCSD #8 eight Silos, 2 more were successfully deployed last night and 1 was deployed earlier this morning. The next planned deployment is scheduled for today at 6:55 PM CDT. This is the second of three consecutive days of deployment operations for NRCSD#8. Each Silo contains two CubeSats for a total of 16 Doves. The Dove satellites are a fleet of nanosatellites that enables imagery of the entire changing planet to be taken on a frequent basis, with humanitarian and environmental applications ranging from monitoring deforestation and the ice caps to disaster relief and improving agriculture yields in developing nations. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle [of deployments.   Packed Bed Reactor Experiment (PBRE) Hardware Setup and Installation: The crew reviewed PBRE reference material before gathering hardware, setting up the PBRE and components, and connecting the cables and hoses in the Microgravity Science Glovebox (MSG). The video system did not operate as expected, and troubleshooting was unsuccessful.  Ground teams are investigating.  The PBRE will be used to study the behavior of gases and liquids when they flow simultaneously through a column filled with fixed porous media. The porous media or “packing” can be made of different shapes and materials and are used in chemical engineering as a means to enhance the contact between two immiscible fluid phases (e.g., liquid-gas, water-oil, etc.). Packed columns can serve as reactors, scrubbers and strippers in systems where efficient interphase contact is desired, both on Earth and in space.   Sprint: The crew performed Sprint VO2 video setup, exercise preparation, instrument calibrations and exercise protocol.  Sprint VO2 is a test that measures oxygen uptake, ventilatory threshold, and other physiological parameters. It evaluates the use of high intensity, low volume exercise training to minimize loss of muscle, bone, and cardiovascular function in ISS crew members during long-duration missions.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the ISS.   Remote Power Controller Module (RPCM) Remove & Replace (R&R) Setup:  In preparation for this week’s activity to R&R RPCM P12B_A that failed in 2012, Robotics Ground Controllers are currently setting up the Special Purpose Dexterous Manipulator (SPDM) and relocating the Cargo Transport Container (CTC) from External Logistics Carrier (ELC) to SPDM. This activity will restore Camera Port 9 Light (P1 Lower Outboard) heater functionality. All operations are ground controlled with no crew time required.   USOS Stowage Consolidation: The crew began this activity yesterday in preparation for upcoming visiting vehicles. Today they continued moving bags and hardware off PMM rack fronts, relocating SpX-9 return items to Node 2 (N2) Endcone and stowing future crew provisions bags in the crew provisions rack. The crew also consolidated items and cleaned out N2 when they unpacked items that were delivered on SpX-8 and consolidated food items.   Advanced Resistive Exercise Device (ARED) Maintenance: The crew R&Rd all four mounting cleats on the ARED bench. Fracture analysis performed on the ground indicated that the previously installed mounting cleats had exceeded their operational life.   ARED Sensor Calibration: The crew attempted to perform a sensor calibration via the Station Support Computer (SSC) resident software. This was intended to calibrate the rotational sensors in the main arm and the load sensors for cable exercises to utilize the new ARED software load. The activity was aborted due to an error message on the SSC indicating that a required file was missing. Ground teams are currently discussing the signature and determining a forward plan.   Water Processor Assembly (WPA) Status: The WPA was commanded to process several times since Friday. The conductivity remained elevated and WPA went into reprocessing several times. Reprocessing did bring conductivity down enough to send product water to the Water Storage Tank. The likely cause of high conductivity is the combination of DiMethylSilaneDiol (DMSD) and ethanol reaching the reactor. Reprocessing allowed the WPA to clean up from the temporary spikes in DMSD and/or ethanol that may have come in from condensate. The WPA has been in reprocess for a total of 18-20 hours between Friday and today. A higher percentage of distillate to condensate was established in the Waste Water Tank to help support the conductivity recovery. WPA is currently in the standard first hour reprocess of a process cycle and the conductivity is 43 uhmos/cm.   Today’s Planned Activities All activities were completed unless otherwise noted. [ВКС] Laptops Antivirus Software Checkout / r/g 8247 Stowage consolidation on the USOS Soyuz 720 Samsung Tablet PC Charging (start) Soyuz-719 Samsung Tablet PC Charging (start) MARES. Work Area Prep Monitoring the Condition of RS Hull Structural Element Surfaces Using the МВП-2К Multipurpose Eddy Current Device (SA Cross-Section) r/g 2387 Makita Drill Battery Discharge (5 pc.) / r/g 2399 MAR. Partial Hardware Setup PBRE. Experiment Ops Review PBRE. Hardware Setup WRM. Water Balance Placeholder ARED – Bench Cleats Replacement MAR. Data Transfer from SCSI Drive to the laptop Photography of CubeSat Deployment Makita Drill Battery #1 Charge Setup/ r/g 2399 Soyuz-720 Samsung Tablet PC Charging (end) Soyuz-719 Samsung Tablet PC Charging (end) 24-hour ECG Holter Monitoring (end) / r/g 2383 Monitoring the Condition of RS Hull Structural Element Surfaces Using МВП-2К Multipurpose Eddy Current Device (ПхО Spherical Shell) r/g 2387 MD. Printer Ops 24-hour blood pressure monitoring (end) / r/g 2382 SPRINT. Hardware Activation JEM Terminal Laptop Reboot AMO2. ER7 Deactivation Makita Drill Battery #1 Charge Termination and Battery #7 Charge Start / r/g 2399 AMO2. Status Check ARED Software Familiarization Data Prep about Monitoring the Condition of RS Hull Structural Element Surfaces to be downlinked via OCA WRM. Water Balance Placeholder 24-hour ECG Holter Monitoring (Start) / r/g 2383 SPRINT. Experiment Ops (Subject) MAR. Laptop Switch 24-hour blood pressure monitoring (start) / r/g 2382 Hardware […]

from ISS On-Orbit Status Report http://ift.tt/1UtVUvC
via IFTTT

Allow comments in anonymous peer reviews

I recently discovered that neither I nor my students can submit comments or make corrections using Crocodoc when peer review assignments are ...

