terça-feira, novembro 20, 2007

Human Computation .|. Luis Von Ahn

;) ;) ;) THE ESP Game
A game where you have to guess what the other person is writting to label the same image your viewing.



Human Computation - Google Video


Luis von Ahn


"Luis von Ahn is an assistant professor in the Computer Science Department at Carnegie Mellon University, ... all » where he also received his Ph.D. in 2005. Previously, Luis obtained a B.S. in mathematics from Duke University in 2000. He is the recipient of a Microsoft Research Fellowship.

ABSTRACT Tasks like image recognition are trivial for humans, but continue to challenge even the most sophisticated computer programs. This talk introduces a paradigm for utilizing human processing power to solve problems that computers cannot yet solve. Traditional approaches to solving such problems focus on improving software. I advocate a novel approach: constructively channel human brainpower using computer games. For example, the ESP Game, described in this talk, is an enjoyable online game -- many people play over 40 hours a week -- and when people play, they help label images on the Web with descriptive keywords. These keywords can be used to significantly improve the accuracy of image search. People play the game not because they want to help, but because they enjoy it.

I describe other examples of "games with a purpose": Peekaboom, which helps determine the location of objects in images, and Verbosity, which collects common-sense knowledge. I also explain a general approach for constructing games with a purpose."

terça-feira, novembro 13, 2007

Fucking 4X4 matrix keyboard

Still don't get it totally, well... based on the code I got anyhow.

The idea of a 4X4 matrix printing in to a 16 keys keyboard seems rather easy if one thinks the numbers are actually written in base 4. Then any number n= (line/4)*4 + (col%4);

now if one intends to save such a result in a counter, one shall evaluate the lower bits to match the col, and the higher bits to match the line. Sounds easy, either multiplexer or decoder should do the job and we'd all be happy. But this implementation I got, makes the cols independent of any input. And this I find at minimum ; QUITE ODD and am going crazy. And simulated the got deamn keyboard on a JAPPLET. And found my own got deamn solution for the problem and it works. So in case your busting your brain against the monitor searching for google on "keyboard 4x4 decoder" "keyboard 4x4 matrix" ... etc sick of reading datasheets and pic code...

Try the JApplet :P 'cause I'm such a nice person I've included the code. (not that I have issues with disassemblers but they mess up variable names anyhow).


well I guess I'm not a genious... but fortunately there are many shades of gray between Angelina Jolie's face and Bush's Ass hole and today I feel rather close to the neck.

need sleep.

root@desktop# shutdown -h -t secs now;

quinta-feira, novembro 08, 2007

ohhh you need to know assembly to hack?


About three mounths ago there was a terrified null assembly coder kid, in a room somewhere at ISEL, asking in desperation for a book with pictures or other fine explanation of memory management, and stack pointers and stuff. [since this stupid kid skipped some classes] Only to receive as an answer I know not of more bibliography than that assigned to this subject. Try INTEL web site.. .I tryed... ohhh my, spear my limited brain of such limited approach. It would take me millions of years to understand the language, and a couple more geological eras to do something funny with it.



Well since I am now brain stopped by the recent loss of my father and need some funny diversion... though it was a nice idea to start learning some serious hacking... (no... not that kind of black hat hacking... you naughty boy) and ended up tripping on this. So to any one looking for a glimpse on stack, function pointers and a general view to what the hell is codding at it's most raw state (assembly) take a look at this book. Especially if you're a nob like me :$
(a nob at hacking... if you're a nob at coding there should be other things more suitable)



The Shellcoder's Handbook: Discovering and Exploiting Security Holes



take a glimpse now: