New Articles (Page 315)
To stay up to date you can also follow on Mastodon.
🔗 Induction of regular languages
In computational learning theory, induction of regular languages refers to the task of learning a formal description (e.g. grammar) of a regular language from a given set of example strings. Although Mark E. Gold has shown that not every regular language can be learned this way (see language identification in the limit), approaches have been investigated for a variety of subclasses. They are sketched in this article. For learning of more general grammars, see Grammar induction.
Discussed on
- "Induction of regular languages" | 2018-11-24 | 44 Upvotes 3 Comments
🔗 THX 1138
THX 1138 is a 1971 American social science fiction film directed by George Lucas in his feature film directorial debut. It is set in a dystopian future in which the populace is controlled through android police and mandatory use of drugs that suppress emotions. Produced by Francis Ford Coppola and written by Lucas and Walter Murch, it stars Robert Duvall and Donald Pleasence.
THX 1138 was developed from Lucas's student film Electronic Labyrinth: THX 1138 4EB, which he made in 1967 while attending the USC School of Cinematic Arts. The feature film was produced in a joint venture between Warner Bros. and American Zoetrope. A novelization by Ben Bova was published in 1971. The film received mixed reviews from critics and failed to find box-office success on initial release; however, the film has subsequently received critical acclaim and gained a cult following, particularly in the aftermath of Lucas' success with Star Wars in 1977.
🔗 Rabin-Karp Algorithm for finding matching substrings in text
In computer science, the Rabin–Karp algorithm or Karp–Rabin algorithm is a string-searching algorithm created by Richard M. Karp and Michael O. Rabin (1987) that uses hashing to find an exact match of a pattern string in a text. It uses a rolling hash to quickly filter out positions of the text that cannot match the pattern, and then checks for a match at the remaining positions. Generalizations of the same idea can be used to find more than one match of a single pattern, or to find matches for more than one pattern.
To find a single match of a single pattern, the expected time of the algorithm is linear in the combined length of the pattern and text, although its worst-case time complexity is the product of the two lengths. To find multiple matches, the expected time is linear in the input lengths, plus the combined length of all the matches, which could be greater than linear. In contrast, the Aho–Corasick algorithm can find all matches of multiple patterns in worst-case time and space linear in the input length and the number of matches (instead of the total length of the matches).
A practical application of the algorithm is detecting plagiarism. Given source material, the algorithm can rapidly search through a paper for instances of sentences from the source material, ignoring details such as case and punctuation. Because of the abundance of the sought strings, single-string searching algorithms are impractical.
Discussed on
- "Rabin-Karp Algorithm for finding matching substrings in text" | 2018-11-20 | 10 Upvotes 1 Comments
🔗 William Goldman, author and screenwriter of “The Princess Bride”, has died
William Goldman (August 12, 1931 – November 16, 2018) was an American novelist, playwright, and screenwriter. He first came to prominence in the 1950s as a novelist before turning to screenwriting. He won Academy Awards for his screenplays Butch Cassidy and the Sundance Kid (1969) and All the President's Men (1976). His other works include his thriller novel Marathon Man and comedy/fantasy novel The Princess Bride, both of which he adapted for the film versions.
Author Sean Egan has described Goldman as "one of the late twentieth century's most popular storytellers."
Discussed on
- "William Goldman, author and screenwriter of “The Princess Bride”, has died" | 2018-11-16 | 32 Upvotes 3 Comments
🔗 Five Eyes
The Five Eyes (FVEY) is an anglophone intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom and the United States. These countries are parties to the multilateral UKUSA Agreement, a treaty for joint cooperation in signals intelligence.
The origins of the FVEY can be traced back to the post–World War II period, when the Atlantic Charter was issued by the Allies to lay out their goals for a post-war world. During the course of the Cold War, the ECHELON surveillance system was initially developed by the FVEY to monitor the communications of the former Soviet Union and the Eastern Bloc, although it is now used to monitor billions of private communications worldwide.
In the late 1990s, the existence of ECHELON was disclosed to the public, triggering a major debate in the European Parliament and, to a lesser extent, the United States Congress. As part of efforts in the ongoing War on Terror since 2001, the FVEY further expanded their surveillance capabilities, with much emphasis placed on monitoring the World Wide Web. The former NSA contractor Edward Snowden described the Five Eyes as a "supra-national intelligence organisation that does not answer to the known laws of its own countries". Documents leaked by Snowden in 2013 revealed that the FVEY has been spying on one another's citizens and sharing the collected information with each other in order to circumvent restrictive domestic regulations on surveillance of citizens.