from Google Alert - anonymous http://ift.tt/1P3BS6N
via IFTTT

Stars and Gas of the Running Chicken Nebula


To some, it looks like a giant chicken running across the sky. To others, it looks like a gaseous nebula where star formation takes place. Cataloged as IC 2944, the Running Chicken Nebula spans about 100 light years and lies about 6,000 light years away toward the constellation of the Centaur (Centaurus). The featured image, shown in scientifically assigned colors, was captured recently in an 11-hour exposure from a backyard near Melbourne, Australia. Two star clusters are visible: the Pearl Cluster seen on the far left, and Collinder 249 embedded in the nebula's glowing gas. Although difficult to discern here, several dark molecular clouds with distinct shapes can be found inside the nebula. via NASA http://ift.tt/1UapnIf

Tuesday, May 31, 2016

Orioles Video: Adam Jones goes 2-for-4 with an RBI but can't overcome Red Sox OF Mookie Betts' 3 HRs in 6-2 loss (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Pusha T enlists Jay Z for 'Drug Dealers Anonymous'

Pusha T enlists fellow former d-boy Jay Z for 'Drug Dealers Anonymous' from his upcoming album King Push slated for release later this year.

from Google Alert - anonymous http://ift.tt/1P30VH7
via IFTTT

MLB: Mookie Betts launches 3 home runs, Xander Bogaerts extends hit streak to 24 games as Red Sox defeat Orioles 6-2 (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Red Sox: SS Xander Bogaerts extends hitting streak to 24 games with a single in the 7th inning vs. the Orioles (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Manuscript, D-Mbs Mus.ms. 1503 h (Anonymous)

Composer, Anonymous. Movements/Sections, 14 pieces: El marchese di Saluzzo; Monta sus; Basela un trato; La bone notte; La rocha el fuso ...

from Google Alert - anonymous http://ift.tt/1XdTMfC
via IFTTT

Interdependent Scheduling Games. (arXiv:1605.09497v1 [cs.GT])

We propose a model of interdependent scheduling games in which each player controls a set of services that they schedule independently. A player is free to schedule his own services at any time; however, each of these services only begins to accrue reward for the player when all predecessor services, which may or may not be controlled by the same player, have been activated. This model, where players have interdependent services, is motivated by the problems faced in planning and coordinating large-scale infrastructures, e.g., restoring electricity and gas to residents after a natural disaster or providing medical care in a crisis when different agencies are responsible for the delivery of staff, equipment, and medicine. We undertake a game-theoretic analysis of this setting and in particular consider the issues of welfare maximization, computing best responses, Nash dynamics, and existence and computation of Nash equilibria.



from cs.AI updates on arXiv.org http://ift.tt/1WXDE14
via IFTTT

Psychologically based Virtual-Suspect for Interrogative Interview Training. (arXiv:1605.09505v1 [cs.AI])

In this paper, we present a Virtual-Suspect system which can be used to train inexperienced law enforcement personnel in interrogation strategies. The system supports different scenario configurations based on historical data. The responses presented by the Virtual-Suspect are selected based on the psychological state of the suspect, which can be configured as well. Furthermore, each interrogator's statement affects the Virtual-Suspect's current psychological state, which may lead the interrogation in different directions. In addition, the model takes into account the context in which the statements are made. Experiments with 24 subjects demonstrate that the Virtual-Suspect's behavior is similar to that of a human who plays the role of the suspect.



from cs.AI updates on arXiv.org http://ift.tt/1r1ZCCl
via IFTTT

Determining the Characteristic Vocabulary for a Specialized Dictionary using Word2vec and a Directed Crawler. (arXiv:1605.09564v1 [cs.CL])

Specialized dictionaries are used to understand concepts in specific domains, especially where those concepts are not part of the general vocabulary, or having meanings that differ from ordinary languages. The first step in creating a specialized dictionary involves detecting the characteristic vocabulary of the domain in question. Classical methods for detecting this vocabulary involve gathering a domain corpus, calculating statistics on the terms found there, and then comparing these statistics to a background or general language corpus. Terms which are found significantly more often in the specialized corpus than in the background corpus are candidates for the characteristic vocabulary of the domain. Here we present two tools, a directed crawler, and a distributional semantics package, that can be used together, circumventing the need of a background corpus. Both tools are available on the web.



from cs.AI updates on arXiv.org http://ift.tt/1TVOIZ7
via IFTTT

Controlling Exploration Improves Training for Deep Neural Networks. (arXiv:1605.09593v1 [cs.LG])

