Wednesday, July 27, 2011

Blog: Protecting Networks Is Just a Game

Protecting Networks Is Just a Game
EurekAlert (07/27/11)

A defensive strategy for computer networks based on game theory is more effective than previous methods, says Iona College information technologist Heechang Shin, who developed an anti-hacking tool that plays a game of reality versus forecast. Called defensive forecasting, the tool wins when reality matches its forecast, and then sends out an alert to block an attempt to attack the computer network. The tool works on real-time data flowing in and out of the network, rather than analyzing logs, and detects intrusions as they are happening. Shin's game theory model continuously trains the tool so that it can recognize the patterns of typical network attacks. To measure the effectiveness of the tool, Shin compared it using the semi-synthetic dataset generated from a raw TCP/IP dump data by simulating a typical U.S. Air Force local-area network to a network intrusion system based on a support vector machine (SVM), which is one of the best classification methods for detection. During testing, the tool was as good or better than one based on SVM for detecting network intrusion while adding the benefits of real-time detection.

View Full Article

Tuesday, July 26, 2011

Blog: Crowdsourced Online Learning Gives Robots Human Skills

Crowdsourced Online Learning Gives Robots Human Skills
New Scientist (07/26/11) Jim Giles

Roboticists are experimenting with using crowdsourcing to teach robots more general skills. By allowing users to pilot real or simulated robots over the Internet in trial experiments, the researchers hope to create machines that can simulate a human's flexibility and dexterity. "Crowdsourcing is a really viable path toward getting robots to do things that are useful for people," says Brown University's Chad Jenkins. Crowdsourcing also can be used to develop better human-robot interactions, says Worcester Polytechnic Institute's Sonia Chernova. She has led a team that developed Mars Escape, an online game in which two users each control an avatar, one human and one robot, to collect information on teamwork, social interaction, and communication. After more than 550 game sessions, the researchers looked for patterns in the data, such as methods that players frequently used to retrieve objects, and phrases they exchanged when doing so. The researchers then set up a mock real-life version of the game in which visitors were paired with a robot powered by software based on the Mars Escape data. During testing, most of the visitors said the robot behaved rationally and contributed to the team's success.

View Full Article

Monday, July 25, 2011

Blog: Sandia's CANARY Software Protects Water Utilities From Terrorist Attacks and Contaminants, Boosts Quality

Sandia's CANARY Software Protects Water Utilities From Terrorist Attacks and Contaminants, Boosts Quality
Sandia National Laboratories (07/25/11) Heather Clark

Researchers at Sandia National Laboratories and the U.S. Environmental Protection Agency have developed the CANARY Event Detection Software, an open source program that monitors public water systems to protect them from terrorist attacks or natural contaminants. The CANARY software tells utility operators whether something is wrong with their water system within minutes. CANARY can be customized for individual utility systems with their own sensors and software, according to Sandia's Sean McKenna. The researchers used algorithms to analyze data coming from multiple sensors and differentiate between natural variability and unusual patterns that indicate a problem. When new data is received, CANARY determines whether it is close enough to a known cluster to be considered normal or whether it is far enough away to be deemed anomalous. An unintended benefit of the software is that when utility operators better understood the data being sent by their sensors, they could make changes to the management of the water systems to improve its overall quality.

View Full Article

Blog: Minority Rules: Scientists Discover Tipping Point for the Spread of Ideas

Minority Rules: Scientists Discover Tipping Point for the Spread of Ideas
RPI News (07/25/11) Gabrielle DeMarco

Rensselaer Polytechnic Institute researchers have found that just 10 percent of a population is enough to sway the majority of a society. The researchers used computational and analytical methods to discover the tipping point in which a minority belief becomes the majority opinion. The research also found that the percent of committed opinion holders required to shift majority opinion does not change significantly with the type of network in which the opinion holders are working. The researchers developed computer models of three types of social networks. The first network had each person connect to every other person in the network, the second model had a few individuals serve as hubs, and the third model gave every person in the network about the same number of connections. After the networks were constructed, the researchers planted a few "true" believers into each of the networks. As the true believers began to interact with the others in the network, the opinion of a majority of the individuals gradually, and then very rapidly, began to shift.

