Latest YouTube Video

Saturday, March 19, 2016

I have a new follower on Twitter


Business Rockstars
Business Rockstars is Everything Entrepreneur. We are the largest daily producer of entrepreneurial content - bringing together CEO's, Startups, & Entrepreneurs
California
http://t.co/9CDKIhCNK6
Following: 272749 - Followers: 499071

March 19, 2016 at 09:10PM via Twitter http://twitter.com/bizrockstars

Can someone walk me through this? anonymous called function

//Lamba var closureAlert = (function() { var x = 0; var alerter = function() { alert(++x); } return alerter; }()); // calling itself with a closure closureAlert(); ...

from Google Alert - anonymous http://ift.tt/25bO93z
via IFTTT

Anonymous

Anonymous. Share your answer (max 140 characters): Screaming when we win the lottery. Location: Florida. Source: website. 4. Average: 4 (1 vote).

from Google Alert - anonymous http://ift.tt/1nY2crE
via IFTTT

Valley view high school science class gets anonymous donation

Germantown, OH-- An anonymous donation of $8000 dollars was given to Valley View Junior High School's science class.By the end of the day, ...

from Google Alert - anonymous http://ift.tt/1Lxg5IE
via IFTTT

Anonymous

Anonymous. Anonymous. Donate on behalf of Anonymous: Heart Logo Donate Spread the word. Join Us! Social Icon. Sign Up For Newsletter.

from Google Alert - anonymous http://ift.tt/1Wylb8b
via IFTTT

Security Researcher Goes Missing, Who Investigated Bangladesh Bank Hack

Tanvir Hassan Zoha, a 34-year-old security researcher, who spoke to media on the $81 Million Bangladesh Bank cyber theft, has gone missing since Wednesday night, just days after accusing Bangladesh's central bank officials of negligence. Zoha was investigating a recent cyber attack on Bangladesh's central bank that let hackers stole $81 Million from the banks' Federal Reserve bank account.


from The Hacker News http://ift.tt/1MtKVNh
via IFTTT

Ravens: Joe Flacco among teammates \"devastated\" by loss of Tray Walker - \"this is very hard to wrap my head around\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

'leak' of Donald Trump's cell phone and SSN are nothing new

Hacker collective Anonymous claimed to have leaked Donald Trump's private details on Thursday, but most of the dump was already ...

from Google Alert - anonymous http://ift.tt/1pSB0fm
via IFTTT

What to Know About the Worldwide Hacker Group 'Anonymous'

anyaberkut/iStock/Thinkstock(NEW YORK) — The collective “Anonymous” claimed on Thursday that it had hacked GOP presidential candidate Donald ...

from Google Alert - anonymous http://ift.tt/1Rap4ML
via IFTTT

Bored With Chess? Here's How To Play Basketball in Facebook Messenger

Hope all of you have enjoyed the Game of Chess in the Facebook Messenger. But if you're quite bored playing Chess or not really good at the game, then you probably felt a bit excited about Facebook's recent inclusion of a little Basketball mini-game into Messenger. Now you can play Basketball through Facebook Messenger, just by typing in the Basketball emoji and sending to one of your


from The Hacker News http://ift.tt/25aSS5o
via IFTTT

Apple Engineers say they may Quit if ordered to Unlock iPhone by FBI

Apple Vs. FBI battle over mobile encryption case is taking more twists and turns with every day pass by. On one hand, the US Department of Justice (DOJ) is boldly warning Apple that it might compel the company to hand over the source code of its full iOS operating system along with the private electronic signature needed to run a modified iOS version on an iPhone, if… …Apple does not


from The Hacker News http://ift.tt/1pAb8Fj
via IFTTT

How to Make $100,000? Just Hack Google Chromebook

Yes, you could earn $100,000 if you have the hacking skills and love to play with electronics and gadgets. Google has doubled its top bug bounty for hackers who can crack its Chromebook or Chromebox machine over the Web. So if you want to get a big fat check from Google, you must have the ability to hack a Chromebook remotely, that means your exploit must be delivered via a Web page.


from The Hacker News http://ift.tt/1TVVK2c
via IFTTT

The W in Cassiopeia


A familiar, zigzag, W pattern in northern constellation Cassiopeia is traced by five bright stars in this colorful and broad mosaic. Stretching about 15 degrees across rich starfields, the celestial scene includes dark clouds, bright nebulae, and star clusters along the Milky Way. In yellow-orange hues Cassiopeia's alpha star Shedar is a standout though. The yellowish giant star is cooler than the Sun, over 40 times the solar diameter, and so luminous it shines brightly in Earth's night from 230 light-years away. A massive, rapidly rotating star at the center of the W, bright Gamma Cas is about 550 light-years distant. Bluish Gamma Cas is much hotter than the Sun. Its intense, invisible ultraviolet radiation ionizes hydrogen atoms in nearby interstellar clouds to produce visible red H-alpha emission as the atoms recombine with electrons. Of course, night skygazers in the Alpha Centauri star system would also see the recognizable outline traced by Cassiopeia's bright stars. But from their perspective a mere 4.3 light-years away they would see our Sun as a sixth bright star in Cassiopeia, extending the zigzag pattern just beyond the left edge of this frame. via NASA http://ift.tt/1VjfPz3

Friday, March 18, 2016

Trump Airtime, Anonymous Sources & Locker Room Interviews

Anonymous – The New York Times announces, yet again, that it's cracking down on the use of anonymous sources. Why is this practice still giving so ...

from Google Alert - anonymous http://ift.tt/1ptUbf5
via IFTTT

anonymous user menu in wp admin bar?

Hey everyone, I'm using the buddypress plugin and I want to have the same sort of profile menu they have for anonymous users when they enter the ...

from Google Alert - anonymous http://ift.tt/1VlnxZr
via IFTTT

I have a new follower on Twitter


Elizabeth Cud.
There are two levers for moving.. interest and fear


Following: 1646 - Followers: 600

March 18, 2016 at 06:55PM via Twitter http://twitter.com/elizcudder

Ravens: John Harbaugh writes open letter to his players after Tray Walker seriously injured; \"take care of each other\" (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous have made their first attack on Donald Trump

After declaring “total war” on Donald Trump earlier this week, it looks like Anonymous have now made their first move. According to a series of tweets ...

from Google Alert - anonymous http://ift.tt/1R8Nc2s
via IFTTT

The Best Way to Send and Receive End-to-End Encrypted Emails

How many of you know the fact that your daily e-mails are passaged through a deep espionage filter? This was unknown until the whistleblower Edward Snowden broke all the surveillance secrets, which made privacy and security important for all Internet users than ever before. I often get asked "How to send encrypted email?", "How can I protect my emails from prying eyes?" and "Which is


from The Hacker News http://ift.tt/1TUkHv0
via IFTTT

NFL: Ravens CB Tray Walker \"fighting for his life\" after motorcycle accident on Thursday, agent tells Baltimore Sun (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Malvertising Campaign Hits Top Websites to Spread Ransomware

Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation. Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs. Here's


from The Hacker News http://ift.tt/1R2VSe2
via IFTTT

ISS Daily Summary Report – 03/17/16

Ocular Health (OH) Cardiac Operations: With operator assistance and remote guidance from the OH ground team, Kopra and Peake administered blood pressure measurements and ultrasound scanning activities which support the Health Maintenance System (HMS) eye ultrasound exam.  Crew members’ bodies change in a variety of ways during space flight, and some experience impaired vision. Tests monitor microgravity-induced visual impairment as well as changes believed to arise from elevated intracranial pressure to characterize how living in microgravity can affect the visual, vascular and central nervous systems. The investigation also measures how long it takes for crew members to return to normal after they return to Earth.   Microbiome:  Kopra completed a Flight Day (FD) 90 body sample collection and stowed the samples into a box module in a Minus Eight-degree Freezer for ISS (MELFI). Microbiome investigates the impact of space travel on both the human immune system and an individual’s Microbiome (the collection of microbes that live in and on the human body at any given time).   Multi-Purpose End-To-End Robotics Operations Network (METERON) and SUPerVISory control of the Eurobot (SUPVIS-E) Control Test: Peake relocated and set up the METERON laptops and Video Camera Assembly (VCA)1 prior to executing the METERON test. He used the Rover Control software on the ISS and the Eurobot Ground Prototype (EGP) on the ground to execute the investigation. During execution of METERON-SUPVISE-TST1 the rover did not respond to ground commands due to a connectivity issue. A software reset and EGP reboots did not resolve the problem. Operations were deferred while ground teams review the data. METERON tele-operates robots on Earth from the ISS to validate technology for future exploration missions where astronauts can operate surface robots from their spacecraft with ground support. SUPVIS-E is the third step of the METERON project, continuing to use the Delay Tolerant Network (DTN) technology that automates store-and-forward techniques to compensate for the intermittent connectivity typical of space missions.   Cygnus Robotics On-Board Trainer (RoBOT) On-Board Training (OBT) and Self Study: Kopra completed another session of this training in preparation for OA-6 arrival currently scheduled for March 26. The procedure included a 30 meter approach, two Capture Point hold runs and 2 meter runs.   Hatch Seal Inspection: Peake completed the second of two sessions of this scheduled maintenance to clean the USOS hatch seals in Node 2, Node 3, PMM, COL and JEM. He inspected the sealing surface and hatch handle mechanisms for Foreign Object Debris (FOD) or damage. He took photos during the inspection which he downlinked to the ground for review.   Today’s Planned Activities All activities were completed unless otherwise noted. HRF Saliva Sample Collection Biochemical Urine Test r/g 1673 HRF – Sample Insertion into MELFI URISYS Hardware Stowage USND2 – Hardware Activation Ultrasound – Scanning Prep Daily Planning Conference (S-band) Ultrasound2 – Scan performed by a Crew Medical Officer (CMO) Ocular Health Experiment – Ultrasound 2 – Scan Verification of ИП-1 Flow Sensor Position / SM Pressure Control & Atmosphere Monitoring System Ultrasound Data Export Ops with ИДЭ-3 Smoke Detectors No.1 and No.3 in DC1 / r/g 1681 Ocular Health Experiment – Ultrasound 2 – Scan Ultrasound2 – Scan performed by a Crew Medical Officer (CMO) Health Maintenance System (HMS) – Ultrasound2 Scan – Post-exam ops METERON – Overview Ultrasound Data Export METERON – Laptop setup METERON -Equipment testing OBT – Dragon Rendezvous and Berthing Procedures Review Log File Dump / r/g 1671 OH – Ocular Health Cardiac Operations Ocular Health (OH) – Operator Assistance with the Experiment OH – Ocular Health Cardiac Operations Ocular Health (OH) – Operator Assistance with the Experiment On MCC GO ISS N2 Repress from Progress 429 (Aft) СрПК Section 2 (start) iPad Restow On MCC GO ISS N2 Repress from Progress 429 (Аft) СрПК Section 2 (terminate) Replacement of КОБ2 loop 4СПН2 panel H1 replaceable pump assembly r/g 1683 USND2 – Equipment Deactivation and Stowage ECLSS – Tank Drain Water Recovery and Management (WRM): Condensate Pumping Initiation Hatch Seal Inspection RGN – Initiate drain into EDV CSL5 – Laptop relocation from SM and loading Water Recovery and Management (WRM): Condensate Pumping Termination ARED Cylinder Flywheel Evacuation СОЖ Maintenance SPLANH. Preparation for Experiment / r/g 1672   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Cygnus RoBOT OBT support Nominal ground commanding   Three-Day Look Ahead: Friday, 03/18: 46S launch/dock (crew sleep shift), docking prep/arrival tasks Saturday, 03/19: Crew sleep day following 46S docking activities Sunday, 03/20: Crew off duty   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1RqzcjG
via IFTTT

Anonymous claims they Hacked Donald Trump ...Really?