Stochastic optimization methods are widely used for training of deep neural networks. However, it is still a challenging research problem to achieve effective training by using stochastic optimization methods. This is due to the difficulties in finding good parameters on a loss function that have many saddle points. In this paper, we propose a stochastic optimization method called STDProp for effective training of deep neural networks. Its key idea is to effectively explore parameters on a complex surface of a loss function. We additionally develop momentum version of STDProp. While our approaches are easy to implement with high memory efficiency, it is more effective than other practical stochastic optimization methods for deep neural networks.



from cs.AI updates on arXiv.org http://ift.tt/1XdJSLb
via IFTTT

Curiosity-driven Exploration in Deep Reinforcement Learning via Bayesian Neural Networks. (arXiv:1605.09674v1 [cs.LG])

Scalable and effective exploration remains a key challenge in reinforcement learning (RL). While there are methods with optimality guarantees in the setting of discrete state and action spaces, these methods cannot be applied in high-dimensional deep RL scenarios. As such, most contemporary RL relies on simple heuristics such as epsilon-greedy exploration or adding Gaussian noise to the controls. This paper introduces Variational Information Maximizing Exploration (VIME), an exploration strategy based on maximization of information gain about the agent's belief of environment dynamics. We propose a practical implementation, using variational inference in Bayesian neural networks which efficiently handles continuous state and action spaces. VIME modifies the MDP reward function, and can be applied with several different underlying RL algorithms. We demonstrate that VIME achieves significantly better performance compared to heuristic exploration methods across a variety of continuous control tasks and algorithms, including tasks with very sparse rewards.



from cs.AI updates on arXiv.org http://ift.tt/1RKQdoC
via IFTTT

Information Theoretically Aided Reinforcement Learning for Embodied Agents. (arXiv:1605.09735v1 [cs.AI])

Reinforcement learning for embodied agents is a challenging problem. The accumulated reward to be optimized is often a very rugged function, and gradient methods are impaired by many local optimizers. We demonstrate, in an experimental setting, that incorporating an intrinsic reward can smoothen the optimization landscape while preserving the global optimizers of interest. We show that policy gradient optimization for locomotion in a complex morphology is significantly improved when supplementing the extrinsic reward by an intrinsic reward defined in terms of the mutual information of time consecutive sensor readings.



from cs.AI updates on arXiv.org http://ift.tt/1Wvymdf
via IFTTT

Towards ontology driven learning of visual concept detectors. (arXiv:1605.09757v1 [cs.IR])

The maturity of deep learning techniques has led in recent years to a breakthrough in object recognition in visual media. While for some specific benchmarks, neural techniques seem to match if not outperform human judgement, challenges are still open for detecting arbitrary concepts in arbitrary videos. In this paper, we propose a system that combines neural techniques, a large scale visual concepts ontology, and an active learning loop, to provide on the fly model learning of arbitrary concepts. We give an overview of the system as a whole, and focus on the central role of the ontology for guiding and bootstrapping the learning of new concepts, improving the recall of concept detection, and, on the user end, providing semantic search on a library of annotated videos.



from cs.AI updates on arXiv.org http://ift.tt/1ZbBCZk
via IFTTT

Technical Report: Directed Controller Synthesis of Discrete Event Systems. (arXiv:1605.09772v1 [cs.SY])

This paper presents a Directed Controller Synthesis (DCS) technique for discrete event systems. The DCS method explores the solution space for reactive controllers guided by a domain-independent heuristic. The heuristic is derived from an efficient abstraction of the environment based on the componentized way in which complex environments are described. Then by building the composition of the components on-the-fly DCS obtains a solution by exploring a reduced portion of the state space. This work focuses on untimed discrete event systems with safety and co-safety (i.e. reachability) goals. An evaluation for the technique is presented comparing it to other well-known approaches to controller synthesis (based on symbolic representation and compositional analyses).



from cs.AI updates on arXiv.org http://ift.tt/1Vu4lJK
via IFTTT

Adversarial Feature Learning. (arXiv:1605.09782v1 [cs.LG])

The ability of the Generative Adversarial Networks (GANs) framework to learn generative models mapping from simple latent distributions to arbitrarily complex data distributions has been demonstrated empirically, with compelling results showing generators learn to "linearize semantics" in the latent space of such models. Intuitively, such latent spaces may serve as useful feature representations for auxiliary problems where semantics are relevant. However, in their existing form, GANs have no means of learning the inverse mapping -- projecting data back into the latent space. We propose Bidirectional Generative Adversarial Networks (BiGANs) as a means of learning this inverse mapping, and demonstrate that the resulting learned feature representation is useful for auxiliary supervised discrimination tasks, competitive with contemporary approaches to unsupervised and self-supervised feature learning.



from cs.AI updates on arXiv.org http://ift.tt/1XdJZGt
via IFTTT

Collaborative Filtering Bandits. (arXiv:1502.03473v7 [cs.LG] UPDATED)

Classical collaborative filtering, and content-based filtering methods try to learn a static recommendation model given training data. These approaches are far from ideal in highly dynamic recommendation domains such as news recommendation and computational advertisement, where the set of items and users is very fluid. In this work, we investigate an adaptive clustering technique for content recommendation based on exploration-exploitation strategies in contextual multi-armed bandit settings. Our algorithm takes into account the collaborative effects that arise due to the interaction of the users with the items, by dynamically grouping users based on the items under consideration and, at the same time, grouping items based on the similarity of the clusterings induced over the users. The resulting algorithm thus takes advantage of preference patterns in the data in a way akin to collaborative filtering methods. We provide an empirical analysis on medium-size real-world datasets, showing scalability and increased prediction performance (as measured by click-through rate) over state-of-the-art methods for clustering bandits. We also provide a regret analysis within a standard linear stochastic noise setting.