View Full Article

Blog: Cornell Computers Spot 'Opinion Spam'

Cornell Computers Spot 'Opinion Spam'
Cornell Chronicle (07/25/11) Bill Steele

Cornell University researchers have developed software that can identify opinion spam, which are phony positive reviews created by sellers to help sell their products, or negative reviews meant to downgrade competitors. In a test of 800 reviews of Chicago-area hotels, the program was able to identify deceptive reviews with almost 90 percent accuracy. The researchers, led by professors Claire Cardie and Jeff Hancock, found that truthful hotel reviews were more likely to contain concrete words that had to do with the hotel, such as "bathroom," "check-in," or "price," while deceptive reviews contained scene-setting words, such as "vacation," "business trip," and "my husband." In general, deceivers use more verbs and honest reviewers use more nouns. The researchers found that the best results came from combining keyword analysis with the ways certain words are combined in pairs. The next step will be to see if the system can be extended to other categories, such as restaurants and consumer products, says Cornell graduate student Myle Ott.

View Full Article

Thursday, July 21, 2011

Blog: Prof Says Tech Entering the Age of the Algorithm

Prof Says Tech Entering the Age of the Algorithm
University of Texas at Dallas (TX) (07/21/11) David Moore

University of Texas at Dallas (UTD) professor Andras Farago thinks that as algorithms become more important to software development, educational and career opportunities will follow. Farago says the rise in the importance of algorithms mirrors the life cycle of software, which originally was viewed as a secondary feature to hardware. "In a sense, algorithms up until very recently have had the same relationship to software implementation as software previously had to hardware: Icing on the cake," he says. However, Farago says there recently have been more cases, such as the Heritage Provider Network's $3 million prize, in which the hardest part is finding the perfect algorithm. "Once it is found, the implementation can be done by any skilled team, and I believe this may show the emergence of a trend in which the industry starts recognizing the real, hard value of sophisticated algorithms," he says. As part of the Heritage contest, participants are trying to design the algorithm that best predicts which people are more likely to require hospitalization in the future.

View Full Article

Wednesday, July 20, 2011

Blog: Caltech Researchers Create the First Artificial Neural Network Out of DNA

Caltech Researchers Create the First Artificial Neural Network Out of DNA
California Institute of Technology (07/20/11) Marcus Woo

California Institute of Technology (CalTech) researchers have developed an artificial neural network out of DNA, creating a circuit of interacting molecules that can recall memories based on incomplete information. The network, which consists of four artificial neurons made from 112 distinct strands of DNA, plays a mind-reading game in which it identifies a mystery scientist based on answering yes or no questions, such as whether the scientist is British. The network communicates its answers using fluorescent signals and was able to correctly identify the scientist in 100 percent of the 27 trials the researchers conducted. The DNA-based neural network can take an incomplete pattern and determine what it represents. The researchers say that biochemical systems with artificial intelligence could have applications in medicine, chemistry, and biological research. They based the network on a simple model of a neuron, known as a linear threshold function. "It has been an extremely productive model for exploring how the collective behavior of many simple computational elements can lead to brain-like behaviors, such as associative recall and pattern completion," says CalTech professor Erik Winfree.

View Full Article

Saturday, July 16, 2011

Blog: Internet's Memory Effects Quantified in Computer Study

Internet's Memory Effects Quantified in Computer Study
BBC News (07/16/11) Jason Palmer

Recent experiments have shown that computers and the Internet are changing the nature of human memory, as people presented with difficult questions began to think of computers. If the participants knew that the facts would be available on a computer later, they had poor recall of the answers but enhanced recall of where they were stored, according to the study, which described the Internet as serving as a transactive memory. Transactive memory "is an idea that there are external memory sources--really storage places that exist in other people," says Columbia University's Betsy Sparrow. The researchers used a modified Stroop test to study how people thought about difficult questions and whether they relied on computers for the answers. The researchers provided a stream of facts to participants, and half were told to file them away on a computer, and the other half were told the facts would be erased. Those who knew the information would not be available later performed significantly better than those who filed the information away. However, those who expected the information to be available were very good at remembering in which folder they had stored it.

View Full Article

Friday, July 15, 2011

Blog: Machines to Compare Notes Online?

Machines to Compare Notes Online?
AlphaGalileo (07/15/11)

Autonomous machines, networks, and robots should publish their own suggestions for upgrading the technology on the Internet, says the University of Southampton's Sandor Veres. Giving machines and systems a greater degree of self-control will be the best way to improve them in the future, but humans will be more likely to guide and trust them if their dialogue is transparent, Veres says. An autonomously operating technical system would have some modeling of a changing environment; learning of various skills in feedback interaction with the environment; symbolic recognition of events and actions to perform logic-based computation; the ability to explain reasons of own actions to humans; and efficient transfer of rules, goals, values, and skills from human users to the autonomous system. Veres says the natural language programming sEnglish system could be used to achieve the last three technical features. "The adoption of a 'publications for machines' approach can bring great practical benefits by making the business of building autonomous systems viable in some critical areas where a high degree of intelligence is needed and safety is paramount," Veres says.

