Friday, 31 August 2018

Trump threatens to 'get involved' in law enforcement investigations into his own campaign - USA TODAY

USA TODAY Trump threatens to 'get involved' in law enforcement investigations into his own campaign USA TODAY President Donald Trump is once again threatening to intervene in the Justice Department if they fail to take the actions he's demanding....

At McCain's Memorial, Tears, Laughs and Allusions to the Man Not Invited - New York Times

New York Times At McCain's Memorial, Tears, Laughs and Allusions to the Man Not Invited New York Times PHOENIX — Senator John McCain was remembered Thursday at a memorial service that evoked the one-time prisoner of war's unbreakable will, the Arizona...

7 dead in New Mexico bus-truck crash, state police say - CNN

CNN 7 dead in New Mexico bus-truck crash, state police say CNN (CNN) At least seven people were killed in northwestern New Mexico when a tractor-trailer crashed head-on with a nearly packed Greyhound bus, officials said. "We do expect that number...

The next iPhones, Apple Watch leak as Apple preps for Sept. 12 event - USA TODAY

USA TODAY The next iPhones, Apple Watch leak as Apple preps for Sept. 12 event USA TODAY Apple may be preparing to announce new iPhones, iPads and Apple Watches on Sept. 12, but it looks like someone has decided to share the images of the new products...

Asian-American Students Suing Harvard Over Affirmative Action Win Justice Dept. Support - New York Times

New York Times Asian-American Students Suing Harvard Over Affirmative Action Win Justice Dept. Support New York Times The Johnston gate frames the entrance to Harvard Yard.CreditCreditHadley Green for The New York Times. By Katie Benner. Aug. 30,...

Carl Bernstein: Trump attacks 'degenerate' Watergate reporter - BBC News

BBC News Carl Bernstein: Trump attacks 'degenerate' Watergate reporter BBC News US President Donald Trump is waging a war of words with legendary Watergate reporter Carl Bernstein over a story about his ex-lawyer Michael Cohen. On Wednesday, the...

US, Canada make late-night push for NAFTA; no deal yet - Reuters

Reuters US, Canada make late-night push for NAFTA; no deal yet Reuters WASHINGTON (Reuters) - Top NAFTA negotiators from Canada and the United States wrapped up a third day of two-way talks on Thursday, agreeing to meet the next day to resolve final...

Canadian mom, daughter camping in California are found after reported missing by woman's boyfriend - Fox News

Fox News Canadian mom, daughter camping in California are found after reported missing by woman's boyfriend Fox News Police have found a young Canadian mother and her daughter, who were reported missing by the woman's concerned boyfriend after setting...

Donald Trump & Michael Cohen Tried To Buy Stories From David Pecker, Reports Say - Elite Daily

Elite Daily Donald Trump & Michael Cohen Tried To Buy Stories From David Pecker, Reports Say Elite Daily This year is truly proving itself to be the era of "show me the receipts," but it looks like two familiar faces are taking it to the next...

Alex Jones Fails To Stop Sandy Hook Parents' Defamation Case - HuffPost

HuffPost Alex Jones Fails To Stop Sandy Hook Parents' Defamation Case HuffPost Conspiracy theorist Alex Jones has failed to shut down a defamation lawsuit brought against him by the parents of a Sandy Hook victim. Judge Scott Jenkins of the 53rd...

The Impact of Preprocessing on Deep Representations for Iris Recognition on Unconstrained Environments. (arXiv:1808.10032v1 [cs.CV])

The use of iris as a biometric trait is widely used because of its high level of distinction and uniqueness. Nowadays, one of the major research challenges relies on the recognition of iris images obtained in visible spectrum under unconstrained environments. In this scenario, the acquired iris are...

Use of Source Code Similarity Metrics in Software Defect Prediction. (arXiv:1808.10033v1 [cs.SE])

In recent years, defect prediction has received a great deal of attention in the empirical software engineering world. Predicting software defects before the maintenance phase is very important not only to decrease the maintenance costs but also increase the overall quality of a software product. There...

Theoretical Linear Convergence of Unfolded ISTA and its Practical Weights and Thresholds. (arXiv:1808.10038v1 [cs.LG])

In recent years, unfolding iterative algorithms as neural networks has become an empirical success in solving sparse recovery problems. However, its theoretical understanding is still immature, which prevents us from fully utilizing the power of neural networks. In this work, we study unfolded ISTA...