from cs.AI updates on arXiv.org http://ift.tt/1Dn3PTW
via IFTTT

Hierarchical Deep Reinforcement Learning: Integrating Temporal Abstraction and Intrinsic Motivation. (arXiv:1604.06057v2 [cs.LG] UPDATED)

Learning goal-directed behavior in environments with sparse feedback is a major challenge for reinforcement learning algorithms. The primary difficulty arises due to insufficient exploration, resulting in an agent being unable to learn robust value functions. Intrinsically motivated agents can explore new behavior for its own sake rather than to directly solve problems. Such intrinsic behaviors could eventually help the agent solve tasks posed by the environment. We present hierarchical-DQN (h-DQN), a framework to integrate hierarchical value functions, operating at different temporal scales, with intrinsically motivated deep reinforcement learning. A top-level value function learns a policy over intrinsic goals, and a lower-level function learns a policy over atomic actions to satisfy the given goals. h-DQN allows for flexible goal specifications, such as functions over entities and relations. This provides an efficient space for exploration in complicated environments. We demonstrate the strength of our approach on two problems with very sparse, delayed feedback: (1) a complex discrete stochastic decision process, and (2) the classic ATARI game `Montezuma's Revenge'.



from cs.AI updates on arXiv.org http://ift.tt/1Qoq3Yd
via IFTTT

Drug Dealers Anonymous

Pusha T / Drug Dealers Anonymous. Start free trial Log in · What's New · TIDAL Rising ... 1, Drug Dealers Anonymous, Pusha T featuring JAY Z, 4:14 ...

from Google Alert - anonymous http://ift.tt/20S1SbI
via IFTTT

Theme cache issue for anonymous users

I have two different domains and two themes enabled. Both domain uses different themes. For example, my first domain example.com uses theme1 ...

from Google Alert - anonymous http://ift.tt/1P1UJ2i
via IFTTT

Drupal 8 Caching Problem for anonymous users

We're having a problem with caching that is affecting anonymous users. We have a form in a block that when the user fills out the form, they are able to ...

from Google Alert - anonymous http://ift.tt/1Ufs62Z
via IFTTT

100 NFL Predictions: Ravens will trade Eugene Monroe to first team that loses a starting left tackle to injury this year (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Orioles: C Caleb Joseph to be placed on the 15-day DL after he took a foul ball off his groin area in Monday's game (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

