2024-05-15 13:23:12
"Will A.I. Ever Live Up to Its Hype?"
https://www.nytimes.com/2024/05/15/opinion/artificial-intelligence-ai-openai-chatgpt-overrated-hype.html?unlocked_article_code=1.sE0.2pJC.01Wt4_Q…
Opinion | A.I. and the Silicon Valley Hype Machine - The New York Times
https://www.nytimes.com/2024/05/15/opinion
How GPS warfare is affecting civilian populations; an analysis finds ~40M people lived in areas with unreliable GPS for at least half of the past six months (Financial Times)
https://t.co/mvay7kTXBc
Opinion | A.I. and the Silicon Valley Hype Machine - The New York Times
https://www.nytimes.com/2024/05/15/opinion
This https://arxiv.org/abs/2203.13966 has been replaced.
link: https://scholar.google.com/scholar?q=a
I thought I'd do another update of what I've been reading lately. This time, rather than post about each book, I'll just call out the ones I liked the most.
"Harrow the Ninth" by Tamsyn Muir is the sequel to "Gideon the Ninth", and it's just as good if not better. The story and world-building is unique, and the storytelling uses an unreliable narrator technique in a way I've never seen done before. Muir is such a beautiful and creative writer.…
This https://arxiv.org/abs/2403.16099 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCL_…
This https://arxiv.org/abs/1902.01353 has been replaced.
link: https://scholar.google.com/scholar?q=a
@… I’ve faced that problem too! I always end up writing a bridge that calls Swift from JavaScript, so I can use AVAudioPlayer, just to work around how unreliable audio is in WKWebView.
Wikipedia editors lowered CNET's source reliability rating after CNET used AI to create articles and are discussing reliability of other Red Ventures outlets (Maggie Harrison Dupré/Futurism)
https://futurism.com/wikipedia-cnet-unreliable-ai
I'm not saying gamers are unreliable flakes but this is at least the third time I have someone I've tried to work on doing hardware testing where I just get ghosted. Ugh...
Don't let any denier or fossil fuel apologist ever tell you that renewables are "unreliable" or that batteries are "unsustainable”.
You can make batteries from water, sand, and other material to store electricity as heat. This is centuries-old technology that can power the 21st century and beyond.
No more excuses.
#EndFossilFuels
Really dodgy unreliable studies of by far the least well-understood body part,
are absolutely no reason to reassess what we've known about young adults for millennia.
Diverse Randomized Value Functions: A Provably Pessimistic Approach for Offline Reinforcement Learning
Xudong Yu, Chenjia Bai, Hongyi Guo, Changhong Wang, Zhen Wang
https://arxiv.org/abs/2404.06188
How the mighty have fallen.
I remember c|net as a standard-bearer of tech journalism back in the 1990s. Theirs was one of the few bookmarks I opened regularly to read about tech news.
Red Ventures has destroyed its reputation, along with all their other properties’ like ZDNet (the other fantastic tech news site). RV’s decisive pivot to AI is likely fatal; they will accelerate the descent of all their outlets into a content swill mill fit only for your blocklist.
In a world of unreliable narrators (including me, and you), I think consensus reality, ideally based on science, is the only approach that works.
Smart home equipment is still too fragmented and low quality to get right. Setup is complicated, and even when you get everything working, protocols are unreliable and individual pieces of equipment are of such varying quality that something inevitably doesn’t work.
My smart home setup feels like it’s held together with scotch tape and string most of the time. I’d even one thing gets disrupted I have to spent time fixing it.
Deploying Graph Neural Networks in Wireless Networks: A Link Stability Viewpoint
Jun Li, Weiwei Zhang, Kang Wei, Guangji Chen, Long Shi, Wen Chen
https://arxiv.org/abs/2405.05802 …
Can My Microservice Tolerate an Unreliable Database? Resilience Testing with Fault Injection and Visualization
Michael Assad, Christopher Meiklejohn, Heather Miller, Stephan Krusche
https://arxiv.org/abs/2404.01886
Towards Trust and Reputation as a Service in a Blockchain-based Decentralized Marketplace
Stephen Olariu, Ravi Mukkamala, Meshari Aljohani
https://arxiv.org/abs/2403.04779
A lot of fairly important notice/response traffic - such as e-bills, legal notices, etc - travels by e-mail.
Yet email has become notoriously unreliable as an ever increasing number of defenses are erected against an ever increasing number of spammers and phishers.
Email has achieved a legal status somewhat below that of US Postal Service first class mail (which is, under deJoy, pretty awful itself).
I am wondering whether that legal recognition of e-mail ought to collapse …
"But the attorney general claims that argument is based on the “false premise” that Trump needs to get a single, massive bond to cover what he owes. He should be more than able to get several smaller bonds to foot the bill, according to state lawyers."