The 'Hacktivist' collective group Anonymous claimed to have leaked personal details of the controversial US presidential candidate Donald Trump, including his Mobile Phone Number and Social Security Number (SSN). Donald Trump SSN: 086-38-5955 DOB: 06/14/1946 Phone Number: 212-832-2000 Cell/Mobile Phone Number: (917) 756-8000 The hacktivist group has declared war against Trump under a


from The Hacker News http://ift.tt/1MdNacw
via IFTTT

'Anonymous' claims it has hacked Trump's personal info

'Anonymous' claims it has hacked Trump's personal info. Mar. 18, 2016 - 3:24 - Hacker group releases Trump's cell phone number, social security info.

from Google Alert - anonymous http://ift.tt/1UGfNR9
via IFTTT

The Roots Celebrate St. Patrick's Day, Anonymous Declares War on Trump

Jimmy Fallon's monologue from Thursday, March 17. Part 1 of 2.

from Google Alert - anonymous http://ift.tt/1WvodtI
via IFTTT

Ever Wonder How Facebook Decides — How much Bounty Should be Paid?

Facebook pays Millions of dollars every year to researchers and white hat hackers from all around the world to stamp out security holes in its products and infrastructure under its Bug Bounty Program. Facebook recognizes and rewards bug hunters to encourage more people to help the company keep Facebook users safe and secure from outside entities, malicious hackers or others. Recently, the


from The Hacker News http://ift.tt/1RouKs5
via IFTTT

I have a new follower on Twitter


Mark Somol
Technology company builder. leadership | venture capital | startups | soccer | skiing | drummer | triathlons.
Boston, MA
https://t.co/2UouIr8iEF
Following: 3238 - Followers: 3550

March 18, 2016 at 02:35AM via Twitter http://twitter.com/marksomol

Close Comet and Large Magellanic Cloud


Sporting a surprisingly bright, lovely green coma Comet 252P/Linear poses next to the Large Magellanic Cloud in this southern skyscape. The stack of telephoto exposures was captured on March 16 from Penwortham, South Australia. Recognized as a Jupiter family periodic comet, 252P/Linear will come close to our fair planet on March 21, passing a mere 5.3 million kilometers away. That's about 14 times the Earth-Moon distance. In fact, it is one of two comets that will make remarkably close approaches in the next few days as a much fainter Comet Pan-STARRS (P/2016 BA14) comes within 3.5 million kilometers (9 times the Earth-Moon distance) on March 22. The two have extremely similar orbits, suggesting they may have originally been part of the same comet. Sweeping quickly across the sky because of their proximity to Earth, both comets will soon move into northern skies. via NASA http://ift.tt/1WsRHZf

Thursday, March 17, 2016

NFL: Ravens CB Tray Walker in critical condition after motorcycle accident; \"This is devastating news\" - John Harbaugh (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Hardware Acceleration for Boolean Satisfiability Solver by Applying Belief Propagation Algorithm. (arXiv:1603.05314v1 [cs.AI])

Boolean satisfiability (SAT) has an extensive application domain in computer science, especially in electronic design automation applications. Circuit synthesis, optimization, and verification problems can be solved by transforming original problems to SAT problems. However, the SAT problem is known as NP-complete, which means there is no efficient method to solve it. Therefore, an efficient SAT solver to enhance the performance is always desired. We propose a hardware acceleration method for SAT problems. By surveying the properties of SAT problems and the decoding of low-density parity-check (LDPC) codes, a special class of error-correcting codes, we discover that both of them are constraint satisfaction problems. The belief propagation algorithm has been successfully applied to the decoding of LDPC, and the corresponding decoder hardware designs are extensively studied. Therefore, we proposed a belief propagation based algorithm to solve SAT problems. With this algorithm, the SAT solver can be accelerated by hardware. A software simulator is implemented to verify the proposed algorithm and the performance improvement is estimated. Our experiment results show that time complexity does not increase with the size of SAT problems and the proposed method can achieve at least 30x speedup compared to MiniSat.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1MqpwnW
via IFTTT

Neural Aggregation Network for Video Face Recognition. (arXiv:1603.05474v1 [cs.CV])

In this paper, we present a Neural Aggregation Network (NAN) for video face recognition. The network takes a face video or face image set of a person with variable number of face frames as its input, and produces a compact and fixed-dimension visual representation of that person. The whole network is composed of two modules. The feature embedding module is a CNN which maps each face frame into a feature representation. The neural aggregation module is composed of two content based attention blocks which is driven by a memory storing all the features extracted from the face video through the feature embedding module. The output of the first attention block adapts the second, whose output is adopted as the aggregated representation of the video faces. Due to the attention mechanism, this representation is invariant to the order of the face frames. The experiments show that the proposed NAN consistently outperforms hand-crafted aggregations such as average pooling, and achieves state-of-the-art accuracy on three video face recognition datasets: the YouTube Face, IJB-A and Celebrity-1000 datasets.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1SX15Wb
via IFTTT

Mapping Temporal Variables into the NeuCube for Improved Pattern Recognition, Predictive Modelling and Understanding of Stream Data. (arXiv:1603.05594v1 [cs.NE])

This paper proposes a new method for an optimized mapping of temporal variables, describing a temporal stream data, into the recently proposed NeuCube spiking neural network architecture. This optimized mapping extends the use of the NeuCube, which was initially designed for spatiotemporal brain data, to work on arbitrary stream data and to achieve a better accuracy of temporal pattern recognition, a better and earlier event prediction and a better understanding of complex temporal stream data through visualization of the NeuCube connectivity. The effect of the new mapping is demonstrated on three bench mark problems. The first one is early prediction of patient sleep stage event from temporal physiological data. The second one is pattern recognition of dynamic temporal patterns of traffic in the Bay Area of California and the last one is the Challenge 2012 contest data set. In all cases the use of the proposed mapping leads to an improved accuracy of pattern recognition and event prediction and a better understanding of the data when compared to traditional machine learning techniques or spiking neural network reservoirs with arbitrary mapping of the variables.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Mqpw7G
via IFTTT

Mapping Temporal Variables into the NeuCube for Improved Pattern Recognition, Predictive Modelling and Understanding of Stream Data. (arXiv:1603.05594v1 [cs.NE])

This paper proposes a new method for an optimized mapping of temporal variables, describing a temporal stream data, into the recently proposed NeuCube spiking neural network architecture. This optimized mapping extends the use of the NeuCube, which was initially designed for spatiotemporal brain data, to work on arbitrary stream data and to achieve a better accuracy of temporal pattern recognition, a better and earlier event prediction and a better understanding of complex temporal stream data through visualization of the NeuCube connectivity. The effect of the new mapping is demonstrated on three bench mark problems. The first one is early prediction of patient sleep stage event from temporal physiological data. The second one is pattern recognition of dynamic temporal patterns of traffic in the Bay Area of California and the last one is the Challenge 2012 contest data set. In all cases the use of the proposed mapping leads to an improved accuracy of pattern recognition and event prediction and a better understanding of the data when compared to traditional machine learning techniques or spiking neural network reservoirs with arbitrary mapping of the variables.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Mqpw7G
via IFTTT

PERCH: Perception via Search for Multi-Object Recognition and Localization. (arXiv:1510.05613v2 [cs.CV] UPDATED)

In many robotic domains such as flexible automated manufacturing or personal assistance, a fundamental perception task is that of identifying and localizing objects whose 3D models are known. Canonical approaches to this problem include discriminative methods that find correspondences between feature descriptors computed over the model and observed data. While these methods have been employed successfully, they can be unreliable when the feature descriptors fail to capture variations in observed data; a classic cause being occlusion. As a step towards deliberative reasoning, we present PERCH: PErception via SeaRCH, an algorithm that seeks to find the best explanation of the observed sensor data by hypothesizing possible scenes in a generative fashion. Our contributions are: i) formulating the multi-object recognition and localization task as an optimization problem over the space of hypothesized scenes, ii) exploiting structure in the optimization to cast it as a combinatorial search problem on what we call the Monotone Scene Generation Tree, and iii) leveraging parallelization and recent advances in multi-heuristic search in making combinatorial search tractable. We prove that our system can guaranteedly produce the best explanation of the scene under the chosen cost function, and validate our claims on real world RGB-D test data. Our experimental results show that we can identify and localize objects under heavy occlusion--cases where state-of-the-art methods struggle.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1klm4nn
via IFTTT

Detecting events and key actors in multi-person videos. (arXiv:1511.02917v2 [cs.CV] UPDATED)

Multi-person event recognition is a challenging task, often with many people active in the scene but only a small subset contributing to an actual event. In this paper, we propose a model which learns to detect events in such videos while automatically "attending" to the people responsible for the event. Our model does not use explicit annotations regarding who or where those people are during training and testing. In particular, we track people in videos and use a recurrent neural network (RNN) to represent the track features. We learn time-varying attention weights to combine these features at each time-instant. The attended features are then processed using another RNN for event detection/classification. Since most video datasets with multiple people are restricted to a small number of videos, we also collected a new basketball dataset comprising 257 basketball games with 14K event annotations corresponding to 11 event classes. Our model outperforms state-of-the-art methods for both event classification and detection on this new dataset. Additionally, we show that the attention mechanism is able to consistently localize the relevant players.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1M58JJ4
via IFTTT