ISS Daily Summary Report – 05/30/16

Japanese Experiment Module (JEM) Airlock (JEMAL) NanoRacks CubeSat Deployer #8 (NRCSD#8) Deployment Operations: NRCSD#8 was transferred to the JEM Remote Manipulator System (JEMRMS) and 1 of 8 Silos was successfully deployed this morning via ground commanding. Additional deploys are planned for tonight at 7:45 PM and 11:00 PM CDT. Today is the first of three consecutive days of deployment operations for NRCSD#8. The Silos contain two CubeSats for a total of 16 Doves. The Dove satellites are a fleet of nanosatellites that enables imagery of the entire changing planet to be taken on a frequent basis, with humanitarian and environmental applications ranging from monitoring deforestation and the ice caps to disaster relief and improving agriculture yields in developing nations. The NRCSD is a commercially operated small satellite deployer from the ISS, maximizing full capabilities of each airlock cycle [of deployments. The MPEP/NRCSD is put into position to be grasped by the robotic arm which then places the CubeSat deployer into the correct position to release the miniature satellites into proper orbit.   Vascular Echo Leg Doppler Operations: The crew continued Vascular Echo operations that began last week by setting up the Exercise Doppler Ultrasound protocol using the Cardiolab Portable Doppler (CDL PDOP), donning the PDOP femoral probe, and performing a 1-minute exercise followed by a resting period during which data is collected. The 1-minute exercise and data collection was performed a second time before the crew deactivated and stowed the hardware. This Canadian Space Agency (CSA) investigation examines changes in blood vessels and heart while crew members are in space, then follows their recovery on return to Earth. The results could provide insight into potential countermeasures to help maintain crew member health, and quality of life for everyone.   Auxin Transport Run #3: Following last week’s completion of the second experiment run, today the crew conducted the first day of the third Auxin Transport experiment run by retrieving the samples from the Minus Eighty Degree Laboratory Freezer for ISS (MELFI) before preparing and installing the samples into the Cell Biology Experiment Unit (CBEF) for incubation. The incubation process takes 3 days and will be followed by fixation, sampling and closeout activities on day 4. The Japan Aerospace Exploration Agency (JAXA) Auxin Transport investigation objective is to clarify the role of auxins in pea and corn seedlings grown in microgravity, leading to new insight into how gravity, or the lack of gravity, affects plant development. The data obtained from the second experiment run will provide evidence of spaceflight alterations in auxin polar transport and endogenous levels of auxin, resulting in automorphogenesis.   Biological Rhythms 48 Armband Activity Monitor Setup: In preparation for upcoming Biological Rhythms activities this week, the crew set up of the Armband monitor using the European Physiology Modules (EPM) Laptop. The objective of this investigation is to examine the circadian variation of an astronaut’s cardiac autonomic function during space flight using a digital electrocardiograph “Digital Walk Holter ECG”.   Habitability Human Factors Directed Observations: The crew recorded and submitted a walk-through video documenting observations of an area or activity providing insight related to human factors and habitability. The Habitability investigation collects observations about the relationship between crew members and their environment on the International Space Station. Observations can help spacecraft designers understand how much habitable volume is required, and whether a mission’s duration impacts how much volume crew members need.   External Wireless Communication (EWC) System Installation: The crew derouted the existing External Wireless Instrumentation System (EWIS) wire harness in the Lab. They then installed a new coaxial cable that restores current functionality and permits installation of 2 Wireless Access Points (WAPs) at the Lab Forward. The WAPs connect to the Joint Station Local Area Network (JSL) and external antennas already installed on the outside of the Lab.   Bigelow Expandable Aerospace Module (BEAM): Over the weekend, the crew and ground teams successfully inflated and pressurized BEAM. Manual inflation was completed with 67” of axial displacement and a full diameter of 127”, and full pressurization followed shortly thereafter. IMV/vestibule reconfiguration will begin Wednesday with ingress planned for Monday, June 6.   USOS Stowage Consolidation: In preparation for upcoming visiting vehicles, the crew started moving bags and hardware off PMM rack fronts, relocating SpX-9 return items to Node 2 (N2) Endcone and stowing future crew provisions bags in the crew provisions rack.   Mobile Servicing System (MSS) Operations: Yesterday, Robotics Ground Controllers manuevered the Space Station Remote Manipulator System (SSRMS) to pick up the Special Purpose Dexterous Manipulator (SPDM) and prepare for the Remote Power Control Module (RPCM) P1_2B_A Remove & Replace scheduled to start tomorrow.   Today’s Planned Activities All activities were completed unless otherwise noted. МО-8. Body Mass Measurement r/g 2381 BLR48 Monitor Setup МО-8. Closeout Ops BLR48 Monitor Installation (Operator) Filling (separation) of EDV (KOV) for Elektron or EDV-SV JEMRMS RLT2 Activation JEMAL Slide Table (ST) Extension to JEF Side Auxiliary Laptop Anti-Virus Update / r/g 8247 ELECTRONIC NOSE. Experiment Ops r/g 2384 MPCC  P2 Laptop Activation and Boot from USB Stick AUT Stowage Prepack 24-hour ECG Monitoring (start) / r/g 2382 СОЖ Maintenance AUT Sample Retrieval from MELFI JPM THC b Water Separator R&R Familiarization JEMRMS Small Fine Arm (SFA) Ungrapple HABIT Preparing for the experiment JPM THC b Water Separator R&R 24-hour BP monitoring (start) / r/g 2383 Preparing to monitor condition of RS structural surfaces using МВП-2К device r/g 2387 Scheduled maintenance of Central Post Laptop, Start Test 1 r/g 2380 JEMAL Slide Table Retraction AUT Sample Preparation Scheduled maintenance of Central Post Laptop, Terminating test 1 and starting Test 2 r/g 2380 External Wireless Communication (EWC) System, System installation, Big Picture Words AUT Meas Exp Unit B (MEU-B) (2) Attachment Gathering External Wireless Communication (EWC) System Equipment AUT Meas Exp Unit B (MEU-B) (3) Attachment Scheduled maintenance of Central Post Laptop, Start Test 3 r/g 2380 CubeSat Deployment Photos JPM THC b Water Separator R&R Life On The Station Photo and Video / r/g 2000 Scheduled maintenance of Central Post Laptop. […]

from ISS On-Orbit Status Report http://ift.tt/1TTWIKl
via IFTTT

[FD] [RT-SA-2016-005] Unauthenticated File Upload in Relay Ajax Directory Manager may Lead to Remote Command Execution

Advisory: Unauthenticated File Upload in Relay Ajax Directory Manager may Lead to Remote Command Execution A vulnerability within the Relay Ajax Directory Manager web application allows unauthenticated attackers to upload arbitrary files to the web server running the web application. Details ======= Product: Relay Ajax Directory Manager Affected Versions: relayb01-071706, 1.5.1, 1.5.3 were tested, other versions most likely vulnerable as well. Fixed Versions: - Vulnerability Type: Unauthenticated File Upload Security Risk: high Vendor URL: http://ift.tt/1Pfk2TM Vendor Status: decided not to fix, project is unmaintained Advisory URL: http://ift.tt/1sIvGMP Advisory Status: published CVE: GENERIC-MAP-NOMATCH CVE URL: http://ift.tt/1jQGmEN Introduction ============ Relay Ajax Directory Manager[1], also known as relay[2], is a web-based file manager. It allows files and folders to be uploaded via drag and drop and provides several other features, such as a thumbnail preview for images and basic user authentication functionality. More Details ============ While the web application itself is mostly written in PHP, it also utilizes the Perl script 'upload.pl' for handling uploads initiated by the user. Uploading is a multi-step process: 1. The user initiates a multipart/form-data upload request through the web application. This request is sent to the Perl script and the following steps are handled by it. 2. A temporary file containing the entire request (including headers) is created. This temporary file is named partly by the first URL parameter, as shown in the following listing. 3. The headers and the POST body of the request are parsed and filtered to determine the final filename. 4. The upload is written to the final destination. 5. A file containing statistics about the upload process is written During steps 2-5, no checks are performed to ensure that the user is sufficiently authenticated. The following listing shows parts of the upload Perl script: -- upload.pl