AAD: Adaptive Anomaly Detection through traffic surveillance videos. (arXiv:1808.10044v1 [cs.CV])

Anomaly detection through video analysis is of great importance to detect any anomalous vehicle/human behavior at a traffic intersection. While most existing works use neural networks and conventional machine learning methods based on provided dataset, we will use object recognition (Faster R-CNN) to...

Differentially Private Change-Point Detection. (arXiv:1808.10056v1 [math.ST])

The change-point detection problem seeks to identify distributional changes at an unknown change-point k* in a stream of data. This problem appears in many important practical settings involving personal data, including biosurveillance, fault detection, finance, signal detection, and security systems....

Zero-Shot Adaptive Transfer for Conversational Language Understanding. (arXiv:1808.10059v1 [cs.CL])

Conversational agents such as Alexa and Google Assistant constantly need to increase their language understanding capabilities by adding new domains. A massive amount of labeled data is required for training each new domain. While domain adaptation approaches alleviate the annotation cost, prior approaches...

Timelines for In-Code Discovery of Zero-Day Vulnerabilities and Supply-Chain Attacks. (arXiv:1808.10062v1 [cs.CR])

Zero-day vulnerabilities can be accidentally or maliciously placed in code and can remain in place for years. In this study, we address an aspect of their longevity by considering the likelihood that they will be discovered in the code across versions. We approximate well-disguised vulnerabilities as...

Configuration Space Singularities of The Delta Manipulator. (arXiv:1808.10064v1 [cs.RO])

We investigate the configuration space of the Delta-Manipulator, identify 24 points in the configuration space, where the Jacobian of the Constraint Equations looses rank and show, that these are not manifold points of the Real Algebraic Set, which is defined by the Constraint Equations. from cs updates...

A polynomial-time algorithm for median-closed semilinear constraints. (arXiv:1808.10068v1 [cs.CC])

A subset of Q^n is called semilinear (or piecewise linear) if it is Boolean combination of linear half-spaces. We study the computational complexity of the constraint satisfaction problem (CSP) over the rationals when all the constraints are semilinear. When the sets are convex the CSP is polynomial-time...

IOTA Feasibility and Perspectives for Enabling Vehicular Applications. (arXiv:1808.10069v1 [cs.CR])

The emergence of distributed ledger technologies in the vehicular applications' arena is decisively contributing to their improvement and shaping of the public opinion about their future. The Tangle is a technology at its infancy, but showing enormous potential to become a key solution by addressing...

Super-Resolution for Hyperspectral and Multispectral Image Fusion Accounting for Seasonal Spectral Variability. (arXiv:1808.10072v1 [cs.CV])

Image fusion combines data from different heterogeneous sources to obtain more precise information about an underlying scene. Hyperspectral-multispectral (HS-MS) image fusion is currently attracting great interest in remote sensing since it allows the generation of high spatial resolution HS images,...

Trump vows to fight censorship of conservatives by social media firms

President Donald Trump told a campaign-style rally in Indiana on Thursday that his administration is standing up for free-speech rights, warning that large social media companies could not be allowed to "control what we can and cannot see." from...

California looks to adopt Obama-style net neutrality rules

California lawmakers moved on Thursday toward imposing the nation's strictest net neutrality laws on internet providers, flying in the face of sweeping new Federal Communications Commission (FCC) rules seen as a win for the companies. from Reuters:...

U.S. man charged in 'enemy of the people' threats to Boston Globe

Federal authorities have charged a California man with threatening to kill Boston Globe employees for the newspaper's role leading this month's defense of press freedoms by hundreds of U.S. news organizations against attacks by President Donald Trump. ...

U.S. conspiracy theorist Alex Jones loses bid to stop defamation lawsuit

Conspiracy theorist Alex Jones lost a bid to dismiss a defamation lawsuit brought against him by the parents of a boy killed in the 2012 Sandy Hook school massacre, according to court documents released on Thursday. from Reuters: U.S. https://i...

First Yellowstone-area grizzly hunt in 40 years blocked by federal judge

A federal judge in Montana on Thursday issued a court order temporarily blocking the first trophy hunts of Yellowstone-area grizzly bears in more than 40 years, siding with native American groups and environmentalists seeking to restore the animals'...