Semantic Folding Theory And its Application in Semantic Fingerprinting. (arXiv:1511.08855v2 [cs.AI] UPDATED)

Human language is recognized as a very complex domain since decades. No computer system has been able to reach human levels of performance so far. The only known computational system capable of proper language processing is the human brain. While we gather more and more data about the brain, its fundamental computational processes still remain obscure. The lack of a sound computational brain theory also prevents the fundamental understanding of Natural Language Processing. As always when science lacks a theoretical foundation, statistical modeling is applied to accommodate as many sampled real-world data as possible. An unsolved fundamental issue is the actual representation of language (data) within the brain, denoted as the Representational Problem. Starting with Jeff Hawkins' Hierarchical Temporal Memory (HTM) theory, a consistent computational theory of the human cortex, we have developed a corresponding theory of language data representation: The Semantic Folding Theory. The process of encoding words, by using a topographic semantic space as distributional reference frame into a sparse binary representational vector is called Semantic Folding and is the central topic of this document. Semantic Folding describes a method of converting language from its symbolic representation (text) into an explicit, semantically grounded representation that can be generically processed by Hawkins' HTM networks. As it turned out, this change in representation, by itself, can solve many complex NLP problems by applying Boolean operators and a generic similarity function like the Euclidian Distance. Many practical problems of statistical NLP systems, like the high cost of computation, the fundamental incongruity of precision and recall , the complex tuning procedures etc., can be elegantly overcome by applying Semantic Folding.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1l3NI94
via IFTTT

Anonymous says it just released some of Trump's very personal info

Days after Anonymous declared what it called “total war” on the Republican front-runner, a new video supposedly from the group surfaced.

from Google Alert - anonymous http://ift.tt/1nSBOiB
via IFTTT

Suppressing the Unusual: towards Robust CNNs using Symmetric Activation Functions. (arXiv:1603.05145v1 [cs.CV])

Many deep Convolutional Neural Networks (CNN) make incorrect predictions on adversarial samples obtained by imperceptible perturbations of clean samples. We hypothesize that this is caused by a failure to suppress unusual signals within network layers. As remedy we propose the use of Symmetric Activation Functions (SAF) in non-linear signal transducer units. These units suppress signals of exceptional magnitude. We prove that SAF networks can perform classification tasks to arbitrary precision in a simplified situation. In practice, rather than use SAFs alone, we add them into CNNs to improve their robustness. The modified CNNs can be easily trained using popular strategies with the moderate training load. Our experiments on MNIST and CIFAR-10 show that the modified CNNs perform similarly to plain ones on clean samples, and are remarkably more robust against adversarial and nonsense samples.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1QYREUQ
via IFTTT

I have a new follower on Twitter


PiX
Camille @Homadeus co-founder (http://t.co/x3LXHW5r2P) Security Architect at @SII_Ouest https://t.co/NF9ymWmmjs #IoT #InfoSec #LulzSec #Rants and #Stuff
Rennes, France
http://t.co/x3LXHW5r2P
Following: 720 - Followers: 8407

March 17, 2016 at 04:14PM via Twitter http://twitter.com/pix

Re: [FD] [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

[FD] New Security Tool: Enteletaor - Broker & MQ Injection tool

  Dear colleagues, Please, allow us to introduce Enteletaor -> http://ift.tt/1X3S4t6 Enteletaor is a Message Queue & Broker Injection tool that implements attacks to: Redis, RabbitMQ and ZeroMQ. Some of the actions you can do: - Listing remote tasks. - Read remote task content. - Disconnect remote clients from Redis server (even the admin) - Inject tasks into remote processes. - Make a scan to discover open brokers. Currently supported brokers are: - RabbitMQ (or AMQP compatible). - ZeroMQ. - Redis. See documentation for more information: http://ift.tt/1nRJnWU Please, feel free to start using it and we would be thankful for any type of feedback. Best regards, 

Source: Gmail -> IFTTT-> Blogger

[FD] WordPress Bulletproof Security Plugin Multiple Cross Site Scripting Vulnerabilities

[FD] Defense in depth -- the Microsoft way (part 39): vulnerabilities, please meet the bar for security servicing

[FD] BigTree 4.2.8: Object Injection & Improper Filename Sanitation

Security Advisory - Curesec Research Team 1. Introduction Affected Product: BigTree 4.2.8 Fixed in: BigTree 4.2.9 Fixed Version Link: http://ift.tt/1TS1NTB Vendor Website: http://ift.tt/1LKDH7U Vulnerability Type: Object Injection & Improper Filename Sanitation Remote Exploitable: Yes Reported to vendor: 01/29/2016 Disclosed to public: 03/15/2016 Release mode: Coordinated Release CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview BigTree CMS is a CMS written in PHP. In version 4.2.8, it is vulnerable to object injection. The impact of this vulnerability is currently small - privileged users can update settings they are not allowed to update - but may be more extensive depending on installed plugins. In addition to the object injection, BigTree also has a function called cleanFile which is supposed to prevent directory traversal, but which can be bypassed. The function is not currently used by BigTree itself, but may be used by plugins. 3. Object Injection Description CVSS: Low 3.5 AV:N/AC:M/Au:S/C:N/I:P/A:N BigTree passes unvalidated user input to unserialize, leading to PHP object injection. The vulnerability is in the backend, so a user account with the role developer or admin is required. A successful exploitation may for example lead to an admin editing settings they are not authorized to edit. In BigTree, the admin role is less privileged than the developer role. For example, an admin can only edit a subset of the settings. The impact of the vulnerability is currently small, as BigTree does not implement __wakeup in any classes, none of the classes implement the iterator interface, and __destruct is only implemented in a limited number of classes, and only one of the cases seems relevant to security: The destructor of the BigTreeCMSBase class updates all settings, without again validating if the user is allowed to update the setting and without re-validating the value of a setting. This may for example lead to persistent XSS - the admin does not have the right to post scripts, as this would weaken the distinction between admins and developers - by changing the colophon setting. An admin has the right to edit this setting, but the input is HTML encoded before putting it in the database. By bypassing this encoding, a malicious admin can inject scripts. It should be noted that custom modules may contain classes that lead to a bigger security impact of this vulnerability. Proof of Concept The attack can be achieved in a browser by visiting the following URL and clicking on save: http://localhost/BigTree-CMS/site/index.php/admin/trees/edit/2/?view_data= [INJECTED OBJECT] A payload to update the setting "bigtree-internal-security-policy" may for example be: a:2:{s:7:"bigtree";O:14:"BigTreeCMSBase":2:{s:16:"AutoSaveSettings";a:1: {s:32:"bigtree-internal-security-policy";a:1:{s:3:"foo";s:3:"bar";}} s:15:"ModuleClassList";a:2:{s:9:"DemoTrees";s:5:"trees";s:10:"DemoQuotes"; s:6:"quotes";}}s:4:"view";s:6:"foobar";} The actual request is a POST request to /BigTree-CMS/site/http://ift.tt/1TRz7w6 /edit/process/, where the _bigtree_return_view_data field contains the base64 encoded payload. Code /process.php $return_view_data = unserialize(base64_decode($_POST["_bigtree_return_view_data"])); if (!$bigtree["form"]["return_view"] || $bigtree["form"]["return_view"] == $return_view_data["view"]) { $redirect_append = array(); unset($return_view_data["view"]); // We don't need the view passed back. foreach ($return_view_data as $key => $val) { $redirect_append[] = "$key=".urlencode($val); } $redirect_append = "?".implode("&",$redirect_append); } /cms.php function __destruct() { foreach ($this->AutoSaveSettings as $id => $obj) { if (is_object($obj)) { BigTreeAdmin::updateSettingValue($id,get_object_vars($obj)); } else { BigTreeAdmin::updateSettingValue($id,$obj); } } } 4. Improper Filename Sanitation Description The function cleanFile is supposed to prevent directory traversal, but currently it does not fulfill its task, as an attacker can easily bypass the filter via ....//. The function is currently not used for any sensitive tasks, but it may be used by extensions or in the future. Code /* Function: cleanFile Makes sure that a file path doesn't contain abusive characters (i.e. ../) Parameters: file - A file name Returns: Cleaned up string. */ static function cleanFile($file) { return str_replace("../","",$file); } 5. Solution To mitigate this issue please upgrade at least to version 4.2.9: http://ift.tt/1TS1NTB Please note that a newer version might already be available. 6. Report Timeline 01/29/2016 Informed Vendor about Issue 02/02/2016 Vendor sends fixes for verification 02/10/2016 Verified Fixes 02/12/2016 Vendor releases Fixes 03/15/2016 Disclosed to public Blog Reference: http://ift.tt/1S6FB6T

Source: Gmail -> IFTTT-> Blogger

[FD] PivotX 2.3.11: Code Execution

Security Advisory - Curesec Research Team 1. Introduction Affected Product: PivotX 2.3.11 Fixed in: not fixed Fixed Version Link: n/a Vendor Website: http://pivotx.net/ Vulnerability Type: Code Execution Remote Exploitable: Yes Reported to vendor: 01/20/2016 Disclosed to public: 03/15/2016 Release mode: Full Disclosure CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview PivotX is a CMS for blogging written in PHP. In version 2.3.11, it is vulnerable to code execution by authenticated users because it does not check the extension of files when renaming them. 3. Details Description CVSS: High 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C The file upload functionality checks file extensions when uploading files to prevent the uploading of malicious files such as PHP files. However, the rename function does not check the extension of the new filename, leading to code execution. An account in the advanced users, admins, or superadmins role is required to upload files. Proof of Concept 1. Upload an image file containing PHP code with a valid extension such as png 2. rename it so it has a PHP extension: http://localhost/pivotx_latest/pivotx/ index.php?page=media&file=imageshell.png&pivotxsession=ovyyn4ob2jc5ym92&answer= shell.php 4. Solution This issue was not fixed by the vendor. 5. Report Timeline 01/20/2016 Informed Vendor about Issue 01/29/2016 Vendor replies, PivotX is not maintained anymore 03/15/2016 Disclosed to public Blog Reference: http://ift.tt/1SWggie