Source: Gmail -> IFTTT-> Blogger

[FD] [RT-SA-2016-004] Websockify: Remote Code Execution via Buffer Overflow

Advisory: Websockify: Remote Code Execution via Buffer Overflow RedTeam Pentesting discovered a buffer overflow vulnerability in the C implementation of Websockify, which allows attackers to execute arbitrary code. Details ======= Product: Websockify C implementation Affected Versions: all versions <= 0.8.0 Fixed Versions: versions since commit 192ec6f (2016-04-22) [0] Vulnerability Type: Buffer Overflow Security Risk: high Vendor URL: http://ift.tt/19GQpRR Vendor Status: fixed Advisory URL: http://ift.tt/1sIvIEp Advisory Status: published CVE: GENERIC-MAP-NOMATCH CVE URL: http://ift.tt/1jQGmEN Introduction ============ "websockify was formerly named wsproxy and was part of the noVNC project. At the most basic level, websockify just translates WebSockets traffic to normal TCP socket traffic. Websockify accepts the WebSockets handshake, parses it, and then begins forwarding traffic between the client and the target in both directions." (from the project's readme) More Details ============ For each new connection, websockify forks and calls the function do_handshake() to receive a client's WebSocket handshake. The following excerpt shows some of the source code responsible for receiving the client's data from the socket file descriptor:

Source: Gmail -> IFTTT-> Blogger

[FD] [RT-SA-2015-012] XML External Entity Expansion in Paessler PRTG Network Monitor

I have a new follower on Twitter


InEight Inc.
Creator of project cost management software for EC&O, mining, oil & gas, utilities, and industrial machinery & components industries.
Scottsdale, AZ
http://t.co/MJEylUMfOV
Following: 4473 - Followers: 4454

May 31, 2016 at 07:39AM via Twitter http://twitter.com/ineightsoftware

Anonymous Tip Leads to Underage Party Bust near Hazleton

An anonymous tip led to the bust of an underage party near Hazleton on Sunday night. Authorities responded to the area near Cunningham Ferry.

from Google Alert - anonymous http://ift.tt/1UeWg6k
via IFTTT

Forum

Tuesday, 31 May 2016, 4:52 PM. We also used Anonymous Posting plugin in version 2.8, but seems it doesn't support Moodle 3.X. Average of ratings: ...

from Google Alert - anonymous http://ift.tt/1Xb620y
via IFTTT

Add `crossorigin="anonymous"`

Add `crossorigin="anonymous"` to embedded images #3157. Open. ThiefMaster opened this Issue just now · 0 comments ...

from Google Alert - anonymous http://ift.tt/1Z9uNav
via IFTTT

Monday, May 30, 2016

Hacker Selling 65 Million Passwords From Tumblr Data Breach

Earlier this month Tumblr revealed that a third party had obtained access to a set of e-mail addresses and passwords dating back from early 2013, before being acquired by Yahoo. <!-- adsense --> At that time, Tumblr did not reveal the number of affected users, but in reality, around 65,469,298 accounts credentials were leaked in the 2013 Tumblr data breach, according to security expert Troy


from The Hacker News http://ift.tt/25xgKmy
via IFTTT

Iran orders all Messaging Apps to store its citizens' data within Country

Last year, Iran blocked Telegram and many other social networks after their founders refused to help Iranian authorities to spy on their citizens. Now it looks like Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country that will give the authorities a wider ability to monitor and censor its people. <!-- adsense --> All foreign


from The Hacker News http://ift.tt/25vdLHS
via IFTTT

Anonymous Icon, Anonymous Icon Eps10, Anonymous Icon Vector, Anonymous Icon Eps ...

Anonymous icon, Anonymous icon eps10, Anonymous icon vector, Anonymous icon eps, Anonymous icon jpg, Anonymous icon picture, Anonymous ...

from Google Alert - anonymous http://ift.tt/1RH9Eid
via IFTTT

I have a new follower on Twitter


Bobby Morris



Following: 3672 - Followers: 1314

May 30, 2016 at 09:17PM via Twitter http://twitter.com/Morris07C

Computational Estimate Visualisation and Evaluation of Agent Classified Rules Learning System. (arXiv:1605.08878v1 [cs.CY])

Student modelling and agent classified rules learning as applied in the development of the intelligent Preassessment System has been presented in [10],[11]. In this paper, we now demystify the theory behind the development of the pre-assessment system followed by some computational experimentation and graph visualisation of the agent classified rules learning algorithm in the estimation and prediction of classified rules. In addition, we present some preliminary results of the pre-assessment system evaluation. From the results, it is gathered that the system has performed according to its design specification.



from cs.AI updates on arXiv.org http://ift.tt/1PdQTbP
via IFTTT

MCMC assisted by Belief Propagaion. (arXiv:1605.09042v1 [stat.ML])