View Full Article

Blog: Swarms of Locusts Use Social Networking to Communicate

Swarms of Locusts Use Social Networking to Communicate
Institute of Physics (07/15/11)

The swarming behavior of locusts is created by the same social networks that humans adopt, according to a study by researchers from the Max Planck Institute for Physics of Complex Systems and a U.S.-based scientist supported by the National Science Foundation. The researchers applied previous findings on opinion formation in social networks to an earlier study of 120 locust nymphs marching in a ring-shaped arena in the lab. Using a computer model that simulated the social network among locusts, the team found that the key component to reproducing the movements observed in the lab is the social interactions that occur when locusts, walking in one direction, convince others to follow them. Locusts create the equivalent of our human social networks, according to the researchers. "We concluded that the mechanism through which locusts agree on a direction to move together ... is the same we sometimes use to decide where to live or where to go out," says researcher Gerd Zschaler. "We let ourselves be convinced by those in our social network, often by those going in the opposite direction."

View Full Article

Tuesday, July 12, 2011

Blog: Computer Learns Language By Playing Games

Computer Learns Language By Playing Games
MIT News (07/12/11) Larry Hardesty

Massachusetts Institute of Technology professor Regina Marzilay has adapted a system she developed to generate scripts for installing software on a Windows computer based on postings from a Microsoft help site to learn to play the Civilization computer game. The goal of the project was to demonstrate that computer systems that learn the meanings of words through exploratory interaction with their environments have much potential and deserve further research. The system begins with no prior knowledge about the task or the language in which the instructions are written, making the initial behavior almost completely random. As the system takes various actions, different words appear on the screen. The system finds those words in the instructions and develops hypotheses about what those words mean, based on the surrounding text. The hypotheses that consistently lead to good results are referred back to more frequently, while the hypotheses that are proven unsuccessful are discarded. In the case of the computer game, the system won 72 percent more often than a version of the same system that did not use the written instructions, and 27 percent more frequently than an artificial intelligence-based system.

View Full Article

Blog: Cracking the Code of the Mind

Cracking the Code of the Mind
American Friends of Tel Aviv University (07/12/11)

Tel Aviv University researchers have developed a type of lab-on-a-chip platform that can show how neuronal networks communicate and work together. The researchers, led by doctoral student Mark Shein, applied mathematical and engineering techniques to connect neurons with electronics in order to understand how neuronal connections communicate. The tool could be used to test new drugs, advance artificial intelligence, and develop better artificial limbs, according to the researchers. The device enables researchers to see how neural circuits operate under different conditions and explore activity patterns of many neurons simultaneously. The researchers focused on studying how several groups of neurons communicate with each other, according to Shein. The researchers cultured different sized networks of neuronal circuits and found that neural networks have a hierarchical structure in which large networks are composed of smaller sub-networks.

View Full Article

Tuesday, July 5, 2011

Blog: A Futures Market for Computer Security

A Futures Market for Computer Security
Technology Review (07/05/11) Brian Krebs

A pilot prediction market that can forecast major information security incidents before they occur is under development by information security researchers from academia, industry, and the U.S. intelligence community for the purpose of supplying actionable data, says Greg Shannon with Carnegie Mellon University's Software Engineering Institute. "If you're Verizon, and you're trying to pre-position resources, you might want to have some visibility over the horizon about the projected prevalence of mobile malware," he says. "That's something they'd like to have an informed opinion about by leveraging the wisdom of the security community." Consensus Point CEO Linda Rebrovick says the project's objective is to draw a network of approximately 250 experts. Prediction markets have a substantial inherent bias--respondents to questions are not surveyed randomly—but there also is an incentive for respondents to respond only to those queries they feel confident in answering accurately. "People tend to speak up only when they're reasonably sure they know the answer," says Consensus Point chief scientist Robin Hanson. Even lukewarm responses to questions can be useful, notes Dan Geer, chief information security officer at the U.S. Central Intelligence Agency's In-Q-Tel venture capital branch.

View Full Article

Blog Archive