Source: Gmail -> IFTTT-> Blogger

[FD] PivotX 2.3.11: Directory Traversal

Security Advisory - Curesec Research Team 1. Introduction Affected Product: PivotX 2.3.11 Fixed in: not fixed Fixed Version Link: n/a Vendor Website: http://pivotx.net/ Vulnerability Type: Directory Traversal Remote Exploitable: Yes Reported to vendor: 01/20/2016 Disclosed to public: 03/15/2016 Release mode: Full Disclosure CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview PivotX is a CMS for blogging written in PHP. In version 2.3.11, it is vulnerable to Directory Traversal, allowing authenticated users to read and delete files outside of the PivotX directory. 3. Details Description CVSS: Medium 4.0 AV:N/AC:L/Au:S/C:P/I:N/A:N The function cleanPath which is responsible for sanitizing path names can be bypassed by an attacker, leading to directory traversal in multiple places. Proof of Concept Admins and Superadmins can read any file: http://localhost/pivotx_latest/pivotx/ajaxhelper.php?function=view&basedir= L3Zhci93d3cvcGl2b3R4X2xhdGVzdC9CYXNlZGlyLwo=&file=../.....//...//.....//.../ /.....//...//.....//...//.....//...//.....//...//etc/passwd Advanced users, Admins and Superadmins can delete any file, possibly leading to DOS: http://localhost/pivotx_latest/pivotx/index.php?page=media&del=.....//.../ /.....//...//.....//...//.....//...//.....//...//.....//...//important/ important.file&pivotxsession=ovyyn4ob2jc5ym92 Code lib.php function cleanPath($path) { $path = str_replace('../', '', $path); $path = str_replace('..\\', '', $path); $path = str_replace('..'.DIRECTORY_SEPARATOR, '', $path); return $path; } 4. Solution This issue was not fixed by the vendor. 5. Report Timeline 01/20/2016 Informed Vendor about Issue 01/29/2016 Vendor replies, PivotX is not maintained anymore 03/15/2016 Disclosed to public Blog Reference: http://ift.tt/1S6F0SA

Source: Gmail -> IFTTT-> Blogger

[FD] PivotX 2.3.11: Reflected XSS

Security Advisory - Curesec Research Team 1. Introduction Affected Product: PivotX 2.3.11 Fixed in: not fixed Fixed Version Link: n/a Vendor Website: http://pivotx.net/ Vulnerability Type: Reflected XSS Remote Exploitable: Yes Reported to vendor: 01/20/2016 Disclosed to public: 03/15/2016 Release mode: Full Disclosure CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview PivotX is a CMS for blogging written in PHP. In version 2.3.11, it is vulnerable to reflected XSS, allowing for the injection of JavaScript keyloggers or the bypassing of CSRF protection. In the case of PivotX, this may lead to code execution via other vulnerabilities in the same version in the admin area. 3. Details Description CVSS: Medium 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N The additionalpath parameter of the file explorer is vulnerable to reflected XSS. Proof of Concept http://localhost/pivotx_latest/pivotx/index.php?page=homeexplore&additionalpath =pivot4. Solution This issue was not fixed by the vendor. 5. Report Timeline 01/20/2016 Informed Vendor about Issue 01/29/2016 Vendor replies, PivotX is not maintained anymore 03/15/2016 Disclosed to public Blog Reference: http://ift.tt/1Ujtjvf

Source: Gmail -> IFTTT-> Blogger

[FD] Zenphoto 1.4.11: RFI

Security Advisory - Curesec Research Team 1. Introduction Affected Product: Zenphoto 1.4.11 Fixed in: 1.4.12 Fixed Version Link: http://ift.tt/1RRegTp zenphoto-1.4.12.zip Vendor Website: http://ift.tt/qi8mjr Vulnerability Type: RFI Remote Exploitable: Yes Reported to vendor: 01/29/2016 Disclosed to 03/15/2016 public: Release mode: Coordinated Release CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview Zenphoto is a CMS for hosting images, written in PHP. In version 1.4.11, it is vulnerable to remote file inclusion. An admin account is required. 3. Details Description CVSS: High 8.5 AV:N/AC:M/Au:S/C:C/I:C/A:C When downloading a log file, the input is not properly sanitized, leading to RFI. An admin account is required, and allow_url_fopen must be set to true - which is the default setting. In old versions of PHP, this would additionally lead to LFI via null byte poisoning or path expansion, regardless of allow_url_fopen settings. Proof of Concept GET /zenphoto-zenphoto-1.4.11/zp-core/admin-logs.php?action=download_log&page= logs&tab=http://localhost/shell.php%3f%78%3d%69%64%26%66%6f%6f%3d&filename= security&XSRFToken=afd5bafed21279d837486fd2beea81f87bc29dea HTTP/1.1 Code // admin-logs.php (sanitize(x, 3) only strips out tags) case 'download_log': $zipname = sanitize($_GET['tab'], 3) . '.zip'; if (class_exists('ZipArchive')) { $zip = new ZipArchive; $zip->open($zipname, ZipArchive::CREATE); $zip->addFile($file, basename($file)); $zip->close(); ob_get_clean(); header("Pragma: public"); header("Expires: 0"); header("Cache-Control: must-revalidate, post-check=0, pre-check=0"); header("Cache-Control: private", false); header("Content-Type: application/zip"); header("Content-Disposition: attachment; filename=" . basename($zipname) . ";" ); header("Content-Transfer-Encoding: binary"); header("Content-Length: " . filesize($zipname)); readfile($zipname); // remove zip file from temp path unlink($zipname); exit; } else { include_once(SERVERPATH . '/' . ZENFOLDER . '/lib-zipStream.php'); $zip = new ZipStream($zipname); $zip->add_file_from_path(internalToFilesystem(basename($file)),internalToFilesystem($file)); $zip->finish(); } break; 4. Solution To mitigate this issue please upgrade at least to version 1.4.12: http://ift.tt/1Mbtara Please note that a newer version might already be available. 5. Report Timeline 01/29/2016 Informed Vendor about Issue 01/29/2016 Vendor replies 02/23/2016 Vendor sends fix for verification 02/23/2016 Suggested improvements for attempted fix 02/29/2016 Delayed Disclosure 03/14/2016 Vendor releases fix 03/15/2016 Disclosed to public Blog Reference: http://ift.tt/1RRef1Y

Source: Gmail -> IFTTT-> Blogger

[FD] OWASP AppSec USA 2016 Call for Papers Released

DARPA Invites Geeks to Convert Everyday Objects into Deadly Weapons

Do you know that your daily household items can be turned into deadly weapons? Yes, it's possible to convert some of your everyday household appliances into explosives, weapons or surveillance devices. DARPA – the agency which does research in various fields for improving the US Military and US Department of Defense capabilities – had announced a new project dubbed "Improv" to transform


from The Hacker News http://ift.tt/1UCYWia
via IFTTT

Ravens: After shedding \"gnarly\" 3-year-old beard, Eric Weddle \"regretting it by the second that I shaved it\" - Hensley (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

ISS Daily Summary Report – 03/16/16

Ocular Health (OH), Fundoscope: Kopra and Peake continued with OH and Fundoscope operations which are ongoing this week.   Dose Tracker:  Kopra and Peake completed entries for medication tracking early this morning.  This investigation documents the medication usage of crew members before and during their missions by capturing data regarding medication use during spaceflight, including side effect qualities, frequencies and severities. The data is expected to either support or counter anecdotal evidence of medication ineffectiveness during flight and unusual side effects experienced during flight. It is also expected that specific, near-real-time questioning about symptom relief and side effects will provide the data required to establish whether spaceflight-associated alterations in pharmacokinetics (PK) or pharmacodynamics (PD) is occurring during missions.   OA-6 Preparations: Kopra and Peake completed another session of Robotics On-Board Trainer (RoBOT) On-Board Training (OBT) in preparation for OA-6 arrival. The procedure included a 30 meter approach, two Capture Point hold runs and 2 meter runs. Following RoBOT training Peake utilized the Auto Run Tool to continue practicing 2 meter and 30 meter approach runs. Also in preparation for OA-6, the crew unlatched the Node 1 Nadir hatch.   Air Quality Monitor (AQM) Sieve Cartridge Troubleshooting: On February 3, during activation and checkout of AQM #1005 the crew received a “Not Ready” status. It was suspected that the issue is with a sieve cartridge. Kopra removed the old cartridges from AQM #1005 and replaced it with new ones to confirm whether the issue was due to a bad cartridge or the unit itself.  Initial results of ground commanding indicate that the cause was a bad cartridge and is now resolved.   Mobile Servicing System (MSS) Operations: On October 8, 2015, during Robotics Refueling Mission (RRM) operations, invalid joint position and Resolver-to-Digital (RDC) Built-In-Test (BIT) errors were seen. Last evening, Robotics Ground Controllers performed Special Purpose Dexterous Manipulator (SPDM) Arm2 Shoulder Yaw (SY) joint characterization.  The characterization was completed with no test failures and no recurrence of the anomaly.  Data collected will be analyzed to help characterize the original anomaly.   Today’s Planned Activities All activities were completed unless otherwise noted. OCT Hardware Setup SEISMOPROGNOZ. Data export from БСПН Payload Server to RSS1 (start)  r/g 1677 DOSETRK – Questionnaire Completion RS1 Laptop Displays Update Check r/g 1671 WRS Water Sample Analysis DOSETRK – Questionnaire Completion Health Management System (HMS) – OCT – Subject PAO hardware setup Health Management System (HMS) – OCT – Operator Voice check in S/G1 from Baikonur Crew Prep for PAO / r/g 1676 TV PAO with the Participants of Pan-Russian Schoolchildren Conference  “Step into the Future, Cosmonautics” r/g 1676 Health Management System (HMS) – OCT – Operator Health Management System (HMS) – OCT – Subject Water Transfer to EDV from Progress 431 (DC1) H2O Tank 2 using compressor and H2O Tank Bladder Compression / r/g 1675 OCT Hardware Stowage OTKLIK. Hardware Monitoring / r/g 1588 TOCA Data Recording Unlatching N1 Nadir Hatch Hardstops On MCC Go Filling up Progress 429 (Aft) СрПК Section 2 with N2 IMS Tagup (S-band) Onboard Training (OBT) – Dragon Rendezvous and Berthing Procedures Review СОЖ Maintenance SEISMOPROGNOZ. Data export from БСПН Payload Server to RSS1 (end) r/g 1677 Environmental Health System (EHS) – AQM Checkout Onboard Training (OBT) – Dragon Rendezvous and Berthing Procedures Review Health Maintenance System (HMS) – Fundoscope Setup Health Maintenance System (HMS) – Fundoscope Prep On MCC GO Closeout Ops after H2O Tank 2 Bladder Compression in Progress 431 (DC1) Rodnik system IDENTIFICATION. Copy ИМУ-Ц micro-accelerometer data to laptop / r/g 1589 Fundoscope – Eye Exam Fundoscope – Eye Exam CMO Health Maintenance System (HMS) – Fundoscope Prep INTERACTION-2. Experiment Ops / r/g 1663 Fundoscope – Eye Exam CMO Fundoscope – Eye Exam URISYS Hardware Setup r/g 1673 Health Maintenance System (HMS) – Fundoscope Teardown and Stowage   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. OH support Cygnus RoBOT OBT support Nominal ground commanding   Three-Day Look Ahead: Thursday, 03/17: Ocular Health, METERON, Cygnus RoBOT OBT Friday, 03/18: 46S launch/dock (crew sleep shift), docking prep/arrival tasks Saturday, 03/19: Crew sleep day following 46S docking   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) On Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up  