In spite of continued controversy over its methods, the Five Eyes relationship remains one of the most comprehensive known espionage alliances in history.
Since processed intelligence is gathered from multiple sources, the intelligence shared is not restricted to signals intelligence (SIGINT) and often involves defence intelligence as well as human intelligence (HUMINT) and geospatial intelligence (GEOINT). The following table provides an overview of most of the FVEY agencies involved in such forms of data sharing.
🔗 Stan Lee has died
Stan Lee (born Stanley Martin Lieber ; December 28, 1922 – November 12, 2018) was an American comic book writer, editor, publisher, and producer. He rose through the ranks of a family-run business to become Marvel Comics' primary creative leader for two decades, leading its expansion from a small division of a publishing house to a multimedia corporation that dominated the comics industry.
In collaboration with others at Marvel—particularly co-writer/artists Jack Kirby and Steve Ditko—he co-created numerous popular fictional characters, including superheroes Spider-Man, the X-Men, Iron Man, Thor, the Hulk, Black Widow, the Fantastic Four, Black Panther, Daredevil, Doctor Strange, Scarlet Witch and Ant-Man. In doing so, he pioneered a more naturalistic approach to writing superhero comics in the 1960s, and in the 1970s he challenged the restrictions of the Comics Code Authority, indirectly leading to changes in its policies. In the 1980s he pursued the development of Marvel properties in other media, with mixed results. Following his retirement from Marvel in the 1990s, he remained a public figurehead for the company, and frequently made cameo appearances in films and television shows based on Marvel characters, on which he received an executive producer credit. Meanwhile, he continued independent creative ventures into his 90s, until his death in 2018.
Lee was inducted into the comic book industry's Will Eisner Award Hall of Fame in 1994 and the Jack Kirby Hall of Fame in 1995. He received the NEA's National Medal of Arts in 2008.
Discussed on
- "Stan Lee has died" | 2018-11-12 | 60 Upvotes 9 Comments
🔗 Post-quantum cryptography: just in case
Post-quantum cryptography (sometimes referred to as quantum-proof, quantum-safe or quantum-resistant) refers to cryptographic algorithms (usually public-key algorithms) that are thought to be secure against an attack by a quantum computer. As of 2019, this is not true for the most popular public-key algorithms, which can be efficiently broken by a sufficiently strong quantum computer. The problem with currently popular algorithms is that their security relies on one of three hard mathematical problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems can be easily solved on a sufficiently powerful quantum computer running Shor's algorithm. Even though current, publicly known, experimental quantum computers lack processing power to break any real cryptographic algorithm, many cryptographers are designing new algorithms to prepare for a time when quantum computing becomes a threat. This work has gained greater attention from academics and industry through the PQCrypto conference series since 2006 and more recently by several workshops on Quantum Safe Cryptography hosted by the European Telecommunications Standards Institute (ETSI) and the Institute for Quantum Computing.
In contrast to the threat quantum computing poses to current public-key algorithms, most current symmetric cryptographic algorithms and hash functions are considered to be relatively secure against attacks by quantum computers. While the quantum Grover's algorithm does speed up attacks against symmetric ciphers, doubling the key size can effectively block these attacks. Thus post-quantum symmetric cryptography does not need to differ significantly from current symmetric cryptography. See section on symmetric-key approach below.
Discussed on
- "Post-quantum cryptography" | 2018-11-12 | 20 Upvotes 14 Comments
- "Post-quantum cryptography" | 2015-08-22 | 50 Upvotes 21 Comments
🔗 Alchian–Allen effect
The Alchian–Allen effect was described in 1964 by Armen Alchian and William R Allen in the book University Economics (now called Exchange and Production). It states that when the prices of two substitute goods, such as high and low grades of the same product, are both increased by a fixed per-unit amount such as a transportation cost or a lump-sum tax, consumption will shift toward the higher-grade product. This is because the added per-unit amount decreases the relative price of the higher-grade product.
Suppose, for example, that high-grade coffee beans are $3/pound and low-grade beans $1.50/pound; in this example, high-grade beans cost twice as much as low-grade beans. Now add a per-pound international shipping cost of $1. The effective prices are now $4 and $2.50; high-grade beans now cost only 1.6 times as much as low-grade beans. This reduced ratio of difference will induce distant coffee-buyers to now choose a higher ratio of high-to-low grade beans than local coffee-buyers.