Markov Chain Monte Carlo (MCMC) and Belief Propagation (BP) are the most popular algorithms for computational inference in Graphical Models (GM). In principle, MCMC is an exact probabilistic method which, however, often suffers from exponentially slow mixing. In contrast, BP is a deterministic method, which is typically fast, empirically very successful, however in general lacking control of accuracy over loopy graphs. In this paper, we introduce MCMC algorithms correcting the approximation error of BP, i.e., we provide a way to compensate for BP errors via a consecutive BP-aware MCMC. Our framework is based on the Loop Calculus (LC) approach which allows to express the BP error as a sum of weighted generalized loops. Although the full series is computationally intractable, it is known that a truncated series, summing up all 2-regular loops, is computable in polynomial-time for planar pair-wise binary GMs and it also provides a highly accurate approximation empirically. Motivated by this, we first propose a polynomial-time approximation MCMC scheme for the truncated series of general (non-planar) pair-wise binary models. Our main idea here is to use the Worm algorithm, known to provide fast mixing in other (related) problems, and then design an appropriate rejection scheme to sample 2-regular loops. Furthermore, we also design an efficient rejection-free MCMC scheme for approximating the full series. The main novelty underlying our design is in utilizing the concept of cycle basis, which provides an efficient decomposition of the generalized loops. In essence, the proposed MCMC schemes run on transformed GM built upon the non-trivial BP solution, and our experiments show that this synthesis of BP and MCMC outperforms both direct MCMC and bare BP schemes.



from cs.AI updates on arXiv.org http://ift.tt/27ZAKgo
via IFTTT

Understanding Convolutional Neural Networks. (arXiv:1605.09081v1 [stat.ML])

Convoulutional Neural Networks (CNNs) exhibit extraordinary performance on a variety of machine learning tasks. However, their mathematical properties and behavior are quite poorly understood. There is some work, in the form of a framework, for analyzing the operations that they perform. The goal of this project is to present key results from this theory, and provide intuition for why CNNs work.



from cs.AI updates on arXiv.org http://ift.tt/1qYArAG
via IFTTT

Control of Memory, Active Perception, and Action in Minecraft. (arXiv:1605.09128v1 [cs.AI])

In this paper, we introduce a new set of reinforcement learning (RL) tasks in Minecraft (a flexible 3D world). We then use these tasks to systematically compare and contrast existing deep reinforcement learning (DRL) architectures with our new memory-based DRL architectures. These tasks are designed to emphasize, in a controllable manner, issues that pose challenges for RL methods including partial observability (due to first-person visual observations), delayed rewards, high-dimensional visual observations, and the need to use active perception in a correct manner so as to perform well in the tasks. While these tasks are conceptually simple to describe, by virtue of having all of these challenges simultaneously they are difficult for current DRL architectures. Additionally, we evaluate the generalization performance of the architectures on environments not used during training. The experimental results show that our new architectures generalize to unseen environments better than existing DRL architectures.



from cs.AI updates on arXiv.org http://ift.tt/1U8VOXB
via IFTTT

Internal Guidance for Satallax. (arXiv:1605.09293v1 [cs.LO])

We propose a new internal guidance method for automated theorem provers based on the given-clause algorithm. Our method influences the choice of unprocessed clauses using positive and negative examples from previous proofs. To this end, we present an efficient scheme for Naive Bayesian classification by generalising label occurrences to types with monoid structure. This makes it possible to extend existing fast classifiers, which consider only positive examples, with negative ones. We implement the method in the higher-order logic prover Satallax, where we modify the delay with which propositions are processed. We evaluated our method on a simply-typed higher-order logic version of the Flyspeck project, where it solves 26% more problems than Satallax without internal guidance.



from cs.AI updates on arXiv.org http://ift.tt/1PdQIx9
via IFTTT

Synthesizing the preferred inputs for neurons in neural networks via deep generator networks. (arXiv:1605.09304v1 [cs.NE])

Deep neural networks (DNNs) have demonstrated state-of-the-art results on many pattern recognition tasks, especially vision classification problems. Understanding the inner workings of such computational brains is both fascinating basic science that is interesting in its own right - similar to why we study the human brain - and will enable researchers to further improve DNNs. One path to understanding how a neural network functions internally is to study what each of its neurons has learned to detect. One such method is called activation maximization (AM), which synthesizes an input (e.g. an image) that highly activates a neuron. Here we dramatically improve the qualitative state of the art of activation maximization by harnessing a powerful, learned prior: a deep generator network (DGN). The algorithm (1) generates qualitatively state-of-the-art synthetic images that look almost real, (2) reveals the features learned by each neuron in an interpretable way, (3) generalizes well to new datasets and somewhat well to different network architectures without requiring the prior to be relearned, and (4) can be considered as a high-quality generative method (in this case, by generating novel, creative, interesting, recognizable images).



from cs.AI updates on arXiv.org http://ift.tt/1U8Wg8k
via IFTTT

Unsupervised Discovery of El Nino Using Causal Feature Learning on Microlevel Climate Data. (arXiv:1605.09370v1 [stat.ML])