NY AG blasts Trump for ‘unreliable’ claim he can’t secure bond for $454 million fraud judgment | Courthouse News Service
There's a few different camps on generative "AI":
- "It's our lord and savior" (mostly AI companies pushing this)
- "It will kill us all" doomerism (it won't, it has no intelligence or sentience or agenda)
- "It has some use cases!" centrism (problematic because it enables the lord and savior types & it's also wrong as work products are highly unreliable, even for basic things like summaries and tabulation)
- &q…
Interesting. I hadn’t considered much of CNET “generally reliable” since about 2010… https://mastodon.online/@ia/112022838940762765
This https://arxiv.org/abs/2311.11167 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qu…
I can’t even browse recipes on my phone anymore, they’re so laden with JS bloatware and ads. My phone gets warm to the touch and scrolling becomes unreliable. What a mess
A Reliable Framework for Human-in-the-Loop Anomaly Detection in Time Series
Ziquan Deng, Xiwei Xuan, Kwan-Liu Ma, Zhaodan Kong
https://arxiv.org/abs/2405.03234
Optimal Denial-of-Service Attacks Against Status Updating
Saad Kriouile, Mohamad Assaad, Deniz G\"und\"uz, Touraj Soleymani
https://arxiv.org/abs/2403.04489
Towards Trust and Reputation as a Service in a Blockchain-based Decentralized Marketplace
Stephen Olariu, Ravi Mukkamala, Meshari Aljohani
https://arxiv.org/abs/2403.04779
MaxCUCL: Max-Consensus with Deterministic Convergence in Networks with Unreliable Communication
Apostolos I. Rikos, Themistoklis Charalambous, Karl H. Johansson
https://arxiv.org/abs/2402.18719
InstantSplat: Unbounded Sparse-view Pose-free Gaussian Splatting in 40 Seconds
Zhiwen Fan, Wenyan Cong, Kairun Wen, Kevin Wang, Jian Zhang, Xinghao Ding, Danfei Xu, Boris Ivanovic, Marco Pavone, Georgios Pavlakos, Zhangyang Wang, Yue Wang
https://arxiv.org/abs/2403.20309
Benchmarking Educational Program Repair
Charles Koutcheme, Nicola Dainese, Sami Sarsa, Juho Leinonen, Arto Hellas, Paul Denny
https://arxiv.org/abs/2405.05347
I came to the conclusion that impulsivity is not a symptom of ADD/ADHD but a consequence. Let me explain:
My main issue with ADD is that important thoughts (todos, dates, deadlines, promises, ...) never come up unless triggered somehow. Now, when any important thought comes up in my unreliable brain I have two choices:
1. act immediately
2. dismiss the thought, possibly forever
Note: ADD/ADHD is a real disorder in the brain's metabolism and not a popculture phenome…
This https://arxiv.org/abs/2311.06522 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_ees…
This https://arxiv.org/abs/2309.13198 has been replaced.
initial toot: https://mastoxiv.page/@a…
FaaF: Facts as a Function for the evaluation of RAG systems
Vasileios Katranidis, Gabor Barany
https://arxiv.org/abs/2403.03888 https://
Misinformation Resilient Search Rankings with Webgraph-based Interventions
Peter Carragher, Evan M. Williams, Kathleen M. Carley
https://arxiv.org/abs/2404.08869
Modeling the Trade-off between Throughput and Reliability in a Bluetooth Low Energy Connection
Bozheng Pang, Tim Claeys, Hans Hallez, Jeroen Boydens
https://arxiv.org/abs/2405.01231
A Reliable Framework for Human-in-the-Loop Anomaly Detection in Time Series
Ziquan Deng, Xiwei Xuan, Kwan-Liu Ma, Zhaodan Kong
https://arxiv.org/abs/2405.03234
This https://arxiv.org/abs/2404.13236 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csDC_…
This https://arxiv.org/abs/1902.01353 has been replaced.
link: https://scholar.google.com/scholar?q=a
The failure state of macOS application signature (and “receipt”) checking is to tell the user that the app has been “damaged” and needs to be reinstalled.
Helpfully side-stepping the complexity of explaining cryptographic processes to users, while also conveying the idea that Apple's own disks and filesystems are incredibly unreliable.