The effect has been studied as it applies to illegal drugs and it has been shown that the potency of marijuana increased in response to higher enforcement budgets, and there was a similar effect for alcohol in the U.S. during Prohibition. This effect is called iron law of prohibition.
Another example is that Australians drink higher-quality Californian wine than Californians, and vice versa, because it is only worth the transportation costs for the most expensive wine.
Colloquially, the Alchian–Allen theorem is also known as the “shipping the good apples out” theorem (Thomas Borcherding), or as the “third law of demand.”
Discussed on
- "Alchian–Allen effect" | 2018-11-12 | 122 Upvotes 53 Comments
🔗 Drzymała's wagon
Drzymała's wagon (Polish: wóz Drzymały) was a house on wheels built by Michał Drzymała as a protest against Imperial Germany's policy of Germanization in its Polish territories. Its owner, the peasant Michał Drzymała (1857-1937), was not only able to circumvent German building regulations by moving his home every day, but with his wagon-home became a Polish folk hero during the Partitions of Poland.
In 1886, by resolution of the Prussian Landtag, a Settlement Commission had been established to encourage German settlement in the Province of Posen and West Prussia. The Commission was empowered to purchase vacant property of the Polish szlachta and sell it to approved German applicants. The Prussian government regarded this as a measure designed to counteract the German "Flight from the East" (Ostflucht) and reduce the number of Poles, who were migrating to the area in hundreds of thousands looking for work. In Polish eyes, the establishment of the Commission was an aggressive measure designed to drive Poles from their lands.
While the campaign against Polish landownership largely missed its aims, it produced a strong opposition with its own hero, Drzymała. In 1904 he purchased a plot of land in Pogradowitz in the Posen district of Bomst, but found that the newly implemented Prussian Feuerstättengesetz ("furnace law") enabled local officials to deny him as a Pole the permission to build a permanent dwelling with an oven on his land. The law considered any place of stay a house if it stayed in one place for more than 24 hours. To get around the rule, he set himself up in a former circus caravan and for several years tenaciously defied in the courts all attempts to remove him. Each day, Drzymała moved the wagon a short distance, thereby exploiting the loophole and avoiding any legal penalties, until in 1909 he was able to buy an existent farmhouse nearby.
The case attracted publicity all over Germany. The German Kulturkampf measures and the Colonization Commission ultimately succeeded in stimulating the Polish national sentiment that they had been designed to suppress.
Discussed on
- "Drzymała's wagon" | 2018-11-12 | 109 Upvotes 23 Comments
🔗 Kristallnacht, the “Night of Broken Glass”, was 80 years ago tonight
Kristallnacht (German pronunciation: [kʁɪsˈtalnaχt]) or the Night of Broken Glass, also called the November Pogrom(s), was a pogrom against Jews carried out by SA paramilitary forces and civilians throughout Nazi Germany on 9–10 November 1938. The German authorities looked on without intervening. The name Kristallnacht ("Crystal Night") comes from the shards of broken glass that littered the streets after the windows of Jewish-owned stores, buildings and synagogues were smashed.
Jewish homes, hospitals and schools were ransacked as the attackers demolished buildings with sledgehammers. The rioters destroyed 267 synagogues throughout Germany, Austria and the Sudetenland. Over 7,000 Jewish businesses were damaged or destroyed, and 30,000 Jewish men were arrested and incarcerated in concentration camps. British historian Martin Gilbert wrote that no event in the history of German Jews between 1933 and 1945 was so widely reported as it was happening, and the accounts from foreign journalists working in Germany sent shockwaves around the world. The Times of London observed on 11 November 1938: "No foreign propagandist bent upon blackening Germany before the world could outdo the tale of burnings and beatings, of blackguardly assaults on defenceless and innocent people, which disgraced that country yesterday."
The pretext for the attacks was the assassination of the Nazi German diplomat Ernst vom Rath by Herschel Grynszpan, a 17-year-old German-born Polish Jew living in Paris. Estimates of fatalities caused by the attacks have varied. Early reports estimated that 91 Jews had been murdered. Modern analysis of German scholarly sources puts the figure much higher; when deaths from post-arrest maltreatment and subsequent suicides are included, the death toll climbs into the hundreds, with Richard J. Evans estimating 638 suicide deaths. Historians view Kristallnacht as a prelude to the Final Solution and the murder of six million Jews during the Holocaust.