from ISS On-Orbit Status Report http://ift.tt/1pNvlHj
via IFTTT

Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices

Hard time for mobile phone users! Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted on the Android platform, affecting more than a Billion and Millions of devices respectively. And now: Hackers have discovered a new way to install malicious apps onto your iPhone without your interaction. Researchers at Palo Alto Networks have uncovered a


from The Hacker News http://ift.tt/1pNmdT3
via IFTTT

New Exploit to 'Hack Android Phones Remotely' threatens Millions of Devices

Attention Android users! Millions of Android devices are vulnerable to hackers and intelligence agencies once again – Thanks to a newly disclosed Android Stagefright Exploit. Yes, Android Stagefright vulnerability is Back… …and this time, the Stagefright exploit allows an attacker to hack Android smartphones in 10 seconds just by tricking users into visiting a hacker's web page


from The Hacker News http://ift.tt/1RQdEO4
via IFTTT

A Phoenix Aurora over Iceland


All of the other aurora watchers had gone home. By 3:30 am in Iceland, on a quiet night last September, much of that night's auroras had died down. Suddenly though, a new burst of particles streamed down from space, lighting up the Earth's atmosphere once again. This time, unexpectedly, pareidoliacally, they created an amazing shape reminiscent of a giant phoenix. With camera equipment at the ready, two quick sky images were taken, followed immediately by a third of the land. The mountain in the background is Helgafell, while the small foreground river is called Kaldá, both located about 30 kilometers north of Iceland's capital Reykjavik. Seasoned skywatchers will note that just above the mountain, toward the left, is the constellation of Orion, while the Pleiades star cluster is also visible just above the frame center. The new aurora lasted only a minute and would be gone forever -- possibly dismissed as an embellished aberration -- were it not captured in the featured, digitally-composed, image mosaic. via NASA http://ift.tt/254533W

Wednesday, March 16, 2016

One-Shot Generalization in Deep Generative Models. (arXiv:1603.05106v1 [stat.ML])

Humans have an impressive ability to reason about new concepts and experiences from just a single example. In particular, humans have an ability for one-shot generalization: an ability to encounter a new concept, understand its structure, and then be able to generate compelling alternative variations of the concept. We develop machine learning systems with this important capacity by developing new deep generative models, models that combine the representational power of deep learning with the inferential power of Bayesian reasoning. We develop a class of sequential generative models that are built on the principles of feedback and attention. These two characteristics lead to generative models that are among the state-of-the art in density estimation and image generation. We demonstrate the one-shot generalization ability of our models using three tasks: unconditional sampling, generating new exemplars of a given concept, and generating new exemplars of a family of concepts. In all cases our models are able to generate compelling and diverse samples---having seen new examples just once---providing an important class of general-purpose models for one-shot machine learning.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1nPBWiT
via IFTTT

Human Gender Classification: A Review. (arXiv:1507.05122v2 [cs.AI] UPDATED)

Gender contains a wide range of information regarding to the characteristics difference between male and female. Successful gender recognition is essential and critical for many applications in the commercial domains such as applications of human-computer interaction and computer-aided physiological or psychological analysis. Some have proposed various approaches for automatic gender classification using the features derived from human bodies and/or behaviors. First, this paper introduces the challenge and application for gender classification research. Then, the development and framework of gender classification are described. Besides, we compare these state-of-the-art approaches, including vision-based methods, biological information-based method, and social network information-based method, to provide a comprehensive review in the area of gender classification. In mean time, we highlight the strength and discuss the limitation of each method. Finally, this review also discusses several promising applications for the future work.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1gKUM80
via IFTTT

Spatial Concept Acquisition for a Mobile Robot that Integrates Self-Localization and Unsupervised Word Discovery from Spoken Sentences. (arXiv:1602.01208v2 [cs.AI] UPDATED)

In this paper, we propose a novel unsupervised learning method for the lexical acquisition of words related to places visited by robots, from human continuous speech signals. We address the problem of learning novel words by a robot that has no prior knowledge of these words except for a primitive acoustic model. Further, we propose a method that allows a robot to effectively use the learned words and their meanings for self-localization tasks. The proposed method is nonparametric Bayesian spatial concept acquisition method (SpCoA) that integrates the generative model for self-localization and the unsupervised word segmentation in uttered sentences via latent variables related to the spatial concept. We implemented the proposed method SpCoA on SIGVerse, which is a simulation environment, and TurtleBot2, which is a mobile robot in a real environment. Further, we conducted experiments for evaluating the performance of SpCoA. The experimental results showed that SpCoA enabled the robot to acquire the names of places from speech sentences. They also revealed that the robot could effectively utilize the acquired spatial concepts and reduce the uncertainty in self-localization.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1NR5z9c
via IFTTT

Domain Adaptation via Maximum Independence of Domain Features. (arXiv:1603.04535v1 [cs.CV])

When the distributions of the source and the target domains are different, domain adaptation techniques are needed. For example, in the field of sensors and measurement, discrete and continuous distributional change often exist in data because of instrumental variation and time-varying sensor drift. In this paper, we propose maximum independence domain adaptation (MIDA) to address this problem. Domain features are first defined to describe the background information of a sample, such as the device label and acquisition time. Then, MIDA learns features which have maximal independence with the domain features, so as to reduce the inter-domain discrepancy in distributions. A feature augmentation strategy is designed so that the learned projection is background-specific. Semi-supervised MIDA (SMIDA) extends MIDA by exploiting the label information. The proposed methods can handle not only discrete domains in traditional domain adaptation problems but also continuous distributional change such as the time-varying drift. In addition, they are naturally applicable in supervised/semi-supervised/unsupervised classification or regression problems with multiple domains. This flexibility brings potential for a wide range of applications. The effectiveness of our approaches is verified by experiments on synthetic datasets and four real-world ones on sensors, measurement, and computer vision.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VaLUZH
via IFTTT

An Anonymous Donor in Dubai Sent England an Emergency Biscuit Shipment

The U.K. faced a shortage of the teatime treats after flooding closed down one of the nation's largest biscuit factories.

from Google Alert - anonymous http://ift.tt/1pMvkU9
via IFTTT

Anonymous

Update on Anonymous. The young man whose face is pixelated is 25 years old and lives in a high-risk zone. Since he was 16, he has worked in ...

from Google Alert - anonymous http://ift.tt/1nPiino
via IFTTT

Ubercart anonymous checkout not working

Yesterday I applied the update version 7.x-1.22 on a webshop with ubercart. Since then, the anonymous webshop wasn't working anymore (it gave an ...

from Google Alert - anonymous http://ift.tt/1Vdzoc2
via IFTTT

NFL: Ex-Ravens S Will Hill suspended 10 games for violating league's substance abuse policy - Adam Schefter, Adam Caplan (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

New Policy Re Anonymous Sources Can Help Spur Less Biased Media Coverage

New Policy Re Anonymous Sources Can Help Spur Less Biased Media Coverage. A few months ago James Vega posted a strategy memo at TDS ...

from Google Alert - anonymous http://ift.tt/1Xvylmt
via IFTTT

'The Fappening' Hacker Reveals How He Stole Nude Pics of Over 100 Celebrities

Almost one and a half years ago after the massive leakage of celebrities' nude photographs — famous as "The Fappening" or "Celebgate" scandal — a man had been charged with the Computer Fraud and Abuse Act, facing up to 5 years in prison as a result. The US Department of Justice (DOJ) announced on Tuesday that it charged Ryan Collins, 36, of Pennsylvania for illegally accessing the Gmail


from The Hacker News http://ift.tt/1S4uAD3
via IFTTT

Question about anonymous posting

I have bought the CM answers anonymous bundle. I have some specific questions about the login procedure. 1) Can users post anonymously without ...

from Google Alert - anonymous http://ift.tt/254AlYr
via IFTTT

[FD] [CORE-2016-0005] - FreeBSD Kernel amd64_set_ldt Heap Overflow

More than a Billion Snapdragon-based Android Phones Vulnerable to Hacking

More than a Billion of Android devices are at risk of a severe vulnerability in Qualcomm Snapdragon chip that could be exploited by any malicious application to gain root access on the device. Security experts at Trend Micro are warning Android users of some severe programming blunders in Qualcomm's kernel-level Snapdragon code that if exploited, can be used by attackers for gaining root


from The Hacker News http://ift.tt/1Xv2YZc
via IFTTT

Russia Rejects Google's Appeal and Orders to Stop Pre-Installing its own Android Apps

The Giant search engine Google has lost an anti-monopoly appeal in Russia against ruling related to its Android mobile OS The Moscow Arbitration Court on Monday ruled that Google had violated its dominant position with the help of its free open source mobile platform "Android" by forcing its own apps and services like Youtube, Google Map, and others, on users — reducing competition. The