Reliable operation in high-mobility indium oxide thin film transistors
Prashant R. Ghediya, Yusaku Magari, Hikaru Sadahira, Takashi Endo, Mamoru Furuta, Yuqiao Zhang, Yasutaka Matsuo, Hiromichi Ohta
https://arxiv.org/abs/2404.03856
Deep Clustering Evaluation: How to Validate Internal Clustering Validation Measures
Zeya Wang, Chenglong Ye
https://arxiv.org/abs/2403.14830 https://
Machine and deep learning methods for predicting 3D genome organization
Brydon P. G. Wall, My Nguyen, J. Chuck Harrell, Mikhail G. Dozmorov
https://arxiv.org/abs/2403.03231
Notes on the Practical Application of Nested Sampling: MultiNest, (Non)convergence, and Rectification
Alexander J. Dittmann
https://arxiv.org/abs/2404.16928
This https://arxiv.org/abs/2403.09583 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csRO_…
Robust inference for the unification of confidence intervals in meta-analysis
Wei Liang, Haicheng Huang, Hongsheng Dai, Yinghui Wei
https://arxiv.org/abs/2404.13707
HR-APR: APR-agnostic Framework with Uncertainty Estimation and Hierarchical Refinement for Camera Relocalisation
Changkun Liu, Shuai Chen, Yukun Zhao, Huajian Huang, Victor Prisacariu, Tristan Braud
https://arxiv.org/abs/2402.14371
This https://arxiv.org/abs/2304.08063 has been replaced.
initial toot: https://mastoxiv.page/@arXi…
This https://arxiv.org/abs/2306.13941 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csDC_…
This https://arxiv.org/abs/2401.08680 has been replaced.
initial toot: https://mastoxiv.page/@arX…
This https://arxiv.org/abs/2403.17740 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csIR_…
Structured Reinforcement Learning for Delay-Optimal Data Transmission in Dense mmWave Networks
Shufan Wang, Guojun Xiong, Shichen Zhang, Huacheng Zeng, Jian Li, Shivendra Panwar
https://arxiv.org/abs/2404.16920
Deep Clustering Evaluation: How to Validate Internal Clustering Validation Measures
Zeya Wang, Chenglong Ye
https://arxiv.org/abs/2403.14830 https://
Detection of Energy Consumption Cyber Attacks on Smart Devices
Zainab Alwaisi, Simone Soderi, Rocco De Nicola
https://arxiv.org/abs/2404.19434 https://arxiv.org/pdf/2404.19434
arXiv:2404.19434v1 Announce Type: new
Abstract: With the rapid development of Internet of Things (IoT) technology, intelligent systems are increasingly integrating into everyday life and people's homes. However, the proliferation of these technologies raises concerns about the security of smart home devices. These devices often face resource constraints and may connect to unreliable networks, posing risks to the data they handle. Securing IoT technology is crucial due to the sensitive data involved.
Preventing energy attacks and ensuring the security of IoT infrastructure are key challenges in modern smart homes. Monitoring energy consumption can be an effective approach to detecting abnormal behavior and IoT cyberattacks. Lightweight algorithms are necessary to accommodate the resource limitations of IoT devices.
This paper presents a lightweight technique for detecting energy consumption attacks on smart home devices by analyzing received packets. The proposed algorithm considers TCP, UDP, and MQTT protocols, as well as device statuses (Idle, active, under attack). It accounts for resource constraints and promptly alerts administrators upon detecting an attack. The proposed approach effectively identifies energy consumption attacks by measuring packet reception rates for different protocols.
This https://arxiv.org/abs/2309.03194 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qbi…
Vulnerability Detection with Code Language Models: How Far Are We?
Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David Wagner, Baishakhi Ray, Yizheng Chen
https://arxiv.org/abs/2403.18624
This https://arxiv.org/abs/2309.13198 has been replaced.
initial toot: https://mastoxiv.page/@a…
This https://arxiv.org/abs/2404.09831 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCV_…
Robust inference for the unification of confidence intervals in meta-analysis
Wei Liang, Haicheng Huang, Hongsheng Dai, Yinghui Wei
https://arxiv.org/abs/2404.13707
This https://arxiv.org/abs/2304.08063 has been replaced.
initial toot: https://mastoxiv.page/@arXi…
All-in-One: Heterogeneous Interaction Modeling for Cold-Start Rating Prediction
Shuheng Fang, Kangfei Zhao, Yu Rong, Zhixun Li, Jeffrey Xu Yu
https://arxiv.org/abs/2403.17740
This https://arxiv.org/abs/2404.09831 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCV_…
Versatile Capillary Cells for Handling Concentrated Samples in Analytical Ultracentrifugation
Quy Ong, Xufeng Xu, Francesco Stellacci
https://arxiv.org/abs/2403.10418
LLMChain: Blockchain-based Reputation System for Sharing and Evaluating Large Language Models
Mouhamed Amine Bouchiha, Quentin Telnoff, Souhail Bakkali, Ronan Champagnat, Mourad Rabah, Micka\"el Coustaty, Yacine Ghamri-Doudane
https://arxiv.org/abs/2404.13236
This https://arxiv.org/abs/2305.16794 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_csCR_…
This https://arxiv.org/abs/2309.03194 has been replaced.
initial toot: https://mastoxiv.page/@arXiv_qbi…