We show that the climate phenomena of El Nino and La Nina arise naturally as states of macro-variables when our recent causal feature learning framework (Chalupka 2015, Chalupka 2016) is applied to micro-level measures of zonal wind (ZW) and sea surface temperatures (SST) taken over the equatorial band of the Pacific Ocean. The method identifies these unusual climate states on the basis of the relation between ZW and SST patterns without any input about past occurrences of El Nino or La Nina. The simpler alternatives of (i) clustering the SST fields while disregarding their relationship with ZW patterns, or (ii) clustering the joint ZW-SST patterns, do not discover El Nino. We discuss the degree to which our method supports a causal interpretation and use a low-dimensional toy example to explain its success over other clustering approaches. Finally, we propose a new robust and scalable alternative to our original algorithm (Chalupka 2016), which circumvents the need for high-dimensional density learning.



from cs.AI updates on arXiv.org http://ift.tt/1PdQupM
via IFTTT

Computing rational decisions in extensive games with limited foresight. (arXiv:1502.03683v6 [cs.AI] UPDATED)

We introduce a class of extensive form games where players might not be able to foresee the possible consequences of their decisions and form a model of their opponents which they exploit to achieve a more profitable outcome. We improve upon existing models of games with limited foresight, endowing players with the ability of higher-order reasoning and proposing a novel solution concept to address intuitions coming from real game play. We analyse the resulting equilibria, devising an effective procedure to compute them.



from cs.AI updates on arXiv.org http://ift.tt/1D1Dwnu
via IFTTT

Generalized Support and Formal Development of Constraint Propagators. (arXiv:1504.05846v2 [cs.AI] UPDATED)

Constraint programming is a family of techniques for solving combinatorial problems, where the problem is modelled as a set of decision variables (typically with finite domains) and a set of constraints that express relations among the decision variables. One key concept in constraint programming is propagation: reasoning on a constraint or set of constraints to derive new facts, typically to remove values from the domains of decision variables. Specialised propagation algorithms (propagators) exist for many classes of constraints.

The concept of support is pervasive in the design of propagators. Traditionally, when a domain value ceases to have support, it may be removed because it takes part in no solutions. Arc-consistency algorithms such as AC2001 make use of support in the form of a single domain value. GAC algorithms such as GAC-Schema use a tuple of values to support each literal. We generalize these notions of support in two ways. First, we allow a set of tuples to act as support. Second, the supported object is generalized from a set of literals (GAC-Schema) to an entire constraint or any part of it.

We design a methodology for developing correct propagators using generalized support. A constraint is expressed as a family of support properties, which may be proven correct against the formal semantics of the constraint. Using Curry-Howard isomorphism to interpret constructive proofs as programs, we show how to derive correct propagators from the constructive proofs of the support properties. The framework is carefully designed to allow efficient algorithms to be produced. Derived algorithms may make use of dynamic literal triggers or watched literals for efficiency. Finally, two case studies of deriving efficient algorithms are given.



from cs.AI updates on arXiv.org http://ift.tt/1Hnu0NX
via IFTTT

Value Iteration Networks. (arXiv:1602.02867v2 [cs.AI] UPDATED)

We introduce the value iteration network (VIN): a fully differentiable neural network with a `planning module' embedded within. VINs can learn to plan, and are suitable for predicting outcomes that involve planning-based reasoning, such as policies for reinforcement learning. Key to our approach is a novel differentiable approximation of the value-iteration algorithm, which can be represented as a convolutional neural network, and trained end-to-end using standard backpropagation. We evaluate VIN based policies on discrete and continuous path-planning domains, and on a natural-language based search task. We show that by learning an explicit planning computation, VIN policies generalize better to new, unseen domains.



from cs.AI updates on arXiv.org http://ift.tt/1XhcmQD
via IFTTT

Fundamental Differences between Dropout and Weight Decay in Deep Networks. (arXiv:1602.04484v3 [cs.LG] UPDATED)

We analyze dropout in deep networks with rectified linear units and the quadratic loss. Our results expose surprising differences between the behavior of dropout and more traditional regularizers like weight decay. For example, on some simple data sets dropout training produces negative weights even though the output is the sum of the inputs. This provides a counterpoint to the suggestion that dropout discourages co-adaptation of weights. We also show that the dropout penalty can grow exponentially in the depth of the network while the weight-decay penalty remains essentially linear, and that dropout is insensitive to various re-scalings of the input features, outputs, and network weights. This last insensitivity implies that there are no isolated local minima of the dropout training criterion. Our work uncovers new properties of dropout, extends our understanding of why dropout succeeds, and lays the foundation for further progress.



from cs.AI updates on arXiv.org http://ift.tt/1KSFax2
via IFTTT

Reinforcement Learning of POMDPs using Spectral Methods. (arXiv:1602.07764v2 [cs.AI] UPDATED)

We propose a new reinforcement learning algorithm for partially observable Markov decision processes (POMDP) based on spectral decomposition methods. While spectral methods have been previously employed for consistent learning of (passive) latent variable models such as hidden Markov models, POMDPs are more challenging since the learner interacts with the environment and possibly changes the future observations in the process. We devise a learning algorithm running through episodes, in each episode we employ spectral techniques to learn the POMDP parameters from a trajectory generated by a fixed policy. At the end of the episode, an optimization oracle returns the optimal memoryless planning policy which maximizes the expected reward based on the estimated POMDP model. We prove an order-optimal regret bound with respect to the optimal memoryless policy and efficient scaling with respect to the dimensionality of observation and action spaces.



from cs.AI updates on arXiv.org http://ift.tt/1THDTM1
via IFTTT