from The Hacker News http://ift.tt/1QXLdA6
via IFTTT

dlr-format not parsed



Source: Gmail -> IFTTT-> Blogger

ISS Daily Summary Report – 03/15/16

Observation and Analysis of Smectic Islands in Space (OASIS) Gylcerol/Water Fill: Kopra completed a science run of the OASIS Gylcerol/Water Fill activity by filling the Inkjet droplet device with glycerol/water for the final experiment protocol on each sample container and will exchange the hard drive for continued operations. OASIS studies the unique behavior of liquid crystals in microgravity, including their overall motion and the merging of crystal layers known as smectic islands. Liquid crystals are used for display screens in televisions and clocks, and they also occur in soaps and in cell membranes. The experiment allows detailed studies of the behavior of these structures, and how microgravity affects their unique ability to act like both a liquid and a solid crystal. Ocular Health:  Kopra and Peake installed batteries in the Cardiolab (CDL) Holter Arterial BP Unit, powered on the unit, cleared the memory, donned the BP Cuff, and each performed a BP measurement prior to stowing the hardware. The results are recorded in the Vital Signs Data Collection Tool form. With observation from the ground support personnel, Kopra and Peake will practice using the Tonometer on an eye simulator and then conduct a Tonometry Exam with the Medical Ground Support team.   Microbiome:  Kopra completed a questionnaire, set up body sampling collection equipment and performed body sample collections. He then placed the samples in cold stowage.  Microbiome investigates the impact of space travel on both the human immune system and an individual’s Microbiome (the collection of microbes that live in and on the human body at any given time). Hatch Seal Inspection: Kopra completed the first of two sessions of this scheduled maintenance to clean the USOS hatch seals in Node 2, Node 3, PMM, COL and JEM. He also inspected the sealing surface and hatch handle mechanism for Foreign Object Debris (FOD) or damage. The second hatch seal inspection session is planned for Thursday.   Treadmill 2 (T2) 6-Month Maintenance: Peake partially completed this 6-month inspection of T2. He inspected tread belt slats, cleaned closeout panels, lateral belt and drive shaft teeth and vacuumed inside T2 rack space and filter screen. He also replaced the eye bolts that attach bungees to the rack. Peake was scheduled to complete axle greasing, however, he was unable to locate sufficient grease so the task will be scheduled for a later date.   Cygnus Cargo Operations: Peake relocated cargo from the Japanese Experiment Logistics Module-Pressurized Section (JLP) Bay 2 to the Japanese Experiment Module (JEM) Pressurized Module (JEM) and Columbus (COL) in preparation for OA-6 arrival scheduled for March 26.   Robotics Operations: Robotics ground controllers maneuvered the Space Station Remote Manipulator System (SSRMS) to the Offset Grapple start position in preparation for tomorrow’s planned OA-6 Robotics Onboard Trainer (RoBOT) training session. They are currently performing checkout maneuvers of the Special Purpose Dexterous Manipulator (SPDM) Shoulder Yaw Joint. This troubleshooting is intended to further isolate the cause of an anomaly that prevented the shoulder yaw joint from starting up during RRM operations in October 2015.  SPDM Arm 2 is functional with some constraints.   Today’s Planned Activities All activities were completed unless otherwise noted. Hematocrit Test / МО Book 2 r/g 1647 HRF – Sample Insertion into MELFI BIOME – Sample Collection Hematocrit Test  r/g 1647 Hematocrit Hardware Stowage HRF – Sample Insertion into MELFI ВКС Laptops Antivirus Scan Check and Status Report / r/g 8247 On MCC Go Regeneration of БМП Ф2 Micropurification Cartridge (start) Health Maintenance System (HMS) – Eye Examination Health Maintenance System (HMS) – Vision Questionnaire JEM – Relocating Cargo in Preparation for Cygnus arrival MATRYOSHKA-R. BUBBLE-dosimeter gathering and measurements.r/g 1662 Ocular Health (OH) – Blood Pressure Operations Health Maintenance System (HMS) – Tonometry Test Setup Health Maintenance System (HMS) – Eye Examination Ocular Health (OH) Blood Pressure Operations Health Maintenance System (HMS) – Vision Questionnaire Health Maintenance System (HMS): Tonometry Test – assistance Health Maintenance System (HMS): Tonometry Test – Subject Ocular Health Experiment – Tonometry Test – Crew Medical Officer (CMO) Ocular Health Experiment – Tonometry Ops – Test Subject Laptop FS1 S/W Upgrade  r/g 1665 BIOME – Sample Collection Health Maintenance System (HMS) – Tonometry Hardware Stowage HRF – Sample Insertion into MELFI BIOME – Equipment Stowage Observation and Analysis of Smectic Islands in Space (OASIS) – Sample Container Exchange and Glycerol/Water Fill Crew Prep for PAO PAO Hardware Setup PAO Event T2 Semi-Annual Maintenance [Partially completed] Vacuum Cleaning of ВД1 and ВД2 air ducts in DC1 BIOME – Equipment Stowage Hatch Seal Inspection В3 Fan Screen Cleaning in DC1 / Thermal Mode Control System Cleaning ПФ1, ПФ2 dust filters and В1, B2 Fan Grilles in MRM2 On MCC Go ISS О2 Repress from Progress 429 (Aft) СрПК Section 2 (start) СОЖ Maintenance Т2 – Unmanned activities On MCC Go ISS О2 Repress from Progress 429 (Аft) СрПК Section 2 (terminate) IMS Delta File Prep   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. MSS Powerup SPDM Arm 2 shoulder yaw test [In work] MSS Powerdown Nominal ground commanding   Three-Day Look Ahead: Wednesday, 03/16: Ocular Health, Fundoscope, OBT Cygnus RoBOT #1 Thursday, 03/17: Ocular Health, Hatch seal inspection, T2 6-month maintenance Friday, 03/18: 46S launch (crew sleep shift)   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up    

from ISS On-Orbit Status Report http://ift.tt/1Rm7Zic
via IFTTT

I have a new follower on Twitter


News Curator
News Curator provides automated personalized news. Our app observes your social networks and gets smarter every time you use it. Stop searching, start reading.
Zurich, Switzerland
https://t.co/qRg8LdvmTc
Following: 4840 - Followers: 5312

March 16, 2016 at 05:51AM via Twitter http://twitter.com/newscuratorapp

Tuesday, March 15, 2016

'total war' on Trump

Anonymous has declared “total war” on GOP front runner Donald Trump, vowing to “dismantle” his campaign over his hateful language.

from Google Alert - anonymous http://ift.tt/1RjZLxj
via IFTTT

Sequential Voting Promotes Collective Discovery in Social Recommendation Systems. (arXiv:1603.04466v1 [cs.SI])

One goal of online social recommendation systems is to harness the wisdom of crowds in order to identify high quality content. Yet the sequential voting mechanisms that are commonly used by these systems are at odds with existing theoretical and empirical literature on optimal aggregation. This literature suggests that sequential voting will promote herding---the tendency for individuals to copy the decisions of others around them---and hence lead to suboptimal content recommendation. Is there a problem with our practice, or a problem with our theory? Previous attempts at answering this question have been limited by a lack of objective measurements of content quality. Quality is typically defined endogenously as the popularity of content in absence of social influence. The flaw of this metric is its presupposition that the preferences of the crowd are aligned with underlying quality. Domains in which content quality can be defined exogenously and measured objectively are thus needed in order to better assess the design choices of social recommendation systems. In this work, we look to the domain of education, where content quality can be measured via how well students are able to learn from the material presented to them. Through a behavioral experiment involving a simulated massive open online course (MOOC) run on Amazon Mechanical Turk, we show that sequential voting systems can surface better content than systems that elicit independent votes.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/22ksd3S
via IFTTT

Optimal Sensing via Multi-armed Bandit Relaxations in Mixed Observability Domains. (arXiv:1603.04586v1 [cs.AI])

Sequential decision making under uncertainty is studied in a mixed observability domain. The goal is to maximize the amount of information obtained on a partially observable stochastic process under constraints imposed by a fully observable internal state. An upper bound for the optimal value function is derived by relaxing constraints. We identify conditions under which the relaxed problem is a multi-armed bandit whose optimal policy is easily computable. The upper bound is applied to prune the search space in the original problem, and the effect on solution quality is assessed via simulation experiments. Empirical results show effective pruning of the search space in a target monitoring domain.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1VaM9UL
via IFTTT

The SP theory of intelligence: distinctive features and advantages. (arXiv:1508.04087v6 [cs.AI] UPDATED)

This paper highlights distinctive features of the "SP theory of intelligence" and its apparent advantages compared with some AI-related alternatives. Distinctive features and advantages are: simplification and integration of observations and concepts; simplification and integration of structures and processes in computing systems; the theory is itself a theory of computing; it can be the basis for new architectures for computers; information compression via the matching and unification of patterns and, more specifically, via multiple alignment, is fundamental; transparency in the representation and processing of knowledge; the discovery of 'natural' structures via information compression (DONSVIC); interpretations of mathematics; interpretations in human perception and cognition; and realisation of abstract concepts in terms of neurons and their inter-connections ("SP-neural"). These things relate to AI-related alternatives: minimum length encoding and related concepts; deep learning in neural networks; unified theories of cognition and related research; universal search; Bayesian networks and more; pattern recognition and vision; the analysis, production, and translation of natural language; Unsupervised learning of natural language; exact and inexact forms of reasoning; representation and processing of diverse forms of knowledge; IBM's Watson; software engineering; solving problems associated with big data, and in the development of intelligence in autonomous robots. In conclusion, the SP system can provide a firm foundation for the long-term development of AI, with many potential benefits and applications. It may also deliver useful results on relatively short timescales. A high-parallel, open-source version of the SP machine, derived from the SP computer model, would be a means for researchers everywhere to explore what can be done with the system, and to create new versions of it.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1IYrqMV
via IFTTT

End-to-End Attention-based Large Vocabulary Speech Recognition. (arXiv:1508.04395v2 [cs.CL] UPDATED)

Many of the current state-of-the-art Large Vocabulary Continuous Speech Recognition Systems (LVCSR) are hybrids of neural networks and Hidden Markov Models (HMMs). Most of these systems contain separate components that deal with the acoustic modelling, language modelling and sequence decoding. We investigate a more direct approach in which the HMM is replaced with a Recurrent Neural Network (RNN) that performs sequence prediction directly at the character level. Alignment between the input features and the desired character sequence is learned automatically by an attention mechanism built into the RNN. For each predicted character, the attention mechanism scans the input sequence and chooses relevant frames. We propose two methods to speed up this operation: limiting the scan to a subset of most promising frames and pooling over time the information contained in neighboring frames, thereby reducing source sequence length. Integrating an n-gram language model into the decoding process yields recognition accuracies similar to other HMM-free RNN-based approaches.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1TSgRDl
via IFTTT

Anonymous declares 'total war'

IN a move that doesn't really come as a shock to anyone, hacking collective Anonymous has declared “total war” on Donald Trump. Using its ...

from Google Alert - anonymous http://ift.tt/1TMnB4R
via IFTTT

Ravens: LB Terrell Suggs formally charged with 2 misdemeanors for one-car accident on March 5; both often lead to fines (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

Anonymous has Declared 'Total War' on Donald Trump

A new Youtube video was just released, from the hacker group Anonymous, stating they are now at war with Republican candidate Donald Trump.

from Google Alert - anonymous http://ift.tt/1nMfMyf
via IFTTT

Alcoholics anonymous

Alcoholics anonymous. Mar 15, 2016, 1:02 PM. I believe that AA are opening a treatment clinic in candolim. They are currently recruiting a staff fore of ...

from Google Alert - anonymous http://ift.tt/1ps0rVl
via IFTTT

[FD] NEW VMSA-2016-0003 - VMware vRealize Automation and vRealize Business Advanced and Enterprise address Cross-Site Scripting (XSS) issues



Source: Gmail -> IFTTT-> Blogger

Ravens: WR Mike Wallace agrees to contract - Jamison Hensley and NFL Network; released by Vikings March 8 after 1 season (ESPN)

from ESPN http://ift.tt/17lH5T2
via IFTTT

After Apple, WhatsApp Under Fire from US Govt Over Encryption

Before winding up the dispute of Apple and FBI over encryption, another buzz on the Whatsapp Snooping is now the hot debate on the court bench. In the wake of WhatsApp's move to offer end-to-end encryption to text messages as well as VoIP calls made through its app, federal authorities have not been able to execute wiretapping warrants on WhatsApp users. Though the US Department of


from The Hacker News http://ift.tt/1Mkm2Dz
via IFTTT

Anonymous declares 'total war'

The hacking collective Anonymous has vowed once again to “dismantle” Donald Trump's presidential campaign and to “expose what he doesn't want ...

from Google Alert - anonymous http://ift.tt/1RLxBoZ
via IFTTT

Hackivist group Anonymous targets Donald Trump's campaign

Donald Trump has a new enemy -- the hactivist group Anonymous. Anonymous has announced what the group is calling a "total war" on Trump and ...

from Google Alert - anonymous http://ift.tt/1V9b5fo
via IFTTT

ISS Daily Summary Report – 03/14/16

MAGVECTOR: Peake activated the 8th and final MAGVECTOR run for Increments 47 and 48. The experiment will run for the next 5 days with completion planned for Friday, March 18. MAGVECTOR qualitatively investigates the interaction between a moving magnetic field and an electrical conductor. The expected changes in the magnetic field structure on the ram and wake side of the electrical conductor are of interest for technical applications as well as for astrophysical research.   Multi-Omics: Peake checked the remaining Flight Operations System (FOS) packages and stowed the samples for the Japan Aerospace Exploration Agency (JAXA) Multi-Omics investigation. The Multi-Omics analysis of human microbial-metabolic cross-talk in the space ecosystem, evaluates the impacts of space environment and prebiotics on astronauts’ immune function, by combining the data obtained from the measurements of changes in the gut microbiological composition, metabolites profiles, and the immune system.   Fine Motor Skills:  Kopra and Peake each completed a session of the Fine Motor Skills experiment, performing a series of interactive tasks on a touchscreen tablet. This investigation is the first fine motor skills study to measure long-term microgravity exposure, different phases of microgravity adaptation, and sensorimotor recovery after returning to Earth gravity.   Microbiome:  Kopra completed a questionnaire, set up body sampling collection equipment, and printed the reference guide to support a Microbiome session tomorrow.  Microbiome investigates the impact of space travel on both the human immune system and an individual’s Microbiome (the collection of microbes that live in and on the human body at any given time). Payload Data Handling (PDH) Remove & Replace (R&R): Peake successfully R&Rd PDH2 with PDH that was originally installed. PDH2 was an enhancement to the original, however, when it was installed in January, it did not perform as expected and could not be activated via the ground. Troubleshooting steps revealed that it could not be repaired on orbit, therefore the original PDH was reinstalled today. The PDH provides redundancy and is required for JAXA life science experiments arriving on SpX-8. Nominal operations can be conducted with the PDH that was re-installed today. PDH2 will return on SpX-8 for ground assessment as future experiments will require the enhancements provided by PDH2. Waste & Hygiene Compartment (WHC) Urine Hydraulic Components R&R: Kopra completed this preventive maintenance that is scheduled yearly. He R&Rd the WHC urine valve block, urine lines, urine pressure sensors and WHC Flush Water Tank Empty Pressure sensor. Today’s Planned Activities All activities were completed unless otherwise noted. Configure WHC for internal use of ЕДВ-У for IFM-WHC-URINE R&R. On MCC GO Regeneration of Ф1 БМП cartridge (start) Fine Motor Skills – examination run BIOME – questionnaire fill out MO- preparation of the kit for experiment FINEMOTR- equipment prep MO – equipment stow VCA1 camera adjustment Photo and video coverage of life at the station / r/g 1650 MAGVEC- equipment prep and adjustment Troubleshooting of Sleep Actiwatch Spectrum MAGVEC- data transfer with USB PDH2 tear down and PDH setup I Pad Samsung ТК №719 charge – start NAPOR-mini [РСА]. Clean ventilation orifices in [БЗУ-М] / r/g 1648 HRF – equipment setup C2V2 – cargo transfer from rack LAB1P5 SM ventilation equipment preventive maintenance. В2 group Retrieve SSD from REC2 port I Pad Samsung ТК №719 charge – term Update anti-virus base on [ВКС] laptops / r/g 8247 Urine tract components R&R in WHC WRM – condensate transfer – start Test of TV MPEG-2 signal transfer via Ku-band before Soyuz №720 docking to ISS COZh maintenance WRM – condensate transfer – term EXPRESS Rack 4 drawer repair Ham radio pass from Columbus D/l data on exercise via ОСА IMS update BIOME – preparation for sampling “GEMATOKRIT”. Equipment prep r/g 1647 On MCC GO Regeneration of Ф1 БМП cartridge (term) Preparation for anti-virus scanning on [ВКС] laptops / r/g 8247   Completed Task List Items None   Ground Activities All activities were completed unless otherwise noted. Nominal ground commanding   Three-Day Look Ahead: Tuesday, 03/15: Ocular Health, OASIS experiment run, Hatch seal inspection Wednesday, 03/16: Ocular Health, Fundoscope, OBT Cygnus RoBOT #1 Thursday, 03/17: Ocular Health, Hatch seal inspection, T2 6-month maintenance   QUICK ISS Status – Environmental Control Group:                               Component Status Elektron Off Vozdukh Manual [СКВ] 1 – SM Air Conditioner System (“SKV1”) Off [СКВ] 2 – SM Air Conditioner System (“SKV2”) Off Carbon Dioxide Removal Assembly (CDRA) Lab Override Carbon Dioxide Removal Assembly (CDRA) Node 3 Operate Major Constituent Analyzer (MCA) Lab Idle Major Constituent Analyzer (MCA) Node 3 Operate Oxygen Generation Assembly (OGA) Process Urine Processing Assembly (UPA) Standby Trace Contaminant Control System (TCCS) Lab Off Trace Contaminant Control System (TCCS) Node 3 Full Up

from ISS On-Orbit Status Report http://ift.tt/1pllEzl
via IFTTT

Anonymous declares war on Donald Trump

Anonymous has declared war on presidential hopeful Donald Trump, according to a video posted on YouTube. The hacker collective has form when it ...

from Google Alert - anonymous http://ift.tt/1TKTgDY
via IFTTT

Annual Arctic Sea Ice Minimum 1979-2015 with Area Graph

Satellite-based passive microwave images of the sea ice have provided a reliable tool for continuously monitoring changes in the Arctic ice since 1979. Every summer the Arctic ice cap melts down to what scientists call its "minimum" before colder weather begins to cause ice cover to increase. The ice parameters derived from satellite ice concentration data that are most relevant to climate change studies are sea ice extent and sea ice area. This graph displays the area of the minimum sea ice coverage each year from 1979 through 2015. In 2015, the Arctic minimum sea ice covered an area of 3.885 million square kilometers. This visualization shows the expanse of the annual minimum Arctic sea ice for each year from 1979 through 2015 as derived from SSMI data. A semi-transparent graph overlay shows the area in million square kilometers for each year's minimum day. The date shown in the upper right corner indicates the current year being displayed.

from NASA's Scientific Visualization Studio: Most Popular
via IFTTT

Monday, March 14, 2016

15 sources

Hacktivist group has called for hackers of the world to unite to disrupt the Trump Presidential campaign. Anonymous wants Donald Trump to be afraid.

from Google Alert - anonymous http://ift.tt/22hcMtc
via IFTTT

[FD] [CFP] BSides Las Vegas

The CFP for BSides Las Vegas is now open. We're accepting proposals for the following tracks: Breaking Ground – Ground Breaking Information Security research and conversations on the “Next Big Thing”. Interactively discussing your research with our participants and getting feedback, input and opinion. No preaching from the podium at a passive audience. Common Ground – Other topics of interest to the security community. e.g., Lock-picking, hardware hacking, mental health/burnout, Law, Privacy, Regulations, Risk, Crypto, Activism, etc. Again, interactive discussions with your peers and fellow researchers. Not passive lectures “at” an audience. Underground – OTR talks on subjects best discussed AFK. No press, no recording, no streaming, no names. Just you and your peers, discussing what matters, behind closed doors. Think about it. Ground Truth – Focused on innovative computer science and mathematics applied to security. Topics of interest include machine learning, natural language processing, Big Data technologies, cryptography, compression, data structures, zero knowledge proofs or just about anything academically publishable that usually baffles review committees for other conferences. I Am The Cavalry – Security that affects public safety and human life. Where our domain overlaps others, we must gather teammates and forge an alliance. Technical discussions cover medical devices, cars, and other connected technologies with a higher consequence of failure. Non-technical talks cover issues where security overlaps with the human condition, and building skills to influence change outside the echo chamber. See Iamthecavalry.org or @iamthecavalry for more information. PasswordsLV – Focused on the (in)security of passwords and other authentication solutions, bringing together security researchers, password crackers, and experts in password security from around the globe in order to better understand and address the challenges surrounding digital authentication. This track explores all facets of authentication security, from analysis and education to creating, securing, cracking, and exploiting authentication solutions. See passwordscon.org for more information. Training Ground – consists of workshops and classes to give your students hands-on experience learning the latest and greatest. We accept proposals for 1/2 day, full-day and 2-day workshops. The application can be found at http://ift.tt/1pqw41u BSidesLV is a 501(c)(3) NPO run on donations and the generous support of our sponsors and is free to attend. We are not in a position to provide our speakers with stipends, so if that is a prerequisite for your consideration, please do not apply. Thank you for your time. Genevieve Southwick Executive Producer, CEO Security BSides Las Vegas, Inc. A 501(c)(3) Non-Profit Educational Corporation https://bsideslv.org gksouthwick@bsideslv.org https://twitter.com/bsideslv 415.742.2342 GV 702.983.1230 FAX Join us in 2016, August 2nd & 3rd, at the Tuscany Suites and Casino

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Security contact @ Gigabyte

> Yeah, the general FD list policy is to reject requests for vendor contacts > unless they also include full disclosure of the bug details: > > http://ift.tt/250RD8T > > It's not that there is anything wrong with the more limited disclosure and > vendor pre-disclosure approaches, but those aren't full disclosure and so > probably belong on a different list. Maybe FunSec (http://ift.tt/1S0RRpe) would be a better place to ask for hep finding the contact: Funsec -- Fun and Misc security discussion for OT posts. Jeff

Source: Gmail -> IFTTT-> Blogger

Re: [FD] Security contact @ Gigabyte

Fyodor, We were not aware of that FD moderation rule. Now we know, and we'll try to avoid this kind of request on FD. Luckily, through this thread we got the contact we were looking for, so we thank you all for that. Cheers, Gus.-

Source: Gmail -> IFTTT-> Blogger

Demonstrating the Feasibility of Automatic Game Balancing. (arXiv:1603.03795v1 [cs.HC])

Game balancing is an important part of the (computer) game design process, in which designers adapt a game prototype so that the resulting gameplay is as entertaining as possible. In industry, the evaluation of a game is often based on costly playtests with human players. It suggests itself to automate this process using surrogate models for the prediction of gameplay and outcome. In this paper, the feasibility of automatic balancing using simulation- and deck-based objectives is investigated for the card game top trumps. Additionally, the necessity of a multi-objective approach is asserted by a comparison with the only known (single-objective) method. We apply a multi-objective evolutionary algorithm to obtain decks that optimise objectives, e.g. win rate and average number of tricks, developed to express the fairness and the excitement of a game of top trumps. The results are compared with decks from published top trumps decks using simulation-based objectives. The possibility to generate decks better or at least as good as decks from published top trumps decks in terms of these objectives is demonstrated. Our results indicate that automatic balancing with the presented approach is feasible even for more complex games such as real-time strategy games.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1pklwAm
via IFTTT

Solving MaxSAT by Successive Calls to a SAT Solver. (arXiv:1603.03814v1 [cs.AI])

The Maximum Satisfiability (MaxSAT) problem is the problem of finding a truth assignment that maximizes the number of satisfied clauses of a given Boolean formula in Conjunctive Normal Form (CNF). Many exact solvers for MaxSAT have been developed during recent years, and many of them were presented in the well-known SAT conference. Algorithms for MaxSAT generally fall into two categories: (1) branch and bound algorithms and (2) algorithms that use successive calls to a SAT solver (SAT- based), which this paper in on. In practical problems, SAT-based algorithms have been shown to be more efficient. This paper provides an experimental investigation to compare the performance of recent SAT-based and branch and bound algorithms on the benchmarks of the MaxSAT Evaluations.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1V7T4hk
via IFTTT

Sequential Short-Text Classification with Recurrent and Convolutional Neural Networks. (arXiv:1603.03827v1 [cs.CL])

Recent approaches based on artificial neural networks (ANNs) have shown promising results for short-text classification. However, many short texts occur in sequences (e.g., sentences in a document or utterances in a dialog), and most existing ANN-based systems do not leverage the preceding short texts when classifying a subsequent one. In this work, we present a model based on recurrent neural networks and convolutional neural networks that incorporates the preceding short texts. Our model achieves state-of-the-art results on three different datasets for dialog act prediction.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UcmJGQ
via IFTTT

Grounding Recursive Aggregates: Preliminary Report. (arXiv:1603.03884v1 [cs.AI])

Problem solving in Answer Set Programming consists of two steps, a first grounding phase, systematically replacing all variables by terms, and a second solving phase computing the stable models of the obtained ground program. An intricate part of both phases is the treatment of aggregates, which are popular language constructs that allow for expressing properties over sets. In this paper, we elaborate upon the treatment of aggregates during grounding in Gringo series 4. Consequently, our approach is applicable to grounding based on semi-naive database evaluation techniques. In particular, we provide a series of algorithms detailing the treatment of recursive aggregates and illustrate this by a running example.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1pklwAi
via IFTTT

On Learning High Dimensional Structured Single Index Models. (arXiv:1603.03980v1 [stat.ML])

Single Index Models (SIMs) are simple yet flexible semi-parametric models for classification and regression, where response variables are modeled as a nonlinear, monotonic function of a linear combination of features. Estimation in this context requires learning both the feature weights and the nonlinear function that relates features to observations. While methods have been described to learn SIMs in the low dimensional regime, a method that can efficiently learn SIMs in high dimensions, and under general structural assumptions, has not been forthcoming. In this paper, we propose computationally efficient algorithms for SIM inference in high dimensions using atomic norm regularization. This general approach to imposing structure in high-dimensional modeling specializes to sparsity, group sparsity, and low-rank assumptions among others. We also provide a scalable, stochastic version of the method. Experiments show that the method we propose enjoys superior predictive performance when compared to generalized linear models such as logistic regression, on several real-world datasets.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1Xrt0N5
via IFTTT

A Signaling Game Approach to Databases Querying and Interaction. (arXiv:1603.04068v1 [cs.DB])

As most database users cannot precisely express their information needs, it is challenging for database querying and exploration interfaces to understand them. We propose a novel formal framework for representing and understanding information needs in database querying and exploration. Our framework considers querying as a collaboration between the user and the database system to establish a mutual language for representing information needs. We formalize this collaboration as a signaling game, where each mutual language is an equilibrium for the game. A query interface is more effective if it establishes a less ambiguous mutual language faster. We discuss some equilibria, strategies, and the convergence in this game. In particular, we propose a reinforcement learning mechanism and analyze it within our framework. We prove that this adaptation mechanism for the query interface improves the effectiveness of answering queries stochastically speaking, and converges almost surely. Most importantly, we show that the proposed learning rule is robust to the choice of the metric/reward by the database.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1V7T2WW
via IFTTT

Geometry of Interest (GOI): Spatio-Temporal Destination Extraction and Partitioning in GPS Trajectory Data. (arXiv:1603.04110v1 [cs.AI])

In this paper, we propose a method for extracting the geometries of interest (GOIs) of a mobile object which we define as the geometries of the points of interest (POIs) which a mobile object frequently visits. Based on extracted GOIs the area of a long-term GPS trajectory is partitioned into a grid area with inhomogeneous shaped cells. This proposes a method consists of three phases: (i) extracting the geometry of stay regions based on the concepts of time-value and the time-weighted centroid, (ii) determining the geometry of destination regions based on the extracted stay regions using a geometry based hierarchical clustering, and (iii) partitioning the trajectory area based on the geometry of the destination regions and their visit frequency. The extracted GOIs can effectively represent the geometries of the POIs of the mobile object while guaranteeing the characteristics of a valid partitioning. The proposed method is tested using a field database covering the trajectory of a mobile object with the length of 3.5 years, and the achieved results are compared to the state-of-the-art. Our experimental results show that the proposed stay extraction can detect valid stay regions with only one track point while the other methods lose those stays. Moreover, analysis of the outcomes of the method using empirical observation shows that the quality of the extracted stay regions, destination regions and the GOIs extracted by our proposed method is considerably higher than those extracted by methods proposed in the state-of-the-art.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1pklvw0
via IFTTT

Bandit Approaches to Preference Learning Problems with Multiple Populations. (arXiv:1603.04118v1 [stat.ML])

In this paper we study an extension of the stochastic multi-armed bandit (MAB) framework, where in each round a player can play multiple actions and receive a stochastic reward which depends on the actions played. This problem is motivated by applications in recommendation problems where there are multiple populations of users and hence no single choice might be good for the entire population. We specifically look at bandit problems where we are allowed to make two choices in each round. We provide algorithms for this problem in both the noiseless and noisy case. Our algorithms are computationally efficient and have provable sample complexity guarantees. In the process of establishing sample complexity guarantees for our algorithms, we establish new results regarding the Nystr{\"o}m method which can be of independent interest. We supplement our theoretical results with experimental comparisons.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UcmJGB
via IFTTT

Exploratory Gradient Boosting for Reinforcement Learning in Complex Domains. (arXiv:1603.04119v1 [cs.AI])

High-dimensional observations and complex real-world dynamics present major challenges in reinforcement learning for both function approximation and exploration. We address both of these challenges with two complementary techniques: First, we develop a gradient-boosting style, non-parametric function approximator for learning on $Q$-function residuals. And second, we propose an exploration strategy inspired by the principles of state abstraction and information acquisition under uncertainty. We demonstrate the empirical effectiveness of these techniques, first, as a preliminary check, on two standard tasks (Blackjack and $n$-Chain), and then on two much larger and more realistic tasks with high-dimensional observation spaces. Specifically, we introduce two benchmarks built within the game Minecraft where the observations are pixel arrays of the agent's visual field. A combination of our two algorithmic techniques performs competitively on the standard reinforcement-learning tasks while consistently and substantially outperforming baselines on the two tasks with high-dimensional observation spaces. The new function approximator, exploration strategy, and evaluation benchmarks are each of independent interest in the pursuit of reinforcement-learning methods that scale to real-world domains.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UcmGLd
via IFTTT

Item2Vec: Neural Item Embedding for Collaborative Filtering. (arXiv:1603.04259v1 [cs.LG])

Many Collaborative Filtering (CF) algorithms are item-based in the sense that they analyze item-item relations in order to produce item similarities. Recently, several works in the field of Natural Language Processing suggested to learn a latent representation of words using neural embedding algorithms. Among them, the Skip-gram with Negative Sampling (SGNS), also known as Word2Vec, was shown to provide state-of-the-art results on various linguistics tasks. In this paper, we show that item-based CF can be cast in the same framework of neural word embedding. Inspired by SGNS, we describe a method we name Item2Vec for item-based CF that produces embedding for items in a latent space. The method is capable of inferring item-to-item relations even when user information is not available. We present experimental results on large scale datasets that demonstrate the effectiveness of the proposed method and show it provides a similarity measure that is competitive with SVD.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1V7T40S
via IFTTT

Learning Network of Multivariate Hawkes Processes: A Time Series Approach. (arXiv:1603.04319v1 [cs.LG])

Learning the influence structure of multiple time series data is of great interest to many disciplines. This paper studies the problem of recovering the causal structure in network of multivariate linear Hawkes processes. In such processes, the occurrence of an event in one process affects the probability of occurrence of new events in some other processes. Thus, a natural notion of causality exists between such processes captured by the support of the excitation matrix. We show that the resulting causal influence network is equivalent to the Directed Information graph (DIG) of the processes, which encodes the causal factorization of the joint distribution of the processes. Furthermore, we present an algorithm for learning the support of excitation matrix (or equivalently the DIG). The performance of the algorithm is evaluated on synthesized multivariate Hawkes networks as well as a stock market and MemeTracker real-world dataset.

Donate to arXiv



from cs.AI updates on arXiv.org http://ift.tt/1UcmGKX
via